首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Efficient channel sensing schemes for multiuser in mutichannel Cognitive Radio networks 多信道认知无线网络中高效的多用户信道感知方案
R. Mahalakshmi, R. Vijayakarthika
The rapid growth of wireless devices has to a dramatically increased in the needs of spectrum access from wireless services. Cognitive Radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the licensed spectrum in an opportunistic manner. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are powerfully modeled through finite state Markovian processes. The objective of this paper is to maximize the throughput for secondary user and reduced the number of handovers. A model for single user case is introduced and its performance is validated through analytical analysis. A modified p-persistent access (MPPA) protocol is proposed for multiple user. Since the method utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately, p-persistent random access (PPRA) protocol is considered, which offers higher average throughput for SUs. The structure of the proposed scheme is discussed in detail, and its efficiencies are verified through a set of illustrative numerical result.
随着无线设备的快速增长,无线业务对频谱接入的需求急剧增加。认知无线电(CR)技术是一种很有前途的解决方案,它使未经许可的用户能够以机会主义的方式利用已许可的频谱,从而提高频谱利用率。本文通过有限状态马尔可夫过程对单和多辅助用户网络的顺序信道感知问题进行了强有力的建模。本文的目标是最大限度地提高辅助用户的吞吐量,减少切换次数。介绍了单用户用例模型,并通过分析验证了模型的性能。提出了一种改进的多用户p持久访问(MPPA)协议。由于所使用的方法在单元之间经历了高度的冲突,为了适当地缓解问题,考虑了p-persistent随机访问(PPRA)协议,该协议为单元提供了更高的平均吞吐量。详细讨论了该方案的结构,并通过一组说明性数值结果验证了该方案的有效性。
{"title":"Efficient channel sensing schemes for multiuser in mutichannel Cognitive Radio networks","authors":"R. Mahalakshmi, R. Vijayakarthika","doi":"10.1109/ICICES.2014.7034082","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034082","url":null,"abstract":"The rapid growth of wireless devices has to a dramatically increased in the needs of spectrum access from wireless services. Cognitive Radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the licensed spectrum in an opportunistic manner. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are powerfully modeled through finite state Markovian processes. The objective of this paper is to maximize the throughput for secondary user and reduced the number of handovers. A model for single user case is introduced and its performance is validated through analytical analysis. A modified p-persistent access (MPPA) protocol is proposed for multiple user. Since the method utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately, p-persistent random access (PPRA) protocol is considered, which offers higher average throughput for SUs. The structure of the proposed scheme is discussed in detail, and its efficiencies are verified through a set of illustrative numerical result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81389305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID sensors for food safety centre by identifying the physical factors that affecting the food RFID传感器为食品安全中心通过识别影响食品的物理因素
Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy
The Radio Frequency Identification (RFID) system is combination of a tag and reader. The RFID tag provides a cost effective solution to identify the object. The object may be any living and non living. The RFID system is used many applications such as healthcare, sales supply chain, luggage identification and security enabled keys, etc. These applications were discussed in various research papers, but till now, no one introduced the food safety centre enabled RFID system. That is the physical factors affecting the food to get into contaminated need to be identified and remedy need to be taken for the same. This RFID system needs to be integrated with the Wireless Sensor Network (WSN) Enabled Architecture. So this system is called as RFID Sensor. This research paper also presents three various methodologies to identify the physical affect that affecting the food. At the end of this paper, discuss about how the RFID Sensor is going to be introduce in the Food Safety Centre in Indian Ration Shops.
