首页 > 最新文献

2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)最新文献

英文 中文
Nonlinearity effect of high power amplifiers in communication systems 通信系统中大功率放大器的非线性效应
Shatrughna Prasad Yadav, S. Bera
Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.
功率放大器(PA)是通信系统中一个非常重要的部件,它消耗的能量占通信系统总能量的很大一部分,而且大部分是非线性的。PA效率与其线性度呈反比关系。从效率的角度来看,非线性PAs是可取的。为提高效率所付出的代价是频谱的增长和相邻信道的干扰。它还会引起带内失真,从而降低误码率(BER)性能。传输系统,如正交频分复用(OFDM),具有容忍符号间干扰和良好的频谱效率,但受制于功率放大器的非线性,由于其峰值平均功率比(PAPR),这是由于其信号包络的大波动。为了减少光谱的再生长和降低误码率,需要对PA进行线性化处理。本文提出了峰值裁剪、随机相移、选择映射(SLM)和虚拟序列插入(DSI)等方法来降低峰值比,从而降低非线性的影响,提高波谱效率和能量效率。
{"title":"Nonlinearity effect of high power amplifiers in communication systems","authors":"Shatrughna Prasad Yadav, S. Bera","doi":"10.1109/EIC.2015.7230741","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230741","url":null,"abstract":"Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of Burrows Wheeler Transform based image compression algorithm for multimedia applications 基于Burrows Wheeler变换的多媒体图像压缩算法评价
C. D. Rawat, S. Rao
Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.
压缩是一种在不过度降低数据质量的情况下减少数据量的技术。压缩后的多媒体数据的传输和存储比原始的未压缩数据更快、更高效。多媒体数据压缩,尤其是图像压缩,有各种各样的技术和标准。它们要么是无损技术,要么是有损技术。算术和霍夫曼编码是两种广泛使用的无损压缩技术。Burrows Wheeler Transform(BWT)是一种排序技术,当与现有的压缩算法一起使用时,可以显著提高压缩比。本文分析了基于算术编码(AC)和霍夫曼编码的小波变换混合压缩模型在图像压缩中的应用,并对整体压缩进行了改进。
{"title":"Evaluation of Burrows Wheeler Transform based image compression algorithm for multimedia applications","authors":"C. D. Rawat, S. Rao","doi":"10.1109/EIC.2015.7230717","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230717","url":null,"abstract":"Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposed framework for Semantic Web Services 建议的语义Web服务框架
Mudra Doshi, G. Anuradha
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.
语义网能够以计算机容易理解的方式描述事物。语句是使用语法规则构建的,语法规则是构建语言的规则。语义网不是关于页面之间的链接。语义网描述事物之间的关系和属性。将现有网页转换为语义网页有不同的方法。原始版本使用逆向工程方法。逆向工程方法是根据Web服务建模本体(WSMO)指定Web服务。它描述了一个模型驱动的Web服务逆向工程过程,其中Web服务描述(WSDL)被转换为UML模型,然后将UML模型集成到复合Web服务中,最后生成新的Web服务描述,即OWL。另一种方法是使用转换规则编写语义注释Web服务描述语言(SAWSDL)接口文件。所建议的体系结构是上述两个现有体系结构组合的结果。
{"title":"Proposed framework for Semantic Web Services","authors":"Mudra Doshi, G. Anuradha","doi":"10.1109/EIC.2015.7230730","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230730","url":null,"abstract":"A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An information hiding system using 16*16 quantization table 一个使用16*16量化表的信息隐藏系统
Medha Kulkarni
Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.
隐写术用于建立双方之间的安全通信。隐写分析,通过第三方检测隐写是一门相对年轻的学科。隐写分析的艺术和科学,旨在检测隐藏信息,估计隐藏信息的长度,并提取它。隐写分析最近受到了执法部门和媒体的极大关注。因此,许多学者从事这一领域的研究。近年来,JPEG格式作为主要的隐写格式引起了研究人员的关注。JPEG图像在互联网公告板和公共互联网站点上非常丰富。F5是一种基于频域的隐写算法。它具有容量大、鲁棒性好等优点,得到了广泛的应用。它将秘密数据嵌入到量化的JPEG图像的非零DCT系数中。F5算法使用矩阵编码技术来最小化所做的更改数量。使用JHRF算法解除F5嵌入的数据的隐藏。在本文中,一种信息隐藏算法JPEG,使用16 *16像素的非重叠块。通过将秘密信息按规则嵌入到JPEG图像中,JHRF可以处理更大的隐写容量。该方法能有效地处理异常数据,取得较好的处理效果。
{"title":"An information hiding system using 16*16 quantization table","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230740","url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125910600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On constant BER analysis for real time information transmission and adaptive modulation in WiMAX MISO system WiMAX MISO系统实时信息传输和自适应调制的恒误码率分析
Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera
Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.
