首页 > 最新文献

2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)最新文献

英文 中文
Nonlinearity effect of high power amplifiers in communication systems 通信系统中大功率放大器的非线性效应
Shatrughna Prasad Yadav, S. Bera
Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.
功率放大器(PA)是通信系统中一个非常重要的部件,它消耗的能量占通信系统总能量的很大一部分,而且大部分是非线性的。PA效率与其线性度呈反比关系。从效率的角度来看,非线性PAs是可取的。为提高效率所付出的代价是频谱的增长和相邻信道的干扰。它还会引起带内失真,从而降低误码率(BER)性能。传输系统,如正交频分复用(OFDM),具有容忍符号间干扰和良好的频谱效率,但受制于功率放大器的非线性,由于其峰值平均功率比(PAPR),这是由于其信号包络的大波动。为了减少光谱的再生长和降低误码率,需要对PA进行线性化处理。本文提出了峰值裁剪、随机相移、选择映射(SLM)和虚拟序列插入(DSI)等方法来降低峰值比,从而降低非线性的影响,提高波谱效率和能量效率。
{"title":"Nonlinearity effect of high power amplifiers in communication systems","authors":"Shatrughna Prasad Yadav, S. Bera","doi":"10.1109/EIC.2015.7230741","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230741","url":null,"abstract":"Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of Burrows Wheeler Transform based image compression algorithm for multimedia applications 基于Burrows Wheeler变换的多媒体图像压缩算法评价
C. D. Rawat, S. Rao
Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.
压缩是一种在不过度降低数据质量的情况下减少数据量的技术。压缩后的多媒体数据的传输和存储比原始的未压缩数据更快、更高效。多媒体数据压缩,尤其是图像压缩,有各种各样的技术和标准。它们要么是无损技术,要么是有损技术。算术和霍夫曼编码是两种广泛使用的无损压缩技术。Burrows Wheeler Transform(BWT)是一种排序技术,当与现有的压缩算法一起使用时,可以显著提高压缩比。本文分析了基于算术编码(AC)和霍夫曼编码的小波变换混合压缩模型在图像压缩中的应用,并对整体压缩进行了改进。
{"title":"Evaluation of Burrows Wheeler Transform based image compression algorithm for multimedia applications","authors":"C. D. Rawat, S. Rao","doi":"10.1109/EIC.2015.7230717","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230717","url":null,"abstract":"Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposed framework for Semantic Web Services 建议的语义Web服务框架
Mudra Doshi, G. Anuradha
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.
语义网能够以计算机容易理解的方式描述事物。语句是使用语法规则构建的,语法规则是构建语言的规则。语义网不是关于页面之间的链接。语义网描述事物之间的关系和属性。将现有网页转换为语义网页有不同的方法。原始版本使用逆向工程方法。逆向工程方法是根据Web服务建模本体(WSMO)指定Web服务。它描述了一个模型驱动的Web服务逆向工程过程,其中Web服务描述(WSDL)被转换为UML模型,然后将UML模型集成到复合Web服务中,最后生成新的Web服务描述,即OWL。另一种方法是使用转换规则编写语义注释Web服务描述语言(SAWSDL)接口文件。所建议的体系结构是上述两个现有体系结构组合的结果。
{"title":"Proposed framework for Semantic Web Services","authors":"Mudra Doshi, G. Anuradha","doi":"10.1109/EIC.2015.7230730","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230730","url":null,"abstract":"A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An information hiding system using 16*16 quantization table 一个使用16*16量化表的信息隐藏系统
Medha Kulkarni
Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.
隐写术用于建立双方之间的安全通信。隐写分析,通过第三方检测隐写是一门相对年轻的学科。隐写分析的艺术和科学,旨在检测隐藏信息,估计隐藏信息的长度,并提取它。隐写分析最近受到了执法部门和媒体的极大关注。因此,许多学者从事这一领域的研究。近年来,JPEG格式作为主要的隐写格式引起了研究人员的关注。JPEG图像在互联网公告板和公共互联网站点上非常丰富。F5是一种基于频域的隐写算法。它具有容量大、鲁棒性好等优点,得到了广泛的应用。它将秘密数据嵌入到量化的JPEG图像的非零DCT系数中。F5算法使用矩阵编码技术来最小化所做的更改数量。使用JHRF算法解除F5嵌入的数据的隐藏。在本文中,一种信息隐藏算法JPEG,使用16 *16像素的非重叠块。通过将秘密信息按规则嵌入到JPEG图像中,JHRF可以处理更大的隐写容量。该方法能有效地处理异常数据,取得较好的处理效果。
{"title":"An information hiding system using 16*16 quantization table","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230740","url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125910600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On constant BER analysis for real time information transmission and adaptive modulation in WiMAX MISO system WiMAX MISO系统实时信息传输和自适应调制的恒误码率分析
Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera
Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.