射频识别(RFID)系统是一个标签和阅读器的组合。RFID标签为识别对象提供了一种经济有效的解决方案。对象可以是任何生物或非生物。RFID系统用于许多应用,如医疗保健、销售供应链、行李识别和安全启用密钥等。在各种研究论文中讨论了这些应用,但到目前为止,还没有人介绍食品安全中心启用的RFID系统。也就是说,影响食物进入污染的物理因素需要被识别,需要采取补救措施。该RFID系统需要与无线传感器网络(WSN)使能架构集成。这个系统被称为RFID传感器。这篇研究论文还提出了三种不同的方法来确定影响食物的物理影响。在本文的最后,讨论了如何将RFID传感器引入印度口粮店的食品安全中心。
{"title":"RFID sensors for food safety centre by identifying the physical factors that affecting the food","authors":"Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy","doi":"10.1109/ICICES.2014.7033876","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033876","url":null,"abstract":"The Radio Frequency Identification (RFID) system is combination of a tag and reader. The RFID tag provides a cost effective solution to identify the object. The object may be any living and non living. The RFID system is used many applications such as healthcare, sales supply chain, luggage identification and security enabled keys, etc. These applications were discussed in various research papers, but till now, no one introduced the food safety centre enabled RFID system. That is the physical factors affecting the food to get into contaminated need to be identified and remedy need to be taken for the same. This RFID system needs to be integrated with the Wireless Sensor Network (WSN) Enabled Architecture. So this system is called as RFID Sensor. This research paper also presents three various methodologies to identify the physical affect that affecting the food. At the end of this paper, discuss about how the RFID Sensor is going to be introduce in the Food Safety Centre in Indian Ration Shops.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82526315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel image zero-watermarking scheme based on DWT-BN-SVD 一种基于DWT-BN-SVD的图像零水印方案
Y. Rao, E. Nagabhooshanam
This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values in the scheme for finding the optimum scaling factors for efficient robustness and the fidelity of the scheme. By using this method we could eliminate the false positive problem and diagonal line problem which were found in the traditional singular value decomposition, the proposed scheme is tested under various forms of image processing attacks like noise addition, median filtering, JPEG compression, Geometric cropping Experimental results are provided to illustrate that the proposed scheme succeeded in providing copyright protection.
本文提出了一种新的数字图像水印方案,克服了奇异值分解的问题。在这里,使用DWT域中水印的主成分来修改主图像的奇异值,以提供版权保护和可靠性。该方法通过在方案中引入分数阶奇异值来寻找最优的比例因子,从而获得有效的鲁棒性和方案的保真度。利用该方法消除了传统奇异值分解中存在的假阳性问题和对角线问题,并在噪声添加、中值滤波、JPEG压缩、几何裁剪等各种形式的图像处理攻击下进行了测试,实验结果表明该方法成功地提供了版权保护。
{"title":"A novel image zero-watermarking scheme based on DWT-BN-SVD","authors":"Y. Rao, E. Nagabhooshanam","doi":"10.1109/ICICES.2014.7034073","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034073","url":null,"abstract":"This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values in the scheme for finding the optimum scaling factors for efficient robustness and the fidelity of the scheme. By using this method we could eliminate the false positive problem and diagonal line problem which were found in the traditional singular value decomposition, the proposed scheme is tested under various forms of image processing attacks like noise addition, median filtering, JPEG compression, Geometric cropping Experimental results are provided to illustrate that the proposed scheme succeeded in providing copyright protection.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81048972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Imbedded spiral antenna for endoscope 内窥镜内嵌螺旋天线
Anila P. George, M. Sujatha
This paper analyses the characteristics of dual spiral antenna with varying length. This antenna is operated in the lower band of the radio frequency range, since human body absorbs the microwave signals. Here the concept of multilayer substrate is used in order to reduce the size of the antenna. The existing system has several limitations. Firstly, most capsules are powered by an internal battery cell that restricts capsule miniaturization. Secondly, current systems are incapable of maintaining a continuous communication link due to the random orientations of the capsule. Therefore an efficient communication link between the in-body capsule and the external receiver unit is important for the development and applicability of the Wireless Capsule Endoscopy (WCE). These limitations are overcome by this proposed antenna. Since the proposed antenna provides an omnidirectional radiation pattern and ultra wide bandwidth for short distance communication between transmitting and the receiving antenna with low power consumption. By combining two spiral antennas with different radius of the radiation zone, the Standing Wave Ratio (SWR) can be kept low for a large bandwidth, resulting in an improved spiral antenna performance.
