2017 2nd International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
A computational model for monitoring the hexose monophosphate (HMP) shunt pathway 一种监测单磷酸己糖(HMP)分流途径的计算模型
F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar
{"title":"A computational model for monitoring the hexose monophosphate (HMP) shunt pathway","authors":"F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar","doi":"10.1109/ICCCT2.2017.7972270","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972270","url":null,"abstract":"A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency, which can lead to varying degrees of hemolysis. The manifestation of this study is the building of a machine that is used for the improvement of NADPH and ribose sugars. More over, it is necessary to know the mechanism that occurs during such operation. The computational complexity in such an attempt is applied to HMP shunt pathway. As this pathway is active in rapidly dividing cells and in tissues where there is more requirement of NADPH, it is shown that nondeterministic finite automata accept HMP shunt pathway.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tool development for formalizing the requirement for the safety critical software engineering process 用于形式化安全关键软件工程过程需求的工具开发
V. Madhan, V. Kalaiselvi, Donald J.P
{"title":"Tool development for formalizing the requirement for the safety critical software engineering process","authors":"V. Madhan, V. Kalaiselvi, Donald J.P","doi":"10.1109/ICCCT2.2017.7972273","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972273","url":null,"abstract":"This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness of the requirements using the FASTEST tool for the derived z specifications.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Frequency reconfigurable bandpass filter for IMT-A applications 频率可重构带通滤波器的IMT-A应用
Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra
{"title":"Frequency reconfigurable bandpass filter for IMT-A applications","authors":"Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra","doi":"10.1109/ICCCT2.2017.7972242","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972242","url":null,"abstract":"A spiral resonator reconfigurable microstrip band pass filter is presented in this manuscript. The filter provides control variation in resonance frequency (ƒc). The variation in center frequency of the proposed design is noted from 3.40 – 3.77 GHz. The filter is designed to work at LTE-42 band to support IMT-A applications. The size of the proposed spiral structure is 14.6 × 5.5 mm2.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web page design optimisation based on segment analytics 基于分段分析的网页设计优化
S. Gomathi, V. R., S. R, S. Dheeksha
{"title":"Web page design optimisation based on segment analytics","authors":"S. Gomathi, V. R., S. R, S. Dheeksha","doi":"10.1109/ICCCT2.2017.7972310","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972310","url":null,"abstract":"In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage enhancement using fuzzy logic in a distributed Wireless sensor network 基于模糊逻辑的分布式无线传感器网络覆盖增强
K. Joshitha, S. Jayashri
{"title":"Coverage enhancement using fuzzy logic in a distributed Wireless sensor network","authors":"K. Joshitha, S. Jayashri","doi":"10.1109/ICCCT2.2017.7972290","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972290","url":null,"abstract":"The work deals with the healing of the coverage hole identified in a location unaware network using fuzzy logic. The hole identification is done based on the Delaunay Triangulation method and the Empty circle concept. The main contribution here is that the healing of the coverage hole is done on a location unaware network based on the energy, angle and distance of the nodes involved in the healing process using the fuzzy rule set. Only the partial location information like the distance between the nodes is used. Redundant nodes are identified using the depth of angle formed between any two nodes. The boundary nodes of the hole along with their one hop neighbors take part in the healing process. This fastens the healing process with reduced energy consumption.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption 基于模糊逻辑的无线传感器网络不平等聚类算法
K. Sundaran, V. Ganapathy, Priyanka Sudhakara
{"title":"Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption","authors":"K. Sundaran, V. Ganapathy, Priyanka Sudhakara","doi":"10.1109/ICCCT2.2017.7972283","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972283","url":null,"abstract":"Energy consumption and lifetime of WSN are the most important research challenges to be resolved. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. Farther sensor nodes data are aggregated by cluster heads and send to the base station. This leads to a heavy traffic and faster depletion of energy to the nodes that are nearer to the sink. To enhance the energy conservation, for suppressing hot spot problem and for load balance achievement, we propose an algorithm namely as ECUCF (Energy Conserved Unequal Clusters with Fuzzy logic). Based on the distances of the nodes from the base station, the network is divided into three different sectors. For designing unequal clusters in each sector, a fuzzy logic approach is followed. The cluster heads that are nearer to the base station are designed to be of smaller sizes whereas the cluster heads that are situated farther away from the sink to have higher cluster sizes. The proposed algorithm ECUCF is simulated using MATLAB environment. The performances obtained are compared with the performances of other clustering schemes like LEACH (equal clustering algorithm) and FBUC (unequal clustering algorithm). From the simulated results, it is found that the performances of ECUCF are much improved as compared to LEACH and FBUC in maximizing the number of clusters, increasing the number of live nodes in the network and extending the lifetime of nodes on each round of operation.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An integrated game theoretical approach to detect misbehaving nodes in MANETs 一种集成博弈论方法检测manet中的不良行为节点
