首页 > 最新文献

2015 Communication, Control and Intelligent Systems (CCIS)最新文献

英文 中文
A reconfigurable antenna with multiband characteristics for GPS and mobile communication 一种用于GPS和移动通信的具有多波段特性的可重构天线
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437877
Rachana Yadav, S. Yadav, S. Yadav
A simple Coaxial-fed antenna with frequency-band reconfigurable characteristics is presented here. This proposed antenna consists of a modified patch structure with annular-ring slots etched on it. In order to generate frequency reconfigurable characteristics different combination of ON/OFF states PIN diodes are used. These diodes are situated as switches in curve type slots. Antenna is operable in three modes on the basis of combination of ON/OFF states of the switches. This antenna is able to maintain a return loss below -10 dB for the GPS L5 Band (1.164 GHz to 1.189 GHz) exactly and 2.6 GHz for mobile broadband.
本文提出了一种具有频带可重构特性的简单同轴馈电天线。该天线由一种改进的贴片结构组成,并在其上蚀刻环形槽。为了产生频率可重构特性,使用了不同的ON/OFF状态组合PIN二极管。这些二极管位于曲线型槽中的开关。基于开关的开/关状态组合,天线可在三种模式下工作。该天线能够在GPS L5频段(1.164 GHz至1.189 GHz)和2.6 GHz移动宽带中保持低于-10 dB的回波损耗。
{"title":"A reconfigurable antenna with multiband characteristics for GPS and mobile communication","authors":"Rachana Yadav, S. Yadav, S. Yadav","doi":"10.1109/CCINTELS.2015.7437877","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437877","url":null,"abstract":"A simple Coaxial-fed antenna with frequency-band reconfigurable characteristics is presented here. This proposed antenna consists of a modified patch structure with annular-ring slots etched on it. In order to generate frequency reconfigurable characteristics different combination of ON/OFF states PIN diodes are used. These diodes are situated as switches in curve type slots. Antenna is operable in three modes on the basis of combination of ON/OFF states of the switches. This antenna is able to maintain a return loss below -10 dB for the GPS L5 Band (1.164 GHz to 1.189 GHz) exactly and 2.6 GHz for mobile broadband.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Koch fractal antenna using right angled isosceles triangular microstrip patch antenna structure for WiMAX 科赫分形天线采用直角等腰三角形微带贴片天线结构用于WiMAX
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437875
Manisha Gupta, Vinita Mathur
A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.
提出了一种适用于WLAN和WiMAX操作的双频cpw馈电Koch分形天线。利用自相似特性,增大直角等腰三角形贴片的周长,设计了天线。所提出的天线由50Ω微带线馈电,并在尺寸为40 (L) × 40 (W) × 1.59(H) mm3的低成本FR4基板上制造。该天线显示出可接受的增益,在无线应用的频段内具有几乎全向的辐射方向图。在二次迭代中,为了获得更好的增益,引入了接地缺陷。
{"title":"Koch fractal antenna using right angled isosceles triangular microstrip patch antenna structure for WiMAX","authors":"Manisha Gupta, Vinita Mathur","doi":"10.1109/CCINTELS.2015.7437875","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437875","url":null,"abstract":"A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and localization of event sources in WSN using binary data in fault tolerant way 基于二进制数据的WSN事件源容错识别与定位
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437892
Chinmay Gordey, V. Deshmukh
This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.
