首页 > 最新文献

2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

英文 中文
Distributed Component-Based Crawler for AJAX Applications 用于AJAX应用程序的分布式基于组件的爬虫
Suryanshu Raj, R. Krishna, A. Nayak
Crawling web applications is important for indexing websites as well as for testing vulnerabilities present in the website. The research area of crawling traditional websites has made significant progress and many software suites are available which can carry deep crawls of large traditional websites in limited time. The modern AJAX (asynchronous JavaScript and XML) based websites, however, cannot be crawled by traditional crawlers. The area is open to research and many open-source software suites are being developed. However, the software suites developed so far still face the issues of state space explosion, poor time efficiency and incomplete content coverage. This research work aims to develop a distributed component-based crawler for deterministic AJAX applications to reduce state space explosion, improve time efficiency and provide complete content coverage. It uses a combination of multiple approaches to develop the solution. Firstly, it takes into account a Component-Based approach to reduce state space explosion. It then takes a Distributed-Crawling approach to process the events concurrently in order to improve efficiency. It employs a Breadth First Search (BFS) strategy to provide complete content coverage.
爬行web应用程序对于索引网站以及测试网站中存在的漏洞都很重要。传统网站抓取的研究领域已经取得了很大的进展,已经有很多软件套件可以在有限的时间内对大型传统网站进行深度抓取。然而,现代基于AJAX(异步JavaScript和XML)的网站不能被传统的爬虫抓取。该领域对研究开放,许多开源软件套件正在开发中。但目前开发的软件套件仍面临状态空间爆炸、时间效率差、内容覆盖不全等问题。本研究工作旨在为确定性AJAX应用开发一种基于分布式组件的爬虫,以减少状态空间爆炸,提高时间效率并提供完整的内容覆盖。它结合使用多种方法来开发解决方案。首先,它考虑了基于组件的方法来减少状态空间爆炸。然后,它采用分布式爬行方法并发地处理事件,以提高效率。它采用广度优先搜索(BFS)策略来提供完整的内容覆盖。
{"title":"Distributed Component-Based Crawler for AJAX Applications","authors":"Suryanshu Raj, R. Krishna, A. Nayak","doi":"10.1109/ICAECC.2018.8479454","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479454","url":null,"abstract":"Crawling web applications is important for indexing websites as well as for testing vulnerabilities present in the website. The research area of crawling traditional websites has made significant progress and many software suites are available which can carry deep crawls of large traditional websites in limited time. The modern AJAX (asynchronous JavaScript and XML) based websites, however, cannot be crawled by traditional crawlers. The area is open to research and many open-source software suites are being developed. However, the software suites developed so far still face the issues of state space explosion, poor time efficiency and incomplete content coverage. This research work aims to develop a distributed component-based crawler for deterministic AJAX applications to reduce state space explosion, improve time efficiency and provide complete content coverage. It uses a combination of multiple approaches to develop the solution. Firstly, it takes into account a Component-Based approach to reduce state space explosion. It then takes a Distributed-Crawling approach to process the events concurrently in order to improve efficiency. It employs a Breadth First Search (BFS) strategy to provide complete content coverage.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130033330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Analysis of Two Novel Metamaterial Unit Cell for Antenna Engineering 天线工程用两种新型超材料单体电池的设计与分析
T. Ali, S. B K, R. Biradar
In this research we present a detailed analysis of two metamaterial unit cell through waveguide medium. The first unit cell consists of four G-shaped resonators with split gap and thus named as G-shaped split ring resonator (GSRR). This unit cell exhibit stop-band phenomenon at 3.3GHz. The second unit cell is of Hexagonal shaped with split gaps, and thus named as, hexagonal split-ring resonator (HSRR). This unit cell exhibits stop-band phenomenon at 8.1GHz. Detailed analysis of extraction of medium parameters like permeability and refractive index for both metamaterial unit cells have been discussed in detail.
