2014 International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
Modified MIMO-OFDM Channel Estimation Technique for DVB-T2 Systems DVB-T2系统中改进MIMO-OFDM信道估计技术
Mona Z. Saleh, M. Sadek, S. E. El Ramly
{"title":"Modified MIMO-OFDM Channel Estimation Technique for DVB-T2 Systems","authors":"Mona Z. Saleh, M. Sadek, S. E. El Ramly","doi":"10.1109/CICN.2014.57","DOIUrl":"https://doi.org/10.1109/CICN.2014.57","url":null,"abstract":"This paper proposes an enhanced pilot-aided channel estimation algorithm for the second generation of the digital video broadcast for terrestrial (DVB-T2) standard. Two channel estimation techniques are discussed, the first is based on the 3-points averaging technique, while the second is based on studying the frequency domain pattern of the channel response. The second technique leads to a 0.5 dB reduction in the SNR needed to guarantee a specific bit error rate (BER) requirement when compared to the conventional estimation technique recommended by the DVB-T2 implementation guide lines.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"35 1","pages":"212-218"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90683852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme 基于Diffie-Hellman的智能卡多服务器认证方案
H. Mittal
{"title":"Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme","authors":"H. Mittal","doi":"10.1109/CICN.2014.173","DOIUrl":"https://doi.org/10.1109/CICN.2014.173","url":null,"abstract":"A secure smart-card multi-server authentication scheme has been proposed using Diffie-Hellman, Hash-Function and XOR. The scheme made no use of verification table, or encryption techniques, or timestamps to generate a session key to provide secure communication between user and server and resists all possible security attacks, such as Man-in-the-Middle attack, Impersonation attack, Insider attack and many more. The scheme proved to be better when compared to Xie and Chen scheme in terms of security and performance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"422 1","pages":"808-812"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84932619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Structured Signature Scheme for Efficient Dissemination of Tree Structured Data 树形结构数据有效传播的结构化签名方案
V. Waghmare, R. Thool
{"title":"Structured Signature Scheme for Efficient Dissemination of Tree Structured Data","authors":"V. Waghmare, R. Thool","doi":"10.1109/CICN.2014.186","DOIUrl":"https://doi.org/10.1109/CICN.2014.186","url":null,"abstract":"The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"21 1","pages":"882-889"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80336406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications 基于遗传算法的无线网络入侵检测研究
Shubhangi Singh, R. S. Kushwah
{"title":"A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications","authors":"Shubhangi Singh, R. S. Kushwah","doi":"10.1109/CICN.2014.162","DOIUrl":"https://doi.org/10.1109/CICN.2014.162","url":null,"abstract":"In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field. Till now, many approaches has been defined by various researchers to improve the detection rate of intrusions over networks. This paper provides a brief study on significance of evolutionary approach genetic algorithm for intrusion detection to classify and detect intrusions. Methodology of genetic algorithm based intrusion detection systems and review on different approaches introduced in the field has been illustrated with the help of flowcharts for easy interpretation. This paper will provide a helpful review to the promising researchers on the relevant topic.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"749-752"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78763263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals 基于音频信号的车辆力学状态判定与道路交通密度估计
Minal Bhandarkar, Tejashri Waykole
{"title":"Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals","authors":"Minal Bhandarkar, Tejashri Waykole","doi":"10.1109/CICN.2014.94","DOIUrl":"https://doi.org/10.1109/CICN.2014.94","url":null,"abstract":"In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"56 1","pages":"395-401"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76612167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Genetic Algorithm for Intrusion Detection System 入侵检测系统的改进遗传算法
Dheeraj Pal, A. Parashar
{"title":"Improved Genetic Algorithm for Intrusion Detection System","authors":"Dheeraj Pal, A. Parashar","doi":"10.1109/CICN.2014.178","DOIUrl":"https://doi.org/10.1109/CICN.2014.178","url":null,"abstract":"Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"157 1","pages":"835-839"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
10-T Full Subtraction Logic Using GDI Technique 使用GDI技术的10-T全减法逻辑
Haramardeep Singh, R. Kumar
{"title":"10-T Full Subtraction Logic Using GDI Technique","authors":"Haramardeep Singh, R. Kumar","doi":"10.1109/CICN.2014.202","DOIUrl":"https://doi.org/10.1109/CICN.2014.202","url":null,"abstract":"Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"110 1","pages":"956-960"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73411285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Code Analysis Base Regression Test Selection Technique for D Programming Language 基于代码分析的D语言回归测试选择技术
Nitesh Chouhan, M. Dutta, Mayank Singh
{"title":"A Code Analysis Base Regression Test Selection Technique for D Programming Language","authors":"Nitesh Chouhan, M. Dutta, Mayank Singh","doi":"10.1109/CICN.2014.232","DOIUrl":"https://doi.org/10.1109/CICN.2014.232","url":null,"abstract":"D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"1106-1112"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation for Medical Information Service Open Platform 医疗信息服务开放平台的设计与实现
Jianfeng Shan, Yu Fang
{"title":"Design and Implementation for Medical Information Service Open Platform","authors":"Jianfeng Shan, Yu Fang","doi":"10.1109/CICN.2014.144","DOIUrl":"https://doi.org/10.1109/CICN.2014.144","url":null,"abstract":"In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"646-651"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75208686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Signcryption Using ECC 使用ECC进行图像签名加密
Reenu Saini, K. S. Vaisla
{"title":"Image Signcryption Using ECC","authors":"Reenu Saini, K. S. Vaisla","doi":"10.1109/CICN.2014.177","DOIUrl":"https://doi.org/10.1109/CICN.2014.177","url":null,"abstract":"The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"53 1","pages":"829-834"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信