本文研究了传感器网络中事件源的识别和定位问题。在实际应用中,由于无线传感器(即传感器节点)的许多限制(如短距离通信、短距离传感、非常短的存储空间和有限的计算能力),定位是一项具有挑战性的任务。我们提出了一种方法,通过它可以使本地化任务更容易。该方法利用传感器节点的二元观测值,将事件源的位置告知汇聚节点。此外,系统应该在存在故障的情况下运行。这被称为容错。无线传感器网络(WSN)的可靠性受到干扰、软硬件缺陷、生态恶劣条件等多种因素可能导致的故障的影响。本文提出的系统在有故障存在的情况下也能很好地工作,因为我们在定位阶段开始时就对故障进行了屏蔽。
{"title":"Identification and localization of event sources in WSN using binary data in fault tolerant way","authors":"Chinmay Gordey, V. Deshmukh","doi":"10.1109/CCINTELS.2015.7437892","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437892","url":null,"abstract":"This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering of robotic environment using image data stream 基于图像数据流的机器人环境聚类
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437910
Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan
Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.
移动机器人被用于各种应用,如航天飞机、智能家庭安全、军事应用或其他面向服务的应用,这些应用的人为干预是有限的。机器人必须通过分析数据来了解环境,以便在给定的环境中采取适当的行动。大多数从机器人上的传感器收集的数据是巨大的和连续的,使得不可能将所有数据存储在主存储器中,因此只允许一次扫描数据。传统的聚类算法(如k-means)需要对数据进行多次扫描,因此无法在这种环境下使用。本文对Stream k++的实现进行了实验研究。Stream k++是一种数据流聚类算法,可以在各种条件下在内存限制下有效地聚类这些时间序列机器人图像数据。从进行的各种实验中获得了令人满意的结果。
{"title":"Clustering of robotic environment using image data stream","authors":"Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan","doi":"10.1109/CCINTELS.2015.7437910","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437910","url":null,"abstract":"Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Probabilistic secret sharing scheme for binary images 二值图像的概率秘密共享方案
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437896
Abhishek Mishra, Ashutosh Gupta
Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.
安全密钥管理是秘密共享的激励因素。在许多实际情况下,单个密钥可以解锁多个文件。考虑由于计算机崩溃或系统无法启动而丢失此密钥的情况,那么几乎不可能访问这些多个文件。本文提出了一种基于异或运算的二值图像概率(2,n) SS方案。该方案依赖于随机生成的矩阵,在这些矩阵上执行数学和布尔运算来生成秘密。实验结果表明,该方案具有令人满意的对比度,不易受到安全攻击,且计算时间合理。
{"title":"Probabilistic secret sharing scheme for binary images","authors":"Abhishek Mishra, Ashutosh Gupta","doi":"10.1109/CCINTELS.2015.7437896","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437896","url":null,"abstract":"Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"&NA; 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of human being and non-human object from image and video sequences 从图像和视频序列中检测人类和非人类物体
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437914
Sudip Kumar Rajak, Sayantani Mondal, I. Ali
This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.
本文提出了一种从图像和视频序列中对人或非人物体进行分类的新方法。对于这种分类,清晰的检测是必不可少的。在人类分类过程中出现的困难是服装,照明,姿势,阴影和形状变化。如果视频质量不够好,那么检测就不能完美地完成。为了避免这些困难,我们使用FCM和基于k-means的新阈值技术来确定目标检测的阈值点。被探测对象是否是人是空间、安全目的和视觉监视的重要任务。因此,在成功检测到目标后,我们使用黄金比例作为目标分类器,将其分类为人类或非人类。它是与人体部位有关的比率,如人体的高度和宽度。这个比例也被称为神圣比例。
{"title":"Detection of human being and non-human object from image and video sequences","authors":"Sudip Kumar Rajak, Sayantani Mondal, I. Ali","doi":"10.1109/CCINTELS.2015.7437914","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437914","url":null,"abstract":"This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An application of SVM in character recognition with chain code 支持向量机在链码字符识别中的应用
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437901
Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal
Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.