当今的无线通信系统要求以更高的数据速率共享多媒体信息,并要求持续的连接以实现高效的多媒体信息传输。满足这些要求的可能解决方案之一是自适应调制技术。随着移动用户向基站或接入点移动,用户设备接收到的功率越来越大,因此可以采用具有良好信噪比的高阶调制方案。同时,由于运动引起信噪比的变化,信号质量也会发生变化。因此,服务质量(QoS)也会受到影响。根据信噪比的变化,如果调制方案发生变化,则可以保持恒定的误码率(BER)。本文将自适应调制的概念应用于固定宽带无线接入系统的空中接口中,该系统是一个多天线系统和多载波调制(OFDM)的WiMAX IEEE 802.16模型。我们实现并模拟了实时变化的信噪比(表明运动),同时根据信噪比改变调制方案的模型。结果显示,在高信噪比和低信噪比自适应方案中,不同调制方案的信噪比与误码率图和实时信息(图像)。从信噪比与误码率的关系图中,我们找到了满足目标的常数误码率。
{"title":"On constant BER analysis for real time information transmission and adaptive modulation in WiMAX MISO system","authors":"Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera","doi":"10.1109/EIC.2015.7230699","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230699","url":null,"abstract":"Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microcontroller based temperature and luminosity control system using CAN Bus 基于CAN总线的单片机温度和亮度控制系统
Radhaprasanna Merugu, S. Pai
Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.
工业环境由多个围绕微控制器构建的控制/监控模块组成,这些模块可能不属于同一家族。考虑到在这种情况下不同单片机之间的通信需求,设计了基于CAN总线的单片机温度和亮度控制系统。采用控制器局域网(CAN)协议实现远程通信。它是为支持实时控制系统等应用而开发的。它非常适合许多坚固的应用,如汽车应用。文中介绍了CAN通信的优点和各节点的硬件设计。系统设计为一个主从系统,主从系统设置两个从系统的参数值,从系统相应设置其各自的参数值。在从端有控制动作模块来维持设定值。主从之间的通信通过CAN总线进行。在工业中处理一些参数时,系统的安全性是非常重要的。因此,系统中采用了指纹识别模块。
{"title":"Microcontroller based temperature and luminosity control system using CAN Bus","authors":"Radhaprasanna Merugu, S. Pai","doi":"10.1109/EIC.2015.7230748","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230748","url":null,"abstract":"Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint Recognition and feature extraction using transform domain techniques 基于变换域技术的指纹识别与特征提取
Kavita Tewari, Renu L. Kalakoti
Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.
指纹识别是最古老、最流行的身份识别方法之一。指纹识别主要有两种方法:基于图像的和基于细节的。提出了一种基于图像的指纹识别方法。首先对图像进行核心点检测和预处理,然后利用快速傅立叶变换(FFT)、离散余弦变换(DCT)、离散小波变换(DWT)和Gabor滤波等变换技术进行特征提取。这些特征包括平均能量、标准差和香农熵。在FVC 2002数据库上取得了较好的识别精度。本文对这四种变换进行了比较,发现与DWT和Gabor滤波器相比,DCT和DFT给出了更好的结果。
{"title":"Fingerprint Recognition and feature extraction using transform domain techniques","authors":"Kavita Tewari, Renu L. Kalakoti","doi":"10.1109/EIC.2015.7230719","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230719","url":null,"abstract":"Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Novel approach to save energy through OSPF routing protocol 利用OSPF路由协议实现节能的新方法
Madhuri M. Dharanguttikar, S. Pingat
Now a days as compare to power resources power demand grows and energy cost is also increasing at constant rate. To reduce power consumption in entire network infrastructure lots of research developed. In this approach the solution to save energy is explain. In this approach Energy Saving IP Routing strategy is define. ESIR strategy work with Open Shortest Path First protocol. This strategy is useful for Internet Service Provider (ISP) backbone network. This strategy finds the shortest path between neighboring routers by using SPT exportation mechanism. Another mechanism defines in this approach which is known as Maximum Set of Compatible Moves. This approach saves the energy by using all this above mechanism and also with the help of putting the node in sleep mode instead of completely removing such node. This strategy provides energy solution with quality of services (QoS). The proposed system implement algorithm to switch off the link according to traffic variation.