C. Vijayakumaran, T. A. Macriga
{"title":"An integrated game theoretical approach to detect misbehaving nodes in MANETs","authors":"C. Vijayakumaran, T. A. Macriga","doi":"10.1109/ICCCT2.2017.7972268","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972268","url":null,"abstract":"Mobile Ad-hoc Networks are dynamic in nature and do not have fixed infrastructure to control nodes in the networks. The challenge lies ahead in coordinating among such dynamically moving nodes. Over a due course, nodes might become selfish and may refrain from packet forwarding because of the heavy dynamism. This selfish behavior might also result as an impact of malicious nodes in the neighborhood. Therefore, trust and reputation based mechanisms are required to keep the mobile neighbors intact. Assigning or altering the trust highly depends on the node behavior. Game theoretical approaches are more suitable in deciding upon the reward mechanisms for which the mobile nodes operate upon. Rewards or penalties have to be decided by ensuring a clean and healthy MANET environment. Not every time the same reward schemes are to be followed since this might result in malicious nodes attacking the rewarding scheme as well. Therefore, a non-routine yet surprise alterations are well required in place in deciding suitable and safe reward strategies. This work focuses on integrating a misbehavior node detection scheme and an incentive based reputation scheme with game theoretical approach called Supervisory Game to analyze the selfish behavior of nodes in the MANETs environment. The proposed work significantly reduces the cost of detecting misbehavior nodes in the network.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Antenna sensor for deterioration assesment in mechanical contraption 用于机械装置退化评估的天线传感器
G. Indumathi, G.Praveen Koodalingam
{"title":"Antenna sensor for deterioration assesment in mechanical contraption","authors":"G. Indumathi, G.Praveen Koodalingam","doi":"10.1109/ICCCT2.2017.7972285","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972285","url":null,"abstract":"In this paper the design of an antenna sensor for deterioration in mechanical contraption at high frequency to attain more sensitivity and high gain is proposed. The design & simulation of a wireless antenna sensor for deterioration assessment in mechanical contraption is presented. Here the length of a patch antenna governs the antenna's resonance frequency and a patch antenna bonded to a structural surface can be used to measure mechanical deterioration propagation by interrogating resonance frequency shift due to antenna length change. In comparison with existing approaches such as radio frequency identification, the frequency doubling scheme is proposed as a new signal modulation approach for the antenna sensor. A circular patch receiving and transmitting antenna sensor is designed using Advanced Design System (ADS) software. And both the patch antennas are coupled using a matching network to form a frequency doubling antenna sensor. A split ring resonator is designed and simulated using Advanced Design System (ADS). The theoretical analysis of resonant frequency with and without stress is also represented in detail, to know about the performance of the resonator.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on wireless networks attacks 关于无线网络攻击的调查
S. Surya, G. A. Magrica
{"title":"A survey on wireless networks attacks","authors":"S. Surya, G. A. Magrica","doi":"10.1109/ICCCT2.2017.7972278","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972278","url":null,"abstract":"Wireless network has gained popularity as the users want connectivity irrespective of their geographic position to perform their tasks. Wireless networks have many benefits over the wired networks in terms of mobility, flexibility and cost. Though there are several advantages of wireless networks, they are prone to security issues which generally fall under the following three categories they are confidentiality, integrity and availability. A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart waste management using Internet-of-Things (IoT) 利用物联网(IoT)进行智能废物管理
G. Shyam, S. Manvi, P. Bharti
{"title":"Smart waste management using Internet-of-Things (IoT)","authors":"G. Shyam, S. Manvi, P. Bharti","doi":"10.1109/ICCCT2.2017.7972276","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972276","url":null,"abstract":"To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and technology providers have a role to play in working with governments to enable smart solutions. But, building such solutions on an open, standards-based communications platform that can be continuously used is a challenge. We present a waste collection management solution based on providing intelligence to wastebins, using an IoT prototype with sensors. It can read, collect, and transmit huge volume of data over the Internet. Such data, when put into a spatio-temporal context and processed by intelligent and optimized algorithms, can be used to dynamically manage waste collection mechanism. Simulations for several cases are carried out to investigate the benefits of such system over a traditional system. We try to replicate the scenario using Open Data from the city of Pune, India stressing on the opportunities created by this type of initiatives for several parties to innovate and contribute to the development of Smart waste management solutions.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"168 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信