人工智能、模式识别和计算机视觉在电子和图像处理领域具有重要意义。光学字符识别(OCR)是模式识别的主要方面之一,自诞生以来发展迅速。OCR是一种从光学数据中识别可读字符并将其转换为数字形式的系统。为此目的,使用不同的方法开发了各种方法。本文讨论了现代OCR系统的总体结构,并对各个模块进行了详细的讨论。采用摩尔邻域跟踪提取字符边界,然后采用链式法则提取特征。在字符识别的分类阶段,对支持向量机进行训练并应用于合适的实例。
{"title":"An application of SVM in character recognition with chain code","authors":"Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal","doi":"10.1109/CCINTELS.2015.7437901","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437901","url":null,"abstract":"Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Model order reduction of transformer linear section model using Simulated Annealing 变压器线性截面模型的模拟退火降阶
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437922
Princy Saraswat, G. Parmar
This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.
本文研究了利用模拟退火和优势极保持技术相结合的优势对变压器线性截面模型进行降阶的方法。SA是一种局部搜索方法,灵感来自与固体相关的物理退火过程。结合优势极保持技术,证明了SA技术在获得变压器低阶模型方面的有效性,使降阶模型近似于原高阶变压器模型,保持了原系统的稳定性。该优化方法基于原高阶变压器线性截面模型与降阶变压器线性截面模型的瞬态响应的积分平方误差(ISE)的最小化。降阶模型的零点是通过最小化变压器高阶模型和低阶模型之间的ISE来实现的,而极点是通过优势极点保持技术来确定的。该算法已通过文献中的一个变压器模型进行了说明。还比较了低阶和高阶变压器模型的阶跃响应和频率响应以及瞬态响应参数,并以表格形式给出了ISE与其他现有技术的比较研究。
{"title":"Model order reduction of transformer linear section model using Simulated Annealing","authors":"Princy Saraswat, G. Parmar","doi":"10.1109/CCINTELS.2015.7437922","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437922","url":null,"abstract":"This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data transfer with the help of USB host controller without PC 数据传输与USB主机控制器的帮助下,无需PC机
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437955
Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari
USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.
USB数据传输在目前的场景中被广泛使用。但需要PC(个人电脑)/笔记本电脑传输USB数据。随身携带个人电脑/手提电脑是不可能的。在本文中,我们提出USB到USB的数据传输不涉及PC/笔记本电脑。采用ATMEGA16微控制器的VDIP2模块进行数据传输。系统还支持在超级终端上发送数据,以便调试。LCD(液晶显示器)配置显示结果。
{"title":"Data transfer with the help of USB host controller without PC","authors":"Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari","doi":"10.1109/CCINTELS.2015.7437955","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437955","url":null,"abstract":"USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Trust based Intrusion Detection approach in wireless sensor network 基于分布式信任的无线传感器网络入侵检测方法
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437886
A. Dhakne, P. Chatur
Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.
无线传感器网络在战场监视、医疗卫生等主要领域有着广泛的应用,其安全性一直是一个重要的问题。基本上,处理无线传感器网络的安全主要有三个组成部分:预防、检测和缓解。但是要防止无线传感器网络经常受到恶意攻击是非常困难的,因此及早发现恶意攻击,对无线传感器网络做出反应,不造成损害是非常重要的。提出了基于分布式信任的入侵检测(DTBID)方法,该方法考虑了多个因素来建立传感器节点的信任。大多数研究工作只考虑沟通行为来获得信任。我们的入侵检测系统将考虑分布在能量、可靠性、数据等因素中的信任。我们从这些因素中推导并形成了直接信任、推荐信任和间接信任。我们提供了一种判断特定节点是否为恶意节点的方法,该方法通过比较我们的入侵检测技术得出的主观信任与基于每个节点实际信息计算的客观信任,而不考虑任何网络动态(如节点移动、信任随时间衰减和任何恶意攻击)。如果从我们的模型中得到的主观信任与客观信任之间存在很大的差异,那么我们将传感器节点视为恶意节点。
{"title":"Distributed Trust based Intrusion Detection approach in wireless sensor network","authors":"A. Dhakne, P. Chatur","doi":"10.1109/CCINTELS.2015.7437886","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437886","url":null,"abstract":"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 Communication, Control and Intelligent Systems (CCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1