当今的无线通信系统要求以更高的数据速率共享多媒体信息,并要求持续的连接以实现高效的多媒体信息传输。满足这些要求的可能解决方案之一是自适应调制技术。随着移动用户向基站或接入点移动,用户设备接收到的功率越来越大,因此可以采用具有良好信噪比的高阶调制方案。同时,由于运动引起信噪比的变化,信号质量也会发生变化。因此,服务质量(QoS)也会受到影响。根据信噪比的变化,如果调制方案发生变化,则可以保持恒定的误码率(BER)。本文将自适应调制的概念应用于固定宽带无线接入系统的空中接口中,该系统是一个多天线系统和多载波调制(OFDM)的WiMAX IEEE 802.16模型。我们实现并模拟了实时变化的信噪比(表明运动),同时根据信噪比改变调制方案的模型。结果显示,在高信噪比和低信噪比自适应方案中,不同调制方案的信噪比与误码率图和实时信息(图像)。从信噪比与误码率的关系图中,我们找到了满足目标的常数误码率。
{"title":"On constant BER analysis for real time information transmission and adaptive modulation in WiMAX MISO system","authors":"Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera","doi":"10.1109/EIC.2015.7230699","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230699","url":null,"abstract":"Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microcontroller based temperature and luminosity control system using CAN Bus 基于CAN总线的单片机温度和亮度控制系统
Radhaprasanna Merugu, S. Pai
Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.
工业环境由多个围绕微控制器构建的控制/监控模块组成,这些模块可能不属于同一家族。考虑到在这种情况下不同单片机之间的通信需求,设计了基于CAN总线的单片机温度和亮度控制系统。采用控制器局域网(CAN)协议实现远程通信。它是为支持实时控制系统等应用而开发的。它非常适合许多坚固的应用,如汽车应用。文中介绍了CAN通信的优点和各节点的硬件设计。系统设计为一个主从系统,主从系统设置两个从系统的参数值,从系统相应设置其各自的参数值。在从端有控制动作模块来维持设定值。主从之间的通信通过CAN总线进行。在工业中处理一些参数时,系统的安全性是非常重要的。因此,系统中采用了指纹识别模块。
{"title":"Microcontroller based temperature and luminosity control system using CAN Bus","authors":"Radhaprasanna Merugu, S. Pai","doi":"10.1109/EIC.2015.7230748","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230748","url":null,"abstract":"Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint Recognition and feature extraction using transform domain techniques 基于变换域技术的指纹识别与特征提取
Kavita Tewari, Renu L. Kalakoti
Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.
指纹识别是最古老、最流行的身份识别方法之一。指纹识别主要有两种方法:基于图像的和基于细节的。提出了一种基于图像的指纹识别方法。首先对图像进行核心点检测和预处理,然后利用快速傅立叶变换(FFT)、离散余弦变换(DCT)、离散小波变换(DWT)和Gabor滤波等变换技术进行特征提取。这些特征包括平均能量、标准差和香农熵。在FVC 2002数据库上取得了较好的识别精度。本文对这四种变换进行了比较,发现与DWT和Gabor滤波器相比,DCT和DFT给出了更好的结果。
{"title":"Fingerprint Recognition and feature extraction using transform domain techniques","authors":"Kavita Tewari, Renu L. Kalakoti","doi":"10.1109/EIC.2015.7230719","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230719","url":null,"abstract":"Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An intelligent approach for data fortification in cloud computing 云计算中数据防御的智能方法
Supriya Mandhare, Rajkumar K. Shende
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.
如今,云计算越来越受欢迎。随着云计算的日益普及,我们可以共享信息、资源和数据,也可以存储个人和商业信息。尽管它提供了各种优势,如按需付费、高灵活性、多租户,但随着新的计算和通信范式的出现,数据安全性也出现了挑战。现有的数据保护机制无法防止内部人员或黑客对云提供商进行数据窃取攻击。在这项工作中,提出了四层数据安全性,以提供最高的数据安全性。四层将包括用户认证、用户访问权限、用户数据加密,在最后一层,黑客无法访问比存储在云中的部分更多的信息,因为系统会自动区分文件破坏并分散存储在不同的位置。
{"title":"An intelligent approach for data fortification in cloud computing","authors":"Supriya Mandhare, Rajkumar K. Shende","doi":"10.1109/EIC.2015.7230736","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230736","url":null,"abstract":"Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC-PHY layer optimization for digital video transmission in wireless network 无线网络中数字视频传输的MAC-PHY层优化
Pooja Sangmeshwar Kalshetti, S. Koli
Video transmission over 802.11 wireless networks poses many challenges. Bandwidth demands and timing constraints are two major challenges for real time video transmission over wireless. To increase network throughput as well as overall network capacity, the use of cross layer design approach is required. One of such design approaches includes physical (PHY) and medium access control (MAC) layers considerations and is explored in this paper. This survy paper describes a detailed study of the MAC and PHY layer considerations for good wireless video transmission performance. The ultimate solution for the problem of real time video transmission is to study the different methods of adapting parameters for achieving the delay constraints in real time environment. The best techniques available in literature are studied for adapting the parameters which are suitable for real time video transmission. This study focuses on adaptive retry limit (ARL) parameter for MAC layer and PHY layer parameter like Enhanced Adaptive Forward Error Correction (EnAFEC) for real time video transmission that can be supported by a wireless network. The new scheme for optimizing the wireless network's MAC and PHY layer parameters is proposed in this work.