本文分析了变长双螺旋天线的特性。由于人体对微波信号的吸收,该天线工作在射频范围的较低频段。这里使用多层基板的概念是为了减小天线的尺寸。现有的系统有几个限制。首先,大多数胶囊都是由内部电池供电,这限制了胶囊的小型化。其次,由于胶囊的随机方向,目前的系统无法保持连续的通信链路。因此,在体内胶囊和外部接收器单元之间建立有效的通信链路对于无线胶囊内窥镜(WCE)的发展和应用至关重要。这种天线克服了这些限制。由于所提出的天线提供了全向辐射方向图和超宽带宽,用于发射和接收天线之间的短距离通信,且功耗低。通过组合两个辐射区半径不同的螺旋天线,可以在大带宽下保持低驻波比,从而提高螺旋天线的性能。
{"title":"Imbedded spiral antenna for endoscope","authors":"Anila P. George, M. Sujatha","doi":"10.1109/ICICES.2014.7034105","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034105","url":null,"abstract":"This paper analyses the characteristics of dual spiral antenna with varying length. This antenna is operated in the lower band of the radio frequency range, since human body absorbs the microwave signals. Here the concept of multilayer substrate is used in order to reduce the size of the antenna. The existing system has several limitations. Firstly, most capsules are powered by an internal battery cell that restricts capsule miniaturization. Secondly, current systems are incapable of maintaining a continuous communication link due to the random orientations of the capsule. Therefore an efficient communication link between the in-body capsule and the external receiver unit is important for the development and applicability of the Wireless Capsule Endoscopy (WCE). These limitations are overcome by this proposed antenna. Since the proposed antenna provides an omnidirectional radiation pattern and ultra wide bandwidth for short distance communication between transmitting and the receiving antenna with low power consumption. By combining two spiral antennas with different radius of the radiation zone, the Standing Wave Ratio (SWR) can be kept low for a large bandwidth, resulting in an improved spiral antenna performance.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Production inventory model for two levels of production with defective items and shortages 有缺陷品和短缺品的两级生产的生产库存模型
C. K. Sivashankari
In this paper, a production inventory model with defective items in which two levels of production are considered and it is possible that production started at one rate and after some time it may be switched over another rate such a situation is desirable in the sense that by starting at a low rate of production, a large quantum stock of manufacturing items at the initial stage is avoided, leading to reduction in the holding cost. A suitable mathematical model is developed and the optimal production lot size which minimizes the total cost is derived. The optimal solution is derived and an illustrative example is provided and numerically verified. The validation of result in this model was coded in Microsoft Visual Basic 6.0.
本文考虑了一个有缺陷产品的生产库存模型,该模型考虑了两种生产水平,生产可能以一种速度开始,一段时间后可能切换到另一种速度,这种情况是可取的,因为通过以较低的生产速度开始,可以避免在初始阶段制造产品的大量库存,从而降低持有成本。建立了合适的数学模型,导出了使总成本最小的最优生产批量。给出了最优解,并给出了算例,并进行了数值验证。在Microsoft Visual Basic 6.0中对模型的结果验证进行了编码。
{"title":"Production inventory model for two levels of production with defective items and shortages","authors":"C. K. Sivashankari","doi":"10.1109/ICICES.2014.7033933","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033933","url":null,"abstract":"In this paper, a production inventory model with defective items in which two levels of production are considered and it is possible that production started at one rate and after some time it may be switched over another rate such a situation is desirable in the sense that by starting at a low rate of production, a large quantum stock of manufacturing items at the initial stage is avoided, leading to reduction in the holding cost. A suitable mathematical model is developed and the optimal production lot size which minimizes the total cost is derived. The optimal solution is derived and an illustrative example is provided and numerically verified. The validation of result in this model was coded in Microsoft Visual Basic 6.0.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91078982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microstrip circular patch antenna using with and without sorting vias 带和不带分选过孔的微带圆形贴片天线
R. Subbulakshmi, P. T. Sivagurunathan
In this paper Micro strip Probe feed Circular patch antenna is designed with and without sorting vias. Such circular patch antenna is shorted concentrically with a set of conductive vias. This type of antenna can produce a monopole-like radiation pattern with wide impedance bandwidth characteristics. The patch antenna is designed and simulated on HFSS simulation software and it is designed to operate in S-band frequency range 2.4GHz. In this analysis, we have analyzed the antenna parameters such as gain, impedance, Radiation Pattern and VSWR. This antenna is highly suitable for S-band applications such as satellite communication, Radar, Medical applications, and other Wireless systems.