在本研究中,我们详细分析了两种超材料单元胞通过波导介质的特性。第一个单元胞由4个具有劈裂间隙的g形谐振器组成,因此被命名为g形劈裂环谐振器(GSRR)。该单晶在3.3GHz处表现出阻带现象。第二个单元胞体为六边形,具有劈裂间隙,因此称为六边形劈裂环谐振器(HSRR)。该单晶在8.1GHz处表现出阻带现象。详细分析了两种超材料单晶的介质参数的提取,如磁导率和折射率。
{"title":"Design and Analysis of Two Novel Metamaterial Unit Cell for Antenna Engineering","authors":"T. Ali, S. B K, R. Biradar","doi":"10.1109/ICAECC.2018.8479435","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479435","url":null,"abstract":"In this research we present a detailed analysis of two metamaterial unit cell through waveguide medium. The first unit cell consists of four G-shaped resonators with split gap and thus named as G-shaped split ring resonator (GSRR). This unit cell exhibit stop-band phenomenon at 3.3GHz. The second unit cell is of Hexagonal shaped with split gaps, and thus named as, hexagonal split-ring resonator (HSRR). This unit cell exhibits stop-band phenomenon at 8.1GHz. Detailed analysis of extraction of medium parameters like permeability and refractive index for both metamaterial unit cells have been discussed in detail.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Understanding Microaggregation- A technique of Statistical Disclosure Control for Privacy Preserving and Data Publishing in Inter-Cloud 理解微聚合——云间隐私保护和数据发布的统计披露控制技术
Veena Gadad, S. N
In today’s world organizations outsource their data to cloud to enjoy number of advantages such as location independent data storage, ubiquitous data access and on demand high quality service. Data is collected by many of independent sources as micro data and published for decision making, predictions and to improve research. Outsourcing the data has an important side effect- the privacy of the individuals whose data are being collected and analyzed is at risk. It becomes the responsibility of the data curator i.e., the cloud service provider to preserve the privacy. Statistical Disclosure control or Statistical Disclosure Limitation seeks to alter the original microdata so that the utility of original microdata and modified microdata are at least same. Microaggregation is one of Statistical Disclosure Control methods used to protect the individual identification present in the microdata. This method works by partitioning the microdata into groups called cluster of k records and then replaces the record in each group with the centroid of the group. This paper defines microdata, provides the overview of various existing microaggregation methods for Statistical Disclosure Control. The paper also provides a novel model of microaggregation method in inter-cloud infrastructure.
在当今世界,组织将其数据外包给云,以享受许多优势,如位置独立的数据存储、无处不在的数据访问和按需高质量的服务。数据由许多独立来源作为微数据收集,并发布用于决策、预测和改进研究。外包数据有一个重要的副作用——被收集和分析数据的个人的隐私处于危险之中。数据管理员(即云服务提供商)有责任保护隐私。统计披露控制或统计披露限制试图改变原始微数据,以便原始微数据和修改后的微数据的效用至少相同。微聚合是一种统计披露控制方法,用于保护微数据中存在的个人身份。这种方法的工作原理是将微数据划分为称为k条记录集群的组,然后用该组的质心替换每组中的记录。本文对微数据进行了定义,概述了现有的用于统计披露控制的各种微聚合方法。本文还提出了一种新的云间基础设施微聚合方法模型。
{"title":"Understanding Microaggregation- A technique of Statistical Disclosure Control for Privacy Preserving and Data Publishing in Inter-Cloud","authors":"Veena Gadad, S. N","doi":"10.1109/ICAECC.2018.8479452","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479452","url":null,"abstract":"In today’s world organizations outsource their data to cloud to enjoy number of advantages such as location independent data storage, ubiquitous data access and on demand high quality service. Data is collected by many of independent sources as micro data and published for decision making, predictions and to improve research. Outsourcing the data has an important side effect- the privacy of the individuals whose data are being collected and analyzed is at risk. It becomes the responsibility of the data curator i.e., the cloud service provider to preserve the privacy. Statistical Disclosure control or Statistical Disclosure Limitation seeks to alter the original microdata so that the utility of original microdata and modified microdata are at least same. Microaggregation is one of Statistical Disclosure Control methods used to protect the individual identification present in the microdata. This method works by partitioning the microdata into groups called cluster of k records and then replaces the record in each group with the centroid of the group. This paper defines microdata, provides the overview of various existing microaggregation methods for Statistical Disclosure Control. The paper also provides a novel model of microaggregation method in inter-cloud infrastructure.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Texture Analysis of Brain Mr Images 脑磁共振图像的纹理分析
H. R. Vanamala, Deeksha Nandur, C. Ashutosh, F. Glavan, M. Ganesh
This proposed work is the method to perform texture analysis of human brain MR image and to provide a method for decision making using MATLAB tool in medical field. Hospitals throughout the world are witnessing huge volumes of digital medical images and associated clinical data on a daily basis. The number of people available in the hospitals to analyze and take decisions are very less when compared to images that need to be analyzed by these experts and hence automation of this process is necessary. We have implemented a system for automatic segmentation and extraction of different texture features of human brain images. SVM is used for classification and K-fold validation is performed.
