2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

筛选
英文 中文
[Copyright notice] (版权)
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/icacat.2018.8933679
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icacat.2018.8933679","DOIUrl":"https://doi.org/10.1109/icacat.2018.8933679","url":null,"abstract":"","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82759603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cascaded Gradient Sequence for LTE System to Reduce Peak Power LTE系统的级联梯度序列降低峰值功率
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933602
Amit Shivhare, Manish Patidar, Ravi Kumar
{"title":"Cascaded Gradient Sequence for LTE System to Reduce Peak Power","authors":"Amit Shivhare, Manish Patidar, Ravi Kumar","doi":"10.1109/ICACAT.2018.8933602","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933602","url":null,"abstract":"This article provides an assessment of combinational technique for maximum power reduction in the transmitter of long-term evolution (LTE). An intelligent combination has been presented using constellation extension and scrambling technique in the Orthogonal Frequency Division Multiplexing (OFDM) structure. The principle of this arrangement approach is to apply approximate gradient project (AGP) and partial transmit sequence (PTS) on the OFDM subcarrier. The simulation results show that the proposed approach reduce the PAPR as compared to traditional techniques and maintain the bit error rate (BER) performance of the system especially at low signal to noise ratio (SNR).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84292610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, Layout and Simulation of 8 bit Arithmetic and Logic Circuits Pad frame using C5 Process for deep submicron CMOS 基于C5工艺的深亚微米CMOS 8位算术与逻辑电路衬垫框架的设计、布局与仿真
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933609
P. Rai, Shivoy Srivastava, Ayoush Johri
{"title":"Design, Layout and Simulation of 8 bit Arithmetic and Logic Circuits Pad frame using C5 Process for deep submicron CMOS","authors":"P. Rai, Shivoy Srivastava, Ayoush Johri","doi":"10.1109/ICACAT.2018.8933609","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933609","url":null,"abstract":"A critical component of the microprocessor, the core component of central processing unit. Arithmetic and logic circuits comprises the combinational logic that implements logic operations such as AND and OR, and arithmetic operations such as Addition, Subtraction, and Multiplication. In this presented work, an 8-bit arithmetic logic circuit is designed, implemented and simulated using the Electric CAD and SPICE software. The proposed design is an 8-bit arithmetic and logic circuit that can perform: A AND B, A OR B, A + B (addition), and A - B (subtraction) and all possible arithmetic and Logical operations. Physical design of every sub module is carried out using C5 process 300 nm process technology. A pad frame is also designed and subsequent Design Rule Checks and network consistency checks are performed on the same.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"91 12 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77285802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Analysis of Data for Dissolved Gases in Transformer 变压器溶解气体数据的统计分析
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933700
Navneet Bhargava, Aparna R. Gupta, Litesh Bopche
{"title":"Statistical Analysis of Data for Dissolved Gases in Transformer","authors":"Navneet Bhargava, Aparna R. Gupta, Litesh Bopche","doi":"10.1109/ICACAT.2018.8933700","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933700","url":null,"abstract":"The Genetic Algorithm is practical to resolve the obstacles of tiny samples and provide better prognostication for non linear behaviors and it is desirable for the Dissolved Gas Analysis in Power Transformers. The GA generates the initial accumulation at random prosper and scrutiny space faster and modifies the global search cognition and convergent speed. As question arises whether the data was nonlinear or not? It was decided to do the data analysis first. Thus the gas concentration in ppm (parts per million) of all the DGA samples was checked for non linearity.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"11 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74418100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advance Malware Analysis Using Static and Dynamic Methodology 使用静态和动态方法的高级恶意软件分析
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933769
Saurabh
{"title":"Advance Malware Analysis Using Static and Dynamic Methodology","authors":"Saurabh","doi":"10.1109/ICACAT.2018.8933769","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933769","url":null,"abstract":"As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"44 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74076110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modified Z-Shape MSA with DGS for WLAN Ranges 改进的z形MSA与DGS的WLAN范围
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933794
Abhiruchi Rathi, Neenansha Jain