本文设计了带分选孔和不带分选孔的微带探针馈电圆形贴片天线。这种圆形贴片天线与一组导电过孔同心短接。这种类型的天线可以产生具有宽阻抗带宽特性的单极辐射方向图。采用HFSS仿真软件对该贴片天线进行了设计和仿真,设计工作在s频段2.4GHz。在分析中,我们分析了天线的增益、阻抗、辐射方向图和驻波比等参数。该天线非常适合s波段应用,如卫星通信、雷达、医疗应用和其他无线系统。
{"title":"Microstrip circular patch antenna using with and without sorting vias","authors":"R. Subbulakshmi, P. T. Sivagurunathan","doi":"10.1109/ICICES.2014.7034113","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034113","url":null,"abstract":"In this paper Micro strip Probe feed Circular patch antenna is designed with and without sorting vias. Such circular patch antenna is shorted concentrically with a set of conductive vias. This type of antenna can produce a monopole-like radiation pattern with wide impedance bandwidth characteristics. The patch antenna is designed and simulated on HFSS simulation software and it is designed to operate in S-band frequency range 2.4GHz. In this analysis, we have analyzed the antenna parameters such as gain, impedance, Radiation Pattern and VSWR. This antenna is highly suitable for S-band applications such as satellite communication, Radar, Medical applications, and other Wireless systems.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90000405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authenticated secure bio-metric based access to the bank safety lockers 通过身份验证的安全生物识别技术可以进入银行保险箱
S. Sridharan
This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biometric based authentication mechanism for operating the safety lockers. This system rests on improving the current fact that all the lockers that operates currently operates only with the help of two different keys - one the branch head's key and other the user key. Improvement towards the current model that relies heavily on the key of the user is proposed which helps in the functioning of the locker with bio-metric and secret code (password). The main features that are proposed in the new mechanism is the two level authentication - one by the branch head and one by the user for their identities, secure individual authentication with their bio-metrics and the access only to the concerned individuals for their safety lockers. The branch head responsible for the operation of the safety deposits is assigned in a daily basis by the central regional office of that particular bank.
本文的重点是为持有储物柜的银行客户和分行负责人参与与安全储物柜有关的所有操作提供一种安全、真实和用户友好的机制。本文的主要目的是为操作安全柜提供一个完整的基于生物识别的认证机制的解决方案。该系统的基础是改进目前所有运行的储物柜仅在两个不同的密钥的帮助下运行的事实-一个是分支机构负责人的密钥,另一个是用户密钥。针对目前严重依赖用户密钥的模式提出了改进建议,这有助于生物识别和密码(密码)储物柜的功能。在新机制中提出的主要特点是两级身份验证-一个由分支机构负责人和一个由用户进行身份验证,通过他们的生物特征进行安全的个人身份验证,以及只允许有关个人访问他们的安全储物柜。负责安全存款业务的分行行长每天由该银行的中央地区办事处指派。
{"title":"Authenticated secure bio-metric based access to the bank safety lockers","authors":"S. Sridharan","doi":"10.1109/ICICES.2014.7034063","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034063","url":null,"abstract":"This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biometric based authentication mechanism for operating the safety lockers. This system rests on improving the current fact that all the lockers that operates currently operates only with the help of two different keys - one the branch head's key and other the user key. Improvement towards the current model that relies heavily on the key of the user is proposed which helps in the functioning of the locker with bio-metric and secret code (password). The main features that are proposed in the new mechanism is the two level authentication - one by the branch head and one by the user for their identities, secure individual authentication with their bio-metrics and the access only to the concerned individuals for their safety lockers. The branch head responsible for the operation of the safety deposits is assigned in a daily basis by the central regional office of that particular bank.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87881818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and implementation of Three Phase Commit Protocol (3PC) directory structure through Remote Procedure Call (RPC) application 通过远程过程调用(RPC)应用程序设计和实现三相提交协议(3PC)目录结构
Nitesh Kumar, Ashish Kumar, Soumyajit Giri
Transaction is a set of/unit of sequential operations, which is used for a purpose of Technological, Organizational, programming languages, and operating systems. It examines the performance of the transaction manager with the help of Remote Procedure Calls (RPC) Applications. Remote Procedure Call is a distributed application for constructing the distributed database system. When it communicates