本文提出的工作是对人脑MR图像进行纹理分析的方法,为医学领域使用MATLAB工具进行决策提供一种方法。世界各地的医院每天都会看到大量的数字医学图像和相关的临床数据。与这些专家需要分析的图像相比,医院中可供分析和决策的人员数量非常少,因此这一过程的自动化是必要的。本文实现了一种对人脑图像的不同纹理特征进行自动分割和提取的系统。使用支持向量机进行分类,并进行K-fold验证。
{"title":"Texture Analysis of Brain Mr Images","authors":"H. R. Vanamala, Deeksha Nandur, C. Ashutosh, F. Glavan, M. Ganesh","doi":"10.1109/ICAECC.2018.8479530","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479530","url":null,"abstract":"This proposed work is the method to perform texture analysis of human brain MR image and to provide a method for decision making using MATLAB tool in medical field. Hospitals throughout the world are witnessing huge volumes of digital medical images and associated clinical data on a daily basis. The number of people available in the hospitals to analyze and take decisions are very less when compared to images that need to be analyzed by these experts and hence automation of this process is necessary. We have implemented a system for automatic segmentation and extraction of different texture features of human brain images. SVM is used for classification and K-fold validation is performed.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Ransomware using GURLS 使用GURLS检测勒索软件
N. Harikrishnan, K. Soman
Ransomware is a malware, which upon execution scrambles the framework and it denies the client from accessing the data until the point when a payoff sum is not met from the victim. Recently, this kind of malware has shown a massive growth and had affected nearly 100 nations around the globe. In this paper we propose GURLS (Grand Unified Regularized Least Square) based approach to detect ransomware and classify it into different categories. The features used for training and testing are application programming interface (API) invocations and strings. This paper compares the performance of each of these features for classification and the effectiveness of RBF Kernel. The results obtained shows that using RBF kernel gives better accuracy.
勒索软件是一种恶意软件,它在执行时扰乱框架,并拒绝客户端访问数据,直到受害者不满足支付金额。最近,这种恶意软件出现了大规模的增长,并影响了全球近100个国家。本文提出了基于GURLS (Grand Unified regularization Least Square)的勒索软件检测方法,并对其进行分类。用于培训和测试的特性是应用程序编程接口(API)调用和字符串。本文比较了这些特征的分类性能和RBF核函数的分类效率。实验结果表明,使用RBF核具有更好的准确率。
{"title":"Detecting Ransomware using GURLS","authors":"N. Harikrishnan, K. Soman","doi":"10.1109/ICAECC.2018.8479444","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479444","url":null,"abstract":"Ransomware is a malware, which upon execution scrambles the framework and it denies the client from accessing the data until the point when a payoff sum is not met from the victim. Recently, this kind of malware has shown a massive growth and had affected nearly 100 nations around the globe. In this paper we propose GURLS (Grand Unified Regularized Least Square) based approach to detect ransomware and classify it into different categories. The features used for training and testing are application programming interface (API) invocations and strings. This paper compares the performance of each of these features for classification and the effectiveness of RBF Kernel. The results obtained shows that using RBF kernel gives better accuracy.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129662413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Performance Analysis Of Integrated Antenna With LNA For Air Bound Tracking 基于LNA的空中跟踪集成天线设计与性能分析
Gadi Anvesh, M. Jayakumar
A high gain and best matching antenna integrated low noise amplifier is designed using CMOS 65nm technology is reported. The purpose of designing a prototype for an integrated antenna with LNA is to provide the best receiving of data without path loss in air bound tracking and proceed throughout the receiver stage. A single stage cascode topology is adopted for LNA to achieve a higher gain in c-band applications generally. A quarter wave impedance transformer technique was used for microstrip antenna to achieve best matching. Combined with cascode topology an L-based tuning network is developed to achieve the band of frequency range. The designed LNA achieves the high power gain of 26dB and a constant noise figure of 1. 3db. The antenna achieved best matching of -44dB with a moderate gain of 4dB which is amplified by the proposed LNA.
