2015 International Conference on Communication Networks (ICCN)最新文献

筛选
英文 中文
Analyzing the behavior of WPA with modification 分析修改后的WPA的行为
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.11
Kashish Monga, V. Arora, Ashish Kumar
{"title":"Analyzing the behavior of WPA with modification","authors":"Kashish Monga, V. Arora, Ashish Kumar","doi":"10.1109/ICCN.2015.11","DOIUrl":"https://doi.org/10.1109/ICCN.2015.11","url":null,"abstract":"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of low leakage CMOS based full wave bridge rectifier 低漏CMOS全波桥式整流器的设计
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.70
Poonam Tiwari, Prateek Jain, S. Akashe
{"title":"Design of low leakage CMOS based full wave bridge rectifier","authors":"Poonam Tiwari, Prateek Jain, S. Akashe","doi":"10.1109/ICCN.2015.70","DOIUrl":"https://doi.org/10.1109/ICCN.2015.70","url":null,"abstract":"In this paper a low leakage CMOS based full wave bridge rectifier is analyzed. MOS based bridge rectifier circuit is being proposed in this study instead of the conventional diode bridge rectifier circuit because of its less reverse leakage parameters, proper utilization of switching mechanism results in high efficiency and suitability for high frequency application. It finds applications in many modern electronic applications such as signal processing, conditioning, measurement and instrumentation. The reduction of leakage parameters is exceeded to the improved rectifier efficiency of the proposed circuit. After simulation and analysis of proposed circuit, the leakage power obtained for the proposed circuit has found 1.089 fW; the average power of the proposed circuit has found 1.76 μW. The efficiency of the proposed circuit has found 81.83% which explains an improvement as compared to that of the diode based bridge rectifier circuit. The design is simulated at 45nm technology.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency compensation in two stage operational amplifier using common gate stage 两级运算放大器的共门级频率补偿
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.31
Aditya Raj, R. Yadav, S. Akashe
{"title":"Frequency compensation in two stage operational amplifier using common gate stage","authors":"Aditya Raj, R. Yadav, S. Akashe","doi":"10.1109/ICCN.2015.31","DOIUrl":"https://doi.org/10.1109/ICCN.2015.31","url":null,"abstract":"This paper represents a highly stable, more efficient and low power CMOS based operational amplifier. A compensation strategy using common gate stage is used which provides high gain-bandwidth product and overcomes the drawback of source follower and lead compensation approaches by eliminating the complex poles and right-half-plane (RHP) zero. The proposed circuit utilized the miller capacitance in conjunction with common gate current buffer to obtain the design equations. This circuit is simulated at 45nm technology using cadence analog virtuoso tool. The operational amplifier designed here produces an improved unity gain frequency of 6.8 MHZ with phase margin of approximately 68° and an open loop gain of 88 dB which ensures the stability of the system. The stability is required in high frequency switching regulators like sampled data system to generate their power supplies. These can also be used in a so many analog circuits such as active filters, analog-to-digital converters, low-dropout regulators (LDOs).","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Traffic analysis for VANET using WAVE and WiMAX 基于WAVE和WiMAX的VANET流量分析
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.65
Priyanka Tiwari, R. S. Kushwah
{"title":"Traffic analysis for VANET using WAVE and WiMAX","authors":"Priyanka Tiwari, R. S. Kushwah","doi":"10.1109/ICCN.2015.65","DOIUrl":"https://doi.org/10.1109/ICCN.2015.65","url":null,"abstract":"In recent years, the immense and ubiquitous coverage area of vehicular network is growing very frequently as the computational power and deployment of modern vehicle's wireless connectivity and their service facilities are raised. VANET (Vehicular Ad hoc Network) have become an orientation to the researchers and users both for inventive utilization of wide range of safety and non-safety applications provided by this network. It has many issues and challenges for perpetuating the efficiency of the vehicular network in terms of throughput, packet loss and jitter/delay. In this paper, implementation of two different scenarios of vehicular environment with mobile IP using WAVE (Wireless Access in Vehicular Environment or IEEE 802.11p) and WiMAX (Worldwide Interoperability for Microwave Access IEEE 802.16e) technologies is done, for calculating the delay for different packet length over base station. NCTUns simulator is used for simulation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"37 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Introduction to the basic LTE handover procedures 介绍基本的LTE移交程序
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.39
J. Agrawal, Rakesh Patel, P. Mor, P. Dubey, J. M. Keller
{"title":"Introduction to the basic LTE handover procedures","authors":"J. Agrawal, Rakesh Patel, P. Mor, P. Dubey, J. M. Keller","doi":"10.1109/ICCN.2015.39","DOIUrl":"https://doi.org/10.1109/ICCN.2015.39","url":null,"abstract":"Mobile communication industry is growing very fast with the increasing demand of users in the field of communication. To meet up the users demand and to provide them better communication a new radio access network was designed which was named as Long Term Evolution (LTE). As better connectivity is very important during both stationary and roaming conditions, a proper handover is of keen importance. LTE has introduced new handover procedures for both inter and intra radio access communication which has not only reduced the call drops but has also increased the communication quality. A short description of these procedures is given in this paper.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tolerant design of low power D Flip Flop using GDI and DSTC for higher performance 采用GDI和DSTC的低功耗D触发器容错设计,实现更高的性能
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.64
S. Gupta, N. Saxena
