2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

筛选
英文 中文
Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence 使用赛灵思ISE和Cadence的自动饮料自动售货机的设计与实现及其性能评估
V. Krishna, A. Monisha, S. Sadulla, J. Prathiba
{"title":"Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence","authors":"V. Krishna, A. Monisha, S. Sadulla, J. Prathiba","doi":"10.1109/ICCCNT.2013.6726639","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726639","url":null,"abstract":"This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90261617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
OFDM transceiver design using C OFDM收发器设计使用C
Indira Bahaddur, C. L. Triveni, P. Srikanth
{"title":"OFDM transceiver design using C","authors":"Indira Bahaddur, C. L. Triveni, P. Srikanth","doi":"10.1109/ICCCNT.2013.6726661","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726661","url":null,"abstract":"The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient LEACH by enhancing the data update procedure of cluster head 通过改进簇头数据更新过程实现高效的LEACH
P. Rajan, V. Geetha
{"title":"Energy efficient LEACH by enhancing the data update procedure of cluster head","authors":"P. Rajan, V. Geetha","doi":"10.1109/ICCCNT.2013.6726767","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726767","url":null,"abstract":"There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75164266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-centric trust based identity as a service for federated cloud environment 以用户为中心的基于信任的身份即服务,用于联邦云环境
E. Samlinson, M. Usha
{"title":"User-centric trust based identity as a service for federated cloud environment","authors":"E. Samlinson, M. Usha","doi":"10.1109/ICCCNT.2013.6726636","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726636","url":null,"abstract":"Cloud computing is the promising model of delivering IT resources on demand. Identity and Access Management (IAM) stands as the hurdle for enterprises to adopt to cloud. This paper discusses IAM component of Security as a Service (SecaaS) in the context of cloud computing with a Trust Agent. We have proposed user-centric trust agent identity service which is aimed to create trust among the Cloud Service Providers (CSPs) in the federated environment. Relevant standards such as SAML, SPML, XACML, and OAuth are discussed to enable trusted and secure access to cloud services.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74254086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Real-time implementation and performance analysis of state estimation based model predictive controller for CSTR plant 基于状态估计的CSTR装置模型预测控制器的实时实现及性能分析
M. Geetha, R. Naveen, J. Jerome, V. Kumar
{"title":"Real-time implementation and performance analysis of state estimation based model predictive controller for CSTR plant","authors":"M. Geetha, R. Naveen, J. Jerome, V. Kumar","doi":"10.1109/ICCCNT.2013.6726731","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726731","url":null,"abstract":"Model Predictive Control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control schemes which make use of linear dynamic model for prediction, limit their applicability to systems which exhibit mildly nonlinear dynamics. In this paper, a state estimation based model predictive controller for nonlinear system has been proposed. The model predictive controller is designed by considering a state space model and an extended Kalman filter to predict the future behavior of the system. The efficacy of the proposed MPC scheme has been demonstrated by conducting simulation studies on the level process of a Continuously Stirred Tank Reactor (CSTR) - a MIMO system, and the real time implementation has been done in the CSTR plant to illustrate the online optimization constraint and also the advantage of MPC over conventional controller by comparison of servo-regulatory responses through ISE values.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74204586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of free space optical communication link with Mach-Zehnder optical modulator for long distance 自由空间长距离马赫-曾德尔光调制器光通信链路的设计
Nitin Garg, Sanjeev Kumar
{"title":"Design of free space optical communication link with Mach-Zehnder optical modulator for long distance","authors":"Nitin Garg, Sanjeev Kumar","doi":"10.1109/ICCCNT.2013.6726688","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726688","url":null,"abstract":"Free Space Optical Communication become more and more popular due to its advantage over Radio Frequency Communication. In this paper BER and Q-factor is observed at different parameters. It is observed that BER is increased with increase in distance and Q-factor is decreased with increase in distance. BER and Q-factor is also affected by Bit Rate and Divergence. If Bit rate and Divergence is increase BER will increased and Q-factor is decreased. It is observed that with Mach-Zehnder optical modulator we get a BER of 10-20 at a distance of 1.8 km with bit rate 2.5 Gbps and Q-factor 30 is achieved at a distance of 1.6 km with 2.5 Gbps bit rate.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77685428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of voice based wheelchair for differently abled 实现基于语音的轮椅为不同的残疾
M. B. Kumaran, A. Renold
{"title":"Implementation of voice based wheelchair for differently abled","authors":"M. B. Kumaran, A. Renold","doi":"10.1109/ICCCNT.2013.6726647","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726647","url":null,"abstract":"The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76665225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performace and energy efficient Greedy forwarding method for sensor networks 传感器网络的性能和节能贪婪转发方法
Shradha P. Dugam, S. Pingat
{"title":"Performace and energy efficient Greedy forwarding method for sensor networks","authors":"Shradha P. Dugam, S. Pingat","doi":"10.1109/ICCCNT.2013.6726624","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726624","url":null,"abstract":"The area of study and work presented in this paper is on a method of routing in sensor networks that is a part of Geographic Routing protocol known as Greedy Forwarding. This is an much more efficient version of methods that are applicable in GR. This works on the principle of progressing in the process of forwarding by selecting a peer that is nearer to the final node where the packets are destined. But with the benefits of reducing the total distance between two end points this method incurs limitations regarding collection of proper network topology information thus creating voids while sending packets. To avoid this an improvised version of previous works is presented over here that highlights mainly of increasing performance as well as energy efficiency of GF method in GR. A more enhanced method that will collect more accurate topological information and support the forwarding process with energy saving to increase networks lifetime is presented. Here the discussion about the work done by previous methods will be shown along with we introduce to you a newer version. The basic aim is to consider maximum energy paths and nodes with maximum energy remains.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"38 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78123147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware software co-simulation of dual image encryption using Latin square image 拉丁方图像双图像加密的软硬件联合仿真
S. Kumar, H. Kumar, H. Panduranga
{"title":"Hardware software co-simulation of dual image encryption using Latin square image","authors":"S. Kumar, H. Kumar, H. Panduranga","doi":"10.1109/ICCCNT.2013.6726681","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726681","url":null,"abstract":"Hardware Software co-simulation of a multiple image encryption technique has been described in the present study. Proposed multiple image encryption technique is based on Latin Square Image Cipher (LSIC). First, a carrier image based on Latin Square is generated by using 256 bits length key. XOR operation is applied between an input image and Latin Square Image to generate an encrypted image. Then XOR operation is applied between encrypted image and second input image to encrypt second image. This process is continues till nth input image. The proposed multiple image encryption technique is implemented Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. Proposed technique is validated using hardware software co-simulation method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"69 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77885580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Tumour detection in brain MRI using improved segmentation algorithm 基于改进分割算法的脑MRI肿瘤检测
E. Kumar, V. M. Kumar, M. Sumithra
{"title":"Tumour detection in brain MRI using improved segmentation algorithm","authors":"E. Kumar, V. M. Kumar, M. Sumithra","doi":"10.1109/ICCCNT.2013.6726575","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726575","url":null,"abstract":"In the present days, for the human body anatomical study and for the treatment planning medical science very much depend on the medical imaging technology and medical images. Specifically for the human brain, MRI widely prefers and using for the imaging. But by nature medical images are complex and noisy. This leads to the necessity of processes that reduces difficulties in analysis and improves quality of output. This paper discuss about an improved segmentation algorithm for different defects detection in brain MRI (Tumour) and have compared the performance of this method with conventional method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"43 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75898748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信