2015 International Conference on Pervasive Computing (ICPC)最新文献

筛选
英文 中文
Assessment of spectral efficiency about 900 MHz using GSM and CDMA technologies for mobile cognitive radio 使用GSM和CDMA技术对900 MHz左右的频谱效率进行评估
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087043
S. Mule, G. C. Manna, N. Nathani
{"title":"Assessment of spectral efficiency about 900 MHz using GSM and CDMA technologies for mobile cognitive radio","authors":"S. Mule, G. C. Manna, N. Nathani","doi":"10.1109/PERVASIVE.2015.7087043","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087043","url":null,"abstract":"Basis of cognitive radio is to exploit unused frequency channels in licensed bands. Recently standardised IEEE 802.22 set of cognitive radio protocols envisages fixed and nomadic receivers at below 800 MHz bands. Existing mobile communication system uses CDMA in 800 MHz band and GSM in 900 MHz band. Research works has established that there are some vacant channels in these mobile communications bands which are permanently available and can be deployed as Cognitive Control Channel (CCC) and Cognitive Pilot Channel (CPC). Dynamically available vacant channels in these frequency bands can be deployed for cognitive traffic. In the present study, conventional Radio frequency scanners available for different bands and dedicated engineering handsets are used for measurement of data speed in these bands. Drive tests were carried out in dense city of Kolkata across the length and breadth and spectral efficiency value was measured from data speed. The results can be utilized to take decision for appropriate Radio Access Technologies (RAT) to deploy for mobile cognitive radio in uplink and downlink directions in these frequency bands.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A review: FPGA based word matching stage of BLASTN 综述:基于FPGA的BLASTN单词匹配阶段
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087107
S. Bhalekar, P. Chilveri
{"title":"A review: FPGA based word matching stage of BLASTN","authors":"S. Bhalekar, P. Chilveri","doi":"10.1109/PERVASIVE.2015.7087107","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087107","url":null,"abstract":"Molecular Biologists use Basic Local Alignment Search Tool (BLAST) as one of the most popular sequences analysis tool. BLAST is a design used to efficiently find similar regions between the two sequences that have biological significance. As the size of genome sequences is increasing rapidly, the computation time of BLAST is continuously increasing to perform a complete genomic database search. Hence there is a need to accelerate this search process. In this paper, a new approach is proposed to scan the genomic sequence databases of Deoxyribonucleic Acid (DNA) using field programmable gate array (FPGA) based hardware. To accelerate the word matching stage of BLASTN, specifically designed for DNA sequences, and to derive its efficient architecture, a reconfigurable architecture is proposed.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130086463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Survey on designing framework for analyzing twitter spammers using forensic method 基于取证方法的twitter垃圾邮件分析框架设计综述
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087158
Ankita M. Ghate, L. Malik
{"title":"Survey on designing framework for analyzing twitter spammers using forensic method","authors":"Ankita M. Ghate, L. Malik","doi":"10.1109/PERVASIVE.2015.7087158","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087158","url":null,"abstract":"In the last few decades, a dynamic growth in the number of research works conducted in the area of cyber forensic. This paper gives short reviews analysis and detecting twitter spammers using network forensic approach. In Today's world a social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. Digital forensics is an established field in civilization and criminal investigations. In the enterprise, digital investigations are often associated with incident response the detection and investigation of online social networking spammers. This paper examines the comparison of different forensic tool and its parameters. The previous results focus a number of usability issues that need to be taken into consideration when designing and implementing network forensic tools. In this paper general methodology is discussed for forensic data analysis and also the survey of various forensic data analysis tools and approach in use to capturing data from different resources.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114915009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical modelling of forced circulation evaporator pilot plant 强制循环蒸发器中试装置的数学建模
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087006
Abhijeet Kishorsingh Sukede
{"title":"Mathematical modelling of forced circulation evaporator pilot plant","authors":"Abhijeet Kishorsingh Sukede","doi":"10.1109/PERVASIVE.2015.7087006","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087006","url":null,"abstract":"Process control, design and optimization are the key features of any industry and continue to improve because of highly increasing global competition. Pilot plant plays a vital role in analyzing the effect of variables at various process conditions and for optimal study of the process. This paper presents nonlinear mathematical model of a laboratory based forced circulation evaporator pilot plant. The modeling is done considering mass balance and energy balance equations. The open loop validation of entire model is done in MATLAB. Various key parameters like level, pressure and composition of material are considered and monitored while modeling. The obtained model was then used as basis for the implementing advanced control strategies, physical study of the pilot plant, controlling plant dynamics etc.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion avoidance and control in Delay Tolerant Networks 延迟容忍网络中的拥塞避免与控制
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087132
P. Patil, M. Penurkar
{"title":"Congestion avoidance and control in Delay Tolerant Networks","authors":"P. Patil, M. Penurkar","doi":"10.1109/PERVASIVE.2015.7087132","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087132","url":null,"abstract":"In Delay Tolerant Network (DTN), the available resources like buffer size, bandwidth etc., are limited and easily gets consumed, which results in network congestion and adversely affects the overall network performance, Due to its network characteristics and custody transfer mechanism the standard TCP congestion control mechanism is not suitable for DTN. The congestion control in DTN is the area under the research because as DTN tries to establish a network in an unfavorable environment where network infrastructure is not available and if it succeeds then the high priority messages must not be dropped because it will affect the overall objective of DTN, as some of the application areas are highly sensitive. Some of the congestion control strategies have been discussed, compared after which a CASE routing algorithm is proposed by studying them.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks 缓解黑洞攻击对移动自组织网络AODV路由协议的影响