{"title":"Modified Z-Shape MSA with DGS for WLAN Ranges","authors":"Abhiruchi Rathi, Neenansha Jain","doi":"10.1109/ICACAT.2018.8933794","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933794","url":null,"abstract":"Microstrip patch antenna plays a vital role in WLAN communication, mobile communication, 3G, 4G, and WiFi, WI-MAX devices in different range. Z-shape microstrip patch antenna is very interesting shape for researchers. In this research work proposed a Z-shape microstrip antenna (MSA), and apply defected ground structure (DGS) on the ground side. Designed antenna is a dual band antenna that is intended to work at 1 to 10 GHz and shows good result in this range. After modelling and simulation, designed, implemented. These results are compared with different previous design on the basis of return loss (S-11) VSWR and other antenna parameters.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"29 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87167079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sixth Sense Teaching Aid 第六感教具
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933732
S. Chaman, Aniket Ghadi, Ninad Ketkar
{"title":"Sixth Sense Teaching Aid","authors":"S. Chaman, Aniket Ghadi, Ninad Ketkar","doi":"10.1109/ICACAT.2018.8933732","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933732","url":null,"abstract":"This paper proposes a novel Sixth Sense Teaching Aid (SSTA) which incorporates sixth sense technology in projectors for educational purpose. The Projector-PC system was earlier used only for displaying the presentations but with the aid of the proposed system, users can touch on any projected surfaces for interaction purpose. In the SSTA system, the graphical user interface (GUI) buttons are projected on any flat surface like wall and it deals with touch detection of the projected screen using red color parameter both for still image and real time images. The algorithm to perform touch detection is executed in two stages: 1) Feature extraction and button’s touch detection using red color thresholding algorithm which reduces the computational complexity of the processing module; and 2) Performance of assigned operation according to touch action judgment. New born technology named Sixth Sense technology is also implemented in SSTAfor getting relevant information from the internet, whenever we touch any projected Figure or headline. The proposed SSTA system is able to do real time touch detection with 97 percent accuracy which is demonstrated through projected GUI and using a data set collected under different settings of illumination variation, hand orientation and occlusion.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87245861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm 一种基于粒子群优化算法的物联网安全数据聚合方法
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933784
Neeraj Chandnani, C. N. Khairnar
{"title":"A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm","authors":"Neeraj Chandnani, C. N. Khairnar","doi":"10.1109/ICACAT.2018.8933784","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933784","url":null,"abstract":"Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"112 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Enhanced Differential Evolution through Memory Based Mechanism 基于记忆机制的增强差分进化
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933676
Raghav Prasad Parouha
{"title":"An Enhanced Differential Evolution through Memory Based Mechanism","authors":"Raghav Prasad Parouha","doi":"10.1109/ICACAT.2018.8933676","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933676","url":null,"abstract":"This article is to presents an enhanced DE (differential evolution) through memory based mechanism of PSO (particle swarm optimization). Because of uses the memory concept of PSO, the proposed DE is termed as ‘MBDE (memory based differential evolution)’ where new mutation and crossover operators are introduced. This proposed technique is implemented on four typical benchmark functions available in literature. Experimental results prove that the proposed technique produce faster and more accurate solutions than classical DE, traditional PSO and PSODE (an effective hybrid variant of PSO and DE).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89727820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contemplation of Machine Learning Algorithm under Distinct Datasets 不同数据集下机器学习算法的思考
2018 International Conference on Advanced Computation and Telecommunication (ICACAT) Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933753
Kushagra Shah, P. Chaturvedi, Akagra Jain
{"title":"Contemplation of Machine Learning Algorithm under Distinct Datasets","authors":"Kushagra Shah, P. Chaturvedi, Akagra Jain","doi":"10.1109/ICACAT.2018.8933753","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933753","url":null,"abstract":"The paper analyses machine learning and statistics classification under supervised learning approach. The grail of this study is collation of Machine Learning on variegated datasets that are contemplated and compared on the basis of two important parameters viz. time and accuracy. For the purpose of study, 6 different supervised Machine Learning algorithms are implemented on datasets in WEKA tools by percentage splitting method in which 66% of the total data have been used to train the model and 34% is used to test the efficiency of the model. As an out-turn, general comparison is produced, guiding researchers in their area of interest and to choose best available algorithm depending on the dataset classification. The main objective of this paper is to provide the general comparison between variegated machine learning algorithms and which is best suitable and efficient for a particular situation as every algorithm varies according to the area of application and single algorithm is not surpassing in every scenario.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"100 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80355542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信