在802.11无线网络上传输视频带来了许多挑战。带宽需求和时间限制是无线实时视频传输面临的两大挑战。为了提高网络吞吐量和整体网络容量,需要使用跨层设计方法。其中一种设计方法包括物理层(PHY)和介质访问控制层(MAC)的考虑,并在本文中进行了探讨。本文详细研究了MAC层和物理层对无线视频传输性能的影响。实时视频传输问题的最终解决方案是研究实时环境下实现延迟约束的不同参数自适应方法。研究了现有的最佳技术,以适应实时视频传输的参数。本研究重点研究了MAC层的自适应重试限制(ARL)参数和物理层参数,如增强自适应前向纠错(EnAFEC),用于无线网络支持的实时视频传输。提出了一种优化无线网络MAC层和物理层参数的新方案。
{"title":"MAC-PHY layer optimization for digital video transmission in wireless network","authors":"Pooja Sangmeshwar Kalshetti, S. Koli","doi":"10.1109/EIC.2015.7230707","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230707","url":null,"abstract":"Video transmission over 802.11 wireless networks poses many challenges. Bandwidth demands and timing constraints are two major challenges for real time video transmission over wireless. To increase network throughput as well as overall network capacity, the use of cross layer design approach is required. One of such design approaches includes physical (PHY) and medium access control (MAC) layers considerations and is explored in this paper. This survy paper describes a detailed study of the MAC and PHY layer considerations for good wireless video transmission performance. The ultimate solution for the problem of real time video transmission is to study the different methods of adapting parameters for achieving the delay constraints in real time environment. The best techniques available in literature are studied for adapting the parameters which are suitable for real time video transmission. This study focuses on adaptive retry limit (ARL) parameter for MAC layer and PHY layer parameter like Enhanced Adaptive Forward Error Correction (EnAFEC) for real time video transmission that can be supported by a wireless network. The new scheme for optimizing the wireless network's MAC and PHY layer parameters is proposed in this work.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multithreading implementation in a single core TMS320C6713 DSP 多线程在单核TMS320C6713 DSP上的实现
Srividya Rajaraman, Pritam S. Sirpotdar, Abhijeet Wavare, A. Patki
Very Long Instruction Word is an architectural breakthrough in DSP architecture that caters to the real time constraints and efficient algorithm implementation. This paper brings out various loopholes namely latency, underutilization of functional units, use of NOPs and constraints of cross path in register file accessing present in such architecture. This paper proposes a technique to reduce the delay slots present in the pipeline due to NOPs and hence obtain reduction in code size and reduced latency. With the available functional units, thread level parallelism is introduced to enhance existing instruction level parallelism, thus addressing the issue of under utilization of functional units. Aforementioned issues are dealt with by the use of multithreading - concept frequently associated with multi-core DSPs and RTOS. This paper reports a novel technique of introducing a programming discipline in assembly coding to emulate multithreading in a single core DSP without use of OS and reduction in the number of clock cycles required is observed. Code snippets implemented using Code Composer Studio for TMS320C6713 illustrate the concepts.
超长指令字(Very Long Instruction Word)是DSP体系结构中的一个突破,它满足了实时约束和高效算法实现的要求。本文指出了该体系结构存在的各种漏洞,即延迟、功能单元利用率不足、nop的使用以及寄存器文件访问中的交叉路径约束。本文提出了一种技术来减少由于nop而出现在管道中的延迟槽,从而减少代码大小和减少延迟。在现有功能单元的基础上,引入线程级并行来增强现有的指令级并行,从而解决功能单元利用率不足的问题。前面提到的问题是通过使用多线程来解决的,这个概念经常与多核dsp和RTOS相关。本文报道了一种新的技术,在汇编编码中引入编程规则来模拟单核DSP中的多线程,而不使用操作系统,并且观察到所需时钟周期的数量减少。使用TMS320C6713的Code Composer Studio实现的代码片段说明了这些概念。
{"title":"Multithreading implementation in a single core TMS320C6713 DSP","authors":"Srividya Rajaraman, Pritam S. Sirpotdar, Abhijeet Wavare, A. Patki","doi":"10.1109/EIC.2015.7230723","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230723","url":null,"abstract":"Very Long Instruction Word is an architectural breakthrough in DSP architecture that caters to the real time constraints and efficient algorithm implementation. This paper brings out various loopholes namely latency, underutilization of functional units, use of NOPs and constraints of cross path in register file accessing present in such architecture. This paper proposes a technique to reduce the delay slots present in the pipeline due to NOPs and hence obtain reduction in code size and reduced latency. With the available functional units, thread level parallelism is introduced to enhance existing instruction level parallelism, thus addressing the issue of under utilization of functional units. Aforementioned issues are dealt with by the use of multithreading - concept frequently associated with multi-core DSPs and RTOS. This paper reports a novel technique of introducing a programming discipline in assembly coding to emulate multithreading in a single core DSP without use of OS and reduction in the number of clock cycles required is observed. Code snippets implemented using Code Composer Studio for TMS320C6713 illustrate the concepts.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116262437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1