{"title":"Tolerant design of low power D Flip Flop using GDI and DSTC for higher performance","authors":"S. Gupta, N. Saxena","doi":"10.1109/ICCN.2015.64","DOIUrl":"https://doi.org/10.1109/ICCN.2015.64","url":null,"abstract":"This article clarifies another execution of productive D-Flip-Flop (DFF) utilizing Gate-Diffusion-Input (GDI) strategy and DSTC. This DFF outline permits diminishing force delay item and territory of the circuit, while keeping up low many-sided quality of rationale configuration. Execution correlation with other DFF plan systems is exhibited, regarding entryway range, number of gadgets, postpone and power scattering, indicating points of interest and disadvantages of GDI DFF when contrasted with ordinary strategy. The execution is completed by HSPICE reenactment with 180 nm & 90 nm CMOS innovation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy based optimization of social network with special reference to terrorist network mining 基于模糊的社会网络优化,特别涉及恐怖分子网络的挖掘
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.32
Suraksha Tiwari, Shilky Shrivastava, Manish Gupta
{"title":"Fuzzy based optimization of social network with special reference to terrorist network mining","authors":"Suraksha Tiwari, Shilky Shrivastava, Manish Gupta","doi":"10.1109/ICCN.2015.32","DOIUrl":"https://doi.org/10.1109/ICCN.2015.32","url":null,"abstract":"The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wideband Low Noise Unity Gain amplifier using linearity enhancement technique 采用线性增强技术的宽带低噪声单位增益放大器
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.69
Shaily Singh, Arun Patel, Pritesh Tiwari, Vaibhav Singh
{"title":"Wideband Low Noise Unity Gain amplifier using linearity enhancement technique","authors":"Shaily Singh, Arun Patel, Pritesh Tiwari, Vaibhav Singh","doi":"10.1109/ICCN.2015.69","DOIUrl":"https://doi.org/10.1109/ICCN.2015.69","url":null,"abstract":"A low noise-figure (NF) and Unity power gain 1-100 GHz ultra-wideband Low Noise π Network with excellent linearity is reported. An π-match input network, Capacitive feedback with series and shunt inductive peaking techniques are used to achieve wideband impedance matching with low noise figure as well as flat unity gain response. This technique exists unity voltage and current gain so that matching used as a follower. The LNA consumes power dissipation 1.586 mW, and group-delay (GD) variation less than 0.1f ps in the frequency range 1-100 GHz. Furthermore, the LNA achieves minimum NF of 0.4 dB for frequencies 1-100 GHz, one of the best NF results reported for frequencies 1-100 GHz. CMOS ultra-wideband Low Noise π Network. Low power consumption network is versatile demanded in modern technology, modern technology want such type of amplifier which gives low power consumption with less reflection, In this paper presented technique to reduce leakage power consumption with small value of reflection. Here design low power dissipation network using compensation and feedback technique.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131582764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preemptable priority based dynamic resource allocation in cloud computing with fault tolerance 基于可抢占优先级的容错云计算动态资源分配
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.54
Shubhakankshi Goutam, A. Yadav
{"title":"Preemptable priority based dynamic resource allocation in cloud computing with fault tolerance","authors":"Shubhakankshi Goutam, A. Yadav","doi":"10.1109/ICCN.2015.54","DOIUrl":"https://doi.org/10.1109/ICCN.2015.54","url":null,"abstract":"Today, cloud computing serves as a request response model, where a client makes request for various available services on “pay as you go basis”. Cloud computing offers a dynamic flexible resource allocation phenomenon. For reliable and guaranteed services there must be a scheduling mechanism that all resources are efficiently allocated to satisfy the customer's request. Cloud services are based on scalability, availability, security and fault tolerance features. Service provisioning in cloud is based on SLA. Service level agreement is the terms of cloud provider's contracts with customers to define the level(s) of service being sold in plain language terms. QoS (quality of service) plays important role in cloud environment. Resource scheduling and service deployment is done by considering multiple SLA parameters like CPU requirement, network bandwidth, memory and storage. In this paper we propose an algorithm which perform resource preemption from low priority task to high priority task and advanced reservation for resources considering multiple SLA parameters for deploying service. This algorithm is also effective for fault tolerance mechanism.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detection of non-proliferative diabetic retinopathy lesions using wavelet and classification using K-means clustering 小波检测非增生性糖尿病视网膜病变及k均值聚类分类
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.73
Yogesh M. Rajput, R. Manza, Manjiri B. Patwari, Deepali D. Rathod, Prashant L. Borde, P. Yannawar
{"title":"Detection of non-proliferative diabetic retinopathy lesions using wavelet and classification using K-means clustering","authors":"Yogesh M. Rajput, R. Manza, Manjiri B. Patwari, Deepali D. Rathod, Prashant L. Borde, P. Yannawar","doi":"10.1109/ICCN.2015.73","DOIUrl":"https://doi.org/10.1109/ICCN.2015.73","url":null,"abstract":"WHO predicts that in year 2012 there are about 347 million people worldwide have diabetes, more than 80% of diabetes deaths occur in different countries. WHO projects that diabetes will be the 7th major cause leading death in 2030. Diabetic Retinopathy caused by leakage of blood or fluid from the retinal blood vessels and it will damage the retina. Non-proliferative diabetic retinopathy (NPDR) is an early stage of diabetic retinopathy and it is categorized into three stages they are mild, moderate and sever NPDR. The characteristic of the Mild; is specified by the presence of minimum microaneurysm, Moderate; specifies the presence of hemorrhages, microaneurysms, and hard exudates where as Severe; determine on the blockage of vessels, depriving several areas of the retina. With their blood supply. These areas of the retina send signals to the body to grow new blood vessels for nourishment. The proposed algorithm tested on online databases like STARE, DRIVE, DiarectDB0, DiarectDB1 and SASWADE (the database collected during the research work). The statistical techniques were applied on NPDR lesion and calculate the mean, variance, standard deviation, & correlation for classification. K-means clustering have been applied on the dataset with extracted features 95% of correct classification have been achieved.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116879679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信