报道了一种采用CMOS 65nm工艺设计的高增益最佳匹配天线集成低噪声放大器。设计LNA集成天线原型的目的是为了在空中跟踪和整个接收阶段提供最佳的无路径损失的数据接收。在c波段的应用中,LNA通常采用单级级联码拓扑来获得更高的增益。微带天线采用四分之一波阻抗变压器技术实现最佳匹配。结合级联码拓扑结构,提出了一种基于l的调谐网络,以实现频带范围。所设计的LNA实现了26dB的高功率增益和1的恒定噪声系数。3 db。该天线以4dB的中等增益实现了-44dB的最佳匹配,该增益被所提出的LNA放大。
{"title":"Design and Performance Analysis Of Integrated Antenna With LNA For Air Bound Tracking","authors":"Gadi Anvesh, M. Jayakumar","doi":"10.1109/ICAECC.2018.8479430","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479430","url":null,"abstract":"A high gain and best matching antenna integrated low noise amplifier is designed using CMOS 65nm technology is reported. The purpose of designing a prototype for an integrated antenna with LNA is to provide the best receiving of data without path loss in air bound tracking and proceed throughout the receiver stage. A single stage cascode topology is adopted for LNA to achieve a higher gain in c-band applications generally. A quarter wave impedance transformer technique was used for microstrip antenna to achieve best matching. Combined with cascode topology an L-based tuning network is developed to achieve the band of frequency range. The designed LNA achieves the high power gain of 26dB and a constant noise figure of 1. 3db. The antenna achieved best matching of -44dB with a moderate gain of 4dB which is amplified by the proposed LNA.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130502825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Li-Fi Based Automatic Traffic Signal Control for Emergency Vehicles 基于Li-Fi的应急车辆自动交通信号控制
Shanmughasundaram, Prasanna Vadanan, Vivek Dharmarajan
India is one of the fastest developing country in the world. One of the disadvantages of this unprecedented growth is the ineffective traffic management. Light Fidelity (Li-Fi) is a form of bi-directional Visible Light Communication (VLC) in which light is modulated at speeds greater than a human eye can follow. Li-Fi can be used to implement Vehicle to Vehicle (V2V) communication as it has many advantages over other communication protocols. One of the main advantages of Li-Fi is that it provides connectivity within a very large area with more security and higher data rates. Emergency vehicles such as Ambulances, Firefighting trucks, Police vehicles etc. can propagate faster through traffic-dense roads using Li-Fi based V2V communication system. In this paper, a V2V communication system is proposed in which the headlight and tail light of a vehicle are made as Li-Fi transmitter and Li-Fi receiver respectively. Using the proposed system, when a traffic signal receives an alert regarding an emergency vehicle, the traffic signal would immediately turn green. Thus, decreasing the waiting time of emergency vehicles in traffic dense lanes. The proposed system was designed, implemented and tested for its operation.
