2015 International Conference on Pervasive Computing (ICPC)最新文献

筛选
英文 中文
Design and implementation of four bit arithmetic and logic unit using hybrid single electron transistor and MOSFET at 120nm technology 采用120纳米单电子晶体管和MOSFET混合技术的四位算术和逻辑单元的设计与实现
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087063
V. Raut, P. Dakhole
{"title":"Design and implementation of four bit arithmetic and logic unit using hybrid single electron transistor and MOSFET at 120nm technology","authors":"V. Raut, P. Dakhole","doi":"10.1109/PERVASIVE.2015.7087063","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087063","url":null,"abstract":"Low power design requires optimization at all levels and recent development in nanoscale devices unlock the idea of hybridization due to which power consumption of a system can be controlled. The implementation of hybrid techniques for the designing of four bit arithmetic and logic unit with low power dissipation is presented in these paper. The characteristics of SET as a low power device and MOSFET as a high speed device produces unique innovations, which is not possible to achieve with only CMOS circuit. The basic hybrid gates designed and simulated as well as new XOR gate is designed for reducing the power dissipation in implementation of four bit hybrid arithmetic and logic unit. Three different full adders designed, simulated and compared in terms of power dissipation.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A survey on distributed techniques for detection of node clones in Wireless Sensor Networks 无线传感器网络中节点克隆的分布式检测技术综述
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087146
Shriya V. Autkar, M. Dhage, S. Bholane
{"title":"A survey on distributed techniques for detection of node clones in Wireless Sensor Networks","authors":"Shriya V. Autkar, M. Dhage, S. Bholane","doi":"10.1109/PERVASIVE.2015.7087146","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087146","url":null,"abstract":"Wireless Sensor Networks consists of sensor nodes which are placed in harsh and hostile surrounding where an adversary may capture the nodes, replicate them and use it for its own purpose. If the clone nodes remain undetected, it can disrupt the network functions making it vulnerable to attacks. Hence false data can be injected or the legitimate data can be taken out. Thus to detect the node clone attack to preserve security goals is the fundamental problem in WSN. Centralized methods have been proposed to detect the clones which consist of single point of failure. Hence distributed protocols are more subtle to detect the clone nodes where no central authority is present and each node is responsible for detection. This paper presents various existing witness-based distributed techniques for detecting node clones present in the network.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling, control and response surface analysis of anesthesia 麻醉的建模、控制和反应面分析
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7086999
Joeeta Anurag Tomer, R. Dubey
{"title":"Modeling, control and response surface analysis of anesthesia","authors":"Joeeta Anurag Tomer, R. Dubey","doi":"10.1109/PERVASIVE.2015.7086999","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086999","url":null,"abstract":"Anesthesia practice is unique in the sense that an anesthetist must target profound drug effect during any surgical stimulus and then reverse the effect rapidly when the procedure is over. This can only be achieved when the anesthetist has in depth knowledge of the relationship between concentration and effect and thus facilitate the transition between anesthetic state and awake state in a smooth way. The parameter which is used to define the right amount of anesthesia is `Depth of Anesthesia' (DoA). A situation involving overdosing or under dosing of anesthetic drug can lead to increased costs incurred, prolonged post-operative stay in the hospitals and in extreme conditions may even lead to death. Earlier larger doses of a single anesthetic agent were used to achieve anesthesia. But it had profound side effects. As such a combination of an anesthetic agent like propofol and an opioid like remifentanil is used, and the modeling is done by a technique which is known as `Three compartment PK-PD model'. The controller used to control the process is `Proportional-Integral-Derivative Controller (PID)'. The interaction between the anesthetic drug and the opioid is then studied, so as to determine the compatibility between the two drugs. The technique which is used in this context is `Response Surface Methodology'. In this paper Response Surface is generated using mat lab and the entire spectrum of drug effect is studied.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and development of Microstrip Antenna: Knowledge based optimization for the enhancement in the design procedure 微带天线的设计与开发:基于知识的优化设计
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087211
M. P. Ghatule
{"title":"Design and development of Microstrip Antenna: Knowledge based optimization for the enhancement in the design procedure","authors":"M. P. Ghatule","doi":"10.1109/PERVASIVE.2015.7087211","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087211","url":null,"abstract":"With the rapid spread of radio communication network including cellular phone, Radar Communication System, Navigation, Internet Communication Satellite communication etc., the ANTENNA is basic device which is used in all communication systems. Its proper design is essential to run those systems effectively and gainfully. Conspicuously wide antennas for various transmitting and receiving stations installed on steel towers, suburbs and on the roofs of the buildings and tops of the electrical poles and towers in the city and also in rural area. Thus antenna is the backbone of the any radio wave and microwave communication system.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of PUE attacker on Dynamic Spectrum access in cognitive radio 认知无线电中PUE攻击者动态频谱访问性能分析
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7086985
Pooja K. Niranjane, S. Rajput, V. Wadhai, J. Helonde
{"title":"Performance analysis of PUE attacker on Dynamic Spectrum access in cognitive radio","authors":"Pooja K. Niranjane, S. Rajput, V. Wadhai, J. Helonde","doi":"10.1109/PERVASIVE.2015.7086985","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086985","url":null,"abstract":"Spectrum inefficiency is the major problem in the wireless technology. To negotiate this problem the technology called cognitive radio is introduced which is based on software defined radio (SDR). It additionally senses the environment with the help of secondary user to utilize the licensed band when primary user is not accessing the spectrum. Security and privacy are immeasurable challenges in all types of wired and wireless networks. These challenges are of even greater importance in CR networks. The unique characteristic of these networks and the application purposes, they serve make them attractive target for intrusions and other attacks. Primary user emulation attack is one of the major security threats in spectrum sensing. To shrink this we have distinguished various defense techniques which can conflict the PUE attacks.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey: Heterogeneous video transcoder for H.264/AVC to HEVC H.264/AVC到HEVC的异构视频转码器综述