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087174
Ashish Jain, V. Tokekar
{"title":"Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks","authors":"Ashish Jain, V. Tokekar","doi":"10.1109/PERVASIVE.2015.7087174","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087174","url":null,"abstract":"Mobile ad hoc network (MANET) is lacking infrastructure support, so nodes of MANET are vulnerable to attacks. Denial of Service attacks (DOS) makes network inaccessible to users. Black hole attack is a type of DOS attack, in which mischievous node claims that it has a route towards the destination node. Ad Hoc on Demand Distance Vector (AODV) routing protocol is affected by Black hole attack. The proposed solution is based on first Route Reply (RREP) caching mechanism in AODV protocol. Simulation results show performance improvement in routing protocol.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Recognition of 3-D faces with missing parts and line scratch removal using new technique 基于新技术的缺失部分三维人脸识别及线条划痕去除
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087053
A. A. Pawar, N. Patil
{"title":"Recognition of 3-D faces with missing parts and line scratch removal using new technique","authors":"A. A. Pawar, N. Patil","doi":"10.1109/PERVASIVE.2015.7087053","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087053","url":null,"abstract":"This paper presents an implementation of face recognition, which is a very important task of human face identification. Line scratch detection in images is a highly challenging situation because of various characteristics of this defect. Few characteristics are considered with the different texture and geometry of images. We propose a useful algorithm for frame-by-frame line scratch detection in face image which deals with 3D approach and a filtering of detection. The temporary filtering algorithm can be used to remove false detection due to thin vertical structures by detecting the scratches on an image. Experimental evaluation can be detecting the lines and scratches on a face image and they used to solve this difficult approach. Our method is used with missing parts in an image. Three-dimensional face recognition is an extended method of facial recognition is considered according with the geometry and texture of a face. It has been elaborated that 3D face recognition methods can provide high accuracy as well as high detection with a comparison of 2D recognition. 3D avoids such mismatch effect of 2D face recognition algorithms. Additionally, most 3D scanners achieve both a 3D mesh and the texture of a face image. This allows combining the output of pure 3D matches with the more traditional algorithms of 2D face recognition, thus producing better performance.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiband smart fractal antenna design for converged 5G wireless networks 融合5G无线网络多频段智能分形天线设计
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087020
S. Patil, Vandana Milind Rohokale
{"title":"Multiband smart fractal antenna design for converged 5G wireless networks","authors":"S. Patil, Vandana Milind Rohokale","doi":"10.1109/PERVASIVE.2015.7087020","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087020","url":null,"abstract":"Forthcoming Fifth Generation wireless network will be converged version of all the available wireless and wired networks including cognitive radio network, Wi-Fi, cellular, Wi-Max, WSN, IoT, Li-Fi, satellite communication and optical fiber network. Presently in the era of 4G, numbers of researchers have designed different antennas which can integrate maximum four services. This research work proposes design and implementation of Multiband Fractal smart antenna for at least seven converged wireless network services. The antenna works for several services such as GSM (0.89-0.96GHz), DCS (1.71-1.88GHz), WLAN/WSN (2.44-2.45GHz), LTE (1.7-1.9GHz), Wi-Fi/Wi-Max (2.68-6.45GHz), HIPER LAN2 (5.15-5.25GHz) and Ku Band (8-12GHz) application. The antenna planed to be designed and optimized by making using of commercially available software-High Frequency Structure Simulator (HFSS).","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and analysis of 10 port router for network on chip (NoC) 片上网络(NoC)中10端口路由器的设计与分析
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087013
Somashekhar Malipatil, S. Rekha
{"title":"Design and analysis of 10 port router for network on chip (NoC)","authors":"Somashekhar Malipatil, S. Rekha","doi":"10.1109/PERVASIVE.2015.7087013","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087013","url":null,"abstract":"Network on chip is an emerging technology which provides data reliability and high speed with less power consumption. With the technological advancements a large number of devices can be integrated into a single chip. So the communication between these devices becomes vital. The network on chip (NoC) router is used for such communication. This paper focuses on the design analysis of 10 port router. The delay (2.571ns) and power (80.98mW) is minimized by using crossbar switch. The proposed architecture of 10 port router is simulated and synthesized in Xilinx ISE 14.4 software.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132425836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reduced share size Audio Secret Sharing 减小共享大小音频秘密共享
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087082
Sonali D. Patil, P. Deshmukh, Tejal Chavan, Priyanka Sangwan, Vinay Shastri, Akash Sunthwal
{"title":"Reduced share size Audio Secret Sharing","authors":"Sonali D. Patil, P. Deshmukh, Tejal Chavan, Priyanka Sangwan, Vinay Shastri, Akash Sunthwal","doi":"10.1109/PERVASIVE.2015.7087082","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087082","url":null,"abstract":"Communication over the network generally consists of conveying the messages in the form of texts and images. In recent times communication through audio has been introduced and has changed the scenario of transmission and reception of messages, which makes it mandatory to provide proper security to the audio data. Audio Secret Sharing provides a means of transmitting the secret audio message over a network securely. This is done essentially by dividing the original secret message into a pre-defined number of shares. To formulate the original secret a specified number of shares have to be combined and anything less than the specification provided would render the message unattainable. This paper puts forth the Audio Secret Sharing scheme based on Matrix Projection. The proposed scheme lends security and reliability to the audio files and also the share size has been reduced to a great extent.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信