印度是世界上发展最快的国家之一。这种空前增长的缺点之一是低效的交通管理。光保真度(Li-Fi)是双向可见光通信(VLC)的一种形式,其中光以比人眼所能跟随的速度更快的速度调制。Li-Fi可以用于实现车对车(V2V)通信,因为它比其他通信协议有许多优点。Li-Fi的主要优点之一是它可以在非常大的区域内提供连接,具有更高的安全性和更高的数据速率。使用基于Li-Fi的V2V通信系统,救护车、消防车、警车等紧急车辆可以更快地通过交通密集的道路。本文提出了一种将车辆前灯和尾灯分别作为Li-Fi发射器和Li-Fi接收器的V2V通信系统。使用该系统,当交通信号收到有关紧急车辆的警报时,交通信号将立即变为绿色。从而减少了应急车辆在交通密集车道上的等待时间。系统的设计、实施和运行测试均已完成。
{"title":"Li-Fi Based Automatic Traffic Signal Control for Emergency Vehicles","authors":"Shanmughasundaram, Prasanna Vadanan, Vivek Dharmarajan","doi":"10.1109/ICAECC.2018.8479427","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479427","url":null,"abstract":"India is one of the fastest developing country in the world. One of the disadvantages of this unprecedented growth is the ineffective traffic management. Light Fidelity (Li-Fi) is a form of bi-directional Visible Light Communication (VLC) in which light is modulated at speeds greater than a human eye can follow. Li-Fi can be used to implement Vehicle to Vehicle (V2V) communication as it has many advantages over other communication protocols. One of the main advantages of Li-Fi is that it provides connectivity within a very large area with more security and higher data rates. Emergency vehicles such as Ambulances, Firefighting trucks, Police vehicles etc. can propagate faster through traffic-dense roads using Li-Fi based V2V communication system. In this paper, a V2V communication system is proposed in which the headlight and tail light of a vehicle are made as Li-Fi transmitter and Li-Fi receiver respectively. Using the proposed system, when a traffic signal receives an alert regarding an emergency vehicle, the traffic signal would immediately turn green. Thus, decreasing the waiting time of emergency vehicles in traffic dense lanes. The proposed system was designed, implemented and tested for its operation.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123611295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach 基于概率方法的水下无线传感器网络安全定位
M. Shanthi, D. Anvekar
The Underwater Wireless Sensor Network (UWSN) is a special class of Wireless Sensor Network (WSN), which is basically deployed inside water bodies for performing the required sensing tasks. Unlike WSN, identifying the location information of the different sensor nodes is a challenging task, mainly due to the signal problems associated with the water medium. Node Localization refers to identifying or estimating the location co-ordinates of the required sensor nodes. Many effective node localization techniques have been proposed in the literature. A new challenge has emerged related to security of the node localization technique, wherein, intruder or compromised sensor nodes provide faulty information for the node localization process. This specialized attack can result in improper node localization, and may result in network disconnection. Currently, effective solution to address this problem in the literature is still lacking. In this work, a secure localization framework based on probabilistic model is presented. This proposed localization framework, substantially outperforms the contemporary framework in-terms of security effectiveness when demonstrated empirically.
水下无线传感器网络(UWSN)是一类特殊的无线传感器网络(WSN),它基本上部署在水体内部,执行所需的传感任务。与WSN不同,识别不同传感器节点的位置信息是一项具有挑战性的任务,主要是由于与水介质相关的信号问题。节点定位是指识别或估计所需传感器节点的位置坐标。文献中提出了许多有效的节点定位技术。在节点定位技术的安全性方面出现了新的挑战,其中入侵者或受损的传感器节点为节点定位过程提供了错误的信息。这种专门的攻击可能导致节点定位不正确,并可能导致网络中断。目前,文献中还缺乏针对这一问题的有效解决方案。本文提出了一种基于概率模型的安全定位框架。经过实证证明,该建议的本地化框架在安全有效性方面大大优于当前框架。
{"title":"Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach","authors":"M. Shanthi, D. Anvekar","doi":"10.1109/ICAECC.2018.8479451","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479451","url":null,"abstract":"The Underwater Wireless Sensor Network (UWSN) is a special class of Wireless Sensor Network (WSN), which is basically deployed inside water bodies for performing the required sensing tasks. Unlike WSN, identifying the location information of the different sensor nodes is a challenging task, mainly due to the signal problems associated with the water medium. Node Localization refers to identifying or estimating the location co-ordinates of the required sensor nodes. Many effective node localization techniques have been proposed in the literature. A new challenge has emerged related to security of the node localization technique, wherein, intruder or compromised sensor nodes provide faulty information for the node localization process. This specialized attack can result in improper node localization, and may result in network disconnection. Currently, effective solution to address this problem in the literature is still lacking. In this work, a secure localization framework based on probabilistic model is presented. This proposed localization framework, substantially outperforms the contemporary framework in-terms of security effectiveness when demonstrated empirically.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cartilage Segmentation of Knee OsteoArthritis From Magnetic Resonance Images(MRI) 膝关节骨性关节炎的MRI软骨分割
R. A, Dr. Ganga Holi
Human Knee joint is one of the commonly offended components of the human motion system. This paper, presents a segmentation method that segments the cartilage from magnetic resonance (MR) image of knee. We implement two process of segmentation here one after the other that is the amount of the morphological operations at the final segmentation process. Qualitatively, outcome obtained in this work show fine performance as the method is capable of segmenting cartilage area. The overall performance of developed method was evaluated by comparing obtained results with the manual segmented cartilage.