如今,与电力资源相比,电力需求不断增长,能源成本也在以恒定的速度增长。为了降低整个网络基础设施的功耗,人们进行了大量的研究。在此基础上阐述了节能的解决方案。该方法定义了节能IP路由策略。ESIR策略适用于开放最短路径优先协议。该策略对互联网服务提供商(ISP)骨干网非常有用。该策略通过SPT导出机制找到相邻路由器之间的最短路径。在这种方法中定义了另一种机制,即所谓的最大兼容移动集。这种方法通过使用上述所有机制来节省能量,并且借助将节点置于休眠模式而不是完全删除该节点。该策略提供了具有服务质量(QoS)的能源解决方案。该系统实现了根据流量变化切断链路的算法。
{"title":"Novel approach to save energy through OSPF routing protocol","authors":"Madhuri M. Dharanguttikar, S. Pingat","doi":"10.1109/EIC.2015.7230709","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230709","url":null,"abstract":"Now a days as compare to power resources power demand grows and energy cost is also increasing at constant rate. To reduce power consumption in entire network infrastructure lots of research developed. In this approach the solution to save energy is explain. In this approach Energy Saving IP Routing strategy is define. ESIR strategy work with Open Shortest Path First protocol. This strategy is useful for Internet Service Provider (ISP) backbone network. This strategy finds the shortest path between neighboring routers by using SPT exportation mechanism. Another mechanism defines in this approach which is known as Maximum Set of Compatible Moves. This approach saves the energy by using all this above mechanism and also with the help of putting the node in sleep mode instead of completely removing such node. This strategy provides energy solution with quality of services (QoS). The proposed system implement algorithm to switch off the link according to traffic variation.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128215682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance improvement by post-amplifying upstream/downstream signal in WDM passive optical network 波分复用无源光网络中上行/下行信号后放大的性能改进
Vivek Kachhatiya, S. Prince
We simulated the wavelength division multiplexing passive optical network (WDM-PON) prototype with 16 pair of wavelengths. 16 downstream wavelength multiplexed to down streaming 40Gb/s data from optical line terminal (OLT) to optical network unit (ONU) via 1:16 splitter at the remote node (RN). 16 upstream wavelength are combined at RN from ONU's and forwarded to the OLT. Amplifier section is placed only at the OLT side hence it pre-amplifying downstream signal and post-amplifying upstream signal. Upstream and downstream results are investigated and analyzed using simulated analyzer and it is found that upstream has better bit error rate (BER) and quality factor (Q-Factor) than the downstream signal.
仿真了具有16对波长的波分复用无源光网络原型。16个下行波长复用,通过远端节点(RN)的1:16分路器将40Gb/s的数据从光线路终端(OLT)传输到光网络单元(ONU)。16个上游波长从ONU’s合并到RN,转发到OLT。放大器部分仅放置在OLT侧,因此它对下游信号进行预放大,对上游信号进行后放大。利用仿真分析仪对上游和下游的结果进行了研究和分析,发现上游信号的误码率(BER)和质量因子(Q-Factor)优于下游信号。
{"title":"Performance improvement by post-amplifying upstream/downstream signal in WDM passive optical network","authors":"Vivek Kachhatiya, S. Prince","doi":"10.1109/EIC.2015.7230708","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230708","url":null,"abstract":"We simulated the wavelength division multiplexing passive optical network (WDM-PON) prototype with 16 pair of wavelengths. 16 downstream wavelength multiplexed to down streaming 40Gb/s data from optical line terminal (OLT) to optical network unit (ONU) via 1:16 splitter at the remote node (RN). 16 upstream wavelength are combined at RN from ONU's and forwarded to the OLT. Amplifier section is placed only at the OLT side hence it pre-amplifying downstream signal and post-amplifying upstream signal. Upstream and downstream results are investigated and analyzed using simulated analyzer and it is found that upstream has better bit error rate (BER) and quality factor (Q-Factor) than the downstream signal.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An intelligent approach for data fortification in cloud computing 云计算中数据防御的智能方法
Supriya Mandhare, Rajkumar K. Shende
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.
如今,云计算越来越受欢迎。随着云计算的日益普及,我们可以共享信息、资源和数据,也可以存储个人和商业信息。尽管它提供了各种优势,如按需付费、高灵活性、多租户,但随着新的计算和通信范式的出现,数据安全性也出现了挑战。现有的数据保护机制无法防止内部人员或黑客对云提供商进行数据窃取攻击。在这项工作中,提出了四层数据安全性,以提供最高的数据安全性。四层将包括用户认证、用户访问权限、用户数据加密,在最后一层,黑客无法访问比存储在云中的部分更多的信息,因为系统会自动区分文件破坏并分散存储在不同的位置。
{"title":"An intelligent approach for data fortification in cloud computing","authors":"Supriya Mandhare, Rajkumar K. Shende","doi":"10.1109/EIC.2015.7230736","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230736","url":null,"abstract":"Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1