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087098
S. Kaware, S. Jagtap
{"title":"A survey: Heterogeneous video transcoder for H.264/AVC to HEVC","authors":"S. Kaware, S. Jagtap","doi":"10.1109/PERVASIVE.2015.7087098","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087098","url":null,"abstract":"High Efficiency Video Coding (HEVC) is invented as new video coding standard for improvement of the H.264/AVC coding standard. HEVC currently used to enhance the video compression and quality of video. However, there are a lot of limitations in H.264/AVC encoded video. So the new efficient method is proposed for transcoding the H.264 encoded video into HEVC format. In this paper, different methods for video transcoding are explained which include mode mapping, machine learning, complexity scalable and background modeling.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role of different factors in predicting movie success 不同因素在预测电影成功中的作用
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087152
A. Bhave, Himanshu Kulkarni, Vinay Biramane, Pranali K. Kosamkar
{"title":"Role of different factors in predicting movie success","authors":"A. Bhave, Himanshu Kulkarni, Vinay Biramane, Pranali K. Kosamkar","doi":"10.1109/PERVASIVE.2015.7087152","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087152","url":null,"abstract":"Due to rapid digitization and emergence of social media the movie industry is growing by leaps and bounds. The average number of movies produced per year is greater than 1000. So to make the movie profitable, it becomes a matter of concern that the movie succeeds. Given the low success rate, models and mechanisms to predict reliably the ranking and or box office collections of a movie can help de-risk the business significantly and increase average returns. The current predictive models available are based on various factors for assessment of the movie. These include the classical factors such as cast, producer, director etc. or the social factors in form of response of the society on various online platforms. This methodology lacks to harvest the required accuracy level. Our paper suggests that the integration of both the classical and the social factors (anticipation and user feedback) and the study of interrelation among the classical factors will lead to more accuracy.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Electronic sensor based system for analysis of infection behavior in milk 基于电子传感器的牛奶感染行为分析系统
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087076
Sarita B. Dhoble, N. Choudhari, A. R. Choudhari
{"title":"Electronic sensor based system for analysis of infection behavior in milk","authors":"Sarita B. Dhoble, N. Choudhari, A. R. Choudhari","doi":"10.1109/PERVASIVE.2015.7087076","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087076","url":null,"abstract":"In human life, milk and milk products are important, necessary and vital food elements, without which the daily meal may not be complete. Food and milk borne pathogens are a major cause of morbidity & mortality in human society. Different types of infections like milk borne pathogens, bacteria, microbes can contaminate milk. This contaminated milk is very dangerous diseases producing potential vehicle. So infection detection in milk are an urgent need of the society to prevent the diseases caused by pathogens. The prime intention of this research has been to develop electronic sensor based system to study the behavior of infections which are occurs in milk. Highly efficient pathogen separation, extraction strategies are needed to achieve successful detection of infection. Therefore electronic sensor system has developed which may be used to study infection information, infection trajectories and its extraction in milk and milk product. The quality of milk samples is tested by checking the pH level by using the electronics ph model developed. The response of sensor system is compared with the response of the same sample in the dairy form using classical methods. The observations and results of this analysis are used to predict the infections present in milk and its food products.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Heat recovery system for oven in paint shop 涂装车间烘箱热回收系统
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087052
Sneha Sharma, G. Gaikwad
{"title":"Heat recovery system for oven in paint shop","authors":"Sneha Sharma, G. Gaikwad","doi":"10.1109/PERVASIVE.2015.7087052","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087052","url":null,"abstract":"This paper presents the design of heat recovery system for oven in paint shop. The hot air generated in oven is directly passed to the environment through the exhaust. Oven's unused heat is exhausted to atmosphere at High Temperature. The exhausted heat carrying flue gas is at high temperature. The system is to reuse that air for hot water generation. The hot water generated will be at temperature of boiling point approximately. That water then can be used for several processes. Heat energy for total hot water heating is very large. Hence the potential of energy recovery & reuse is realized. Average 90% of energy can be recovered from oven exhaust. The technique used is heat exchanger with gas to liquid heat transfer.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative reinforcement learning approach for routing in ad hoc networks ad hoc网络中路由的协同强化学习方法
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7086962
Rahul Desai, B. Patil
{"title":"Cooperative reinforcement learning approach for routing in ad hoc networks","authors":"Rahul Desai, B. Patil","doi":"10.1109/PERVASIVE.2015.7086962","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086962","url":null,"abstract":"Most of the routing algorithms over ad hoc networks are based on the status of the link (up or down). They are not capable of adapting the run time changes such as traffic load, delay and delivery time to reach to the destination etc, thus though provides shortest path, these shortest path may not be optimum path to deliver the packets. Optimum path can only be achieved when quality of links within the network is detected on continuous basis instead of discrete time. Thus for achieving optimum routes we model ad hoc routing as a cooperative reinforcement learning problem. In this paper, agents are used to optimize the performance of a network on trial and error basis. This learning strategy is based work in swarm intelligence: those systems whose design is inspired by models of social insect behaviour. This paper describes the algorithm used in cooperative reinforcement learning approach and performs the analysis by comparing with existing routing protocols.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信