膝关节是人体运动系统中最容易受到伤害的部位之一。本文提出了一种从膝关节磁共振图像中分割软骨的方法。我们在这里一个接一个地实现了两个分割过程,这是在最后的分割过程中形态学操作的数量。定性地说,由于该方法能够分割软骨区域,本工作的结果显示出良好的性能。通过将获得的结果与手工分割软骨的结果进行比较,评估了所开发方法的总体性能。
{"title":"Cartilage Segmentation of Knee OsteoArthritis From Magnetic Resonance Images(MRI)","authors":"R. A, Dr. Ganga Holi","doi":"10.1109/ICAECC.2018.8479529","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479529","url":null,"abstract":"Human Knee joint is one of the commonly offended components of the human motion system. This paper, presents a segmentation method that segments the cartilage from magnetic resonance (MR) image of knee. We implement two process of segmentation here one after the other that is the amount of the morphological operations at the final segmentation process. Qualitatively, outcome obtained in this work show fine performance as the method is capable of segmenting cartilage area. The overall performance of developed method was evaluated by comparing obtained results with the manual segmented cartilage.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparitive study on the performance of circular patch antenna using low cost substrate for S-band applications s波段低成本基板圆形贴片天线性能比较研究
A. Javali, Laxmi Sharma, Richa Tengshe, Sutapa Sarkar
This paper focusses on comparison of the performance of Circular Microstrip Patch Antenna(CMPA) in S-band between CMPA with soil as substrate and CMPA with RT/Duroid 5880 as substrate. RT/Duroid 5880 is commonly used in the fabrication of Microstrip Patch Antennas (MPA) due to its low electrical loss, low dielectric loss, low moisture absorption etc. However, it is costly. This work tries to prove that soil substrate can be one of the contenders in the future to replace RT/Duroid 5880. The simulation is carried out in Computational Electromagnetic Software FEKO (suite 7.0). The paper concludes by stating that soil substrate being economical can be a potential candidate to replace RT/Duroid 5880 as there is very little to minimal change in key parameters such as bandwidth (a difference of 14.07 MHz), gain (a difference of 0.18 dBi) and directivity (a difference of 0.41 dBi) when the simulation results are compared.
本文研究了以土壤为基片的圆形微带贴片天线(CMPA)和以RT/Duroid 5880为基片的圆形微带贴片天线(CMPA)在s波段的性能。RT/Duroid 5880由于具有低电损耗、低介电损耗、低吸湿性等特点,被广泛用于微带贴片天线(MPA)的制造。然而,这是昂贵的。本工作试图证明土壤基质可以成为未来替代RT/Duroid 5880的竞争者之一。仿真在计算电磁软件FEKO (suite 7.0)中进行。本文的结论是,经济的土壤基质可以成为替代RT/Duroid 5880的潜在候选者,因为在模拟结果比较时,带宽(差异14.07 MHz),增益(差异0.18 dBi)和指向性(差异0.41 dBi)等关键参数的变化很小或极小。
{"title":"A comparitive study on the performance of circular patch antenna using low cost substrate for S-band applications","authors":"A. Javali, Laxmi Sharma, Richa Tengshe, Sutapa Sarkar","doi":"10.1109/ICAECC.2018.8479475","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479475","url":null,"abstract":"This paper focusses on comparison of the performance of Circular Microstrip Patch Antenna(CMPA) in S-band between CMPA with soil as substrate and CMPA with RT/Duroid 5880 as substrate. RT/Duroid 5880 is commonly used in the fabrication of Microstrip Patch Antennas (MPA) due to its low electrical loss, low dielectric loss, low moisture absorption etc. However, it is costly. This work tries to prove that soil substrate can be one of the contenders in the future to replace RT/Duroid 5880. The simulation is carried out in Computational Electromagnetic Software FEKO (suite 7.0). The paper concludes by stating that soil substrate being economical can be a potential candidate to replace RT/Duroid 5880 as there is very little to minimal change in key parameters such as bandwidth (a difference of 14.07 MHz), gain (a difference of 0.18 dBi) and directivity (a difference of 0.41 dBi) when the simulation results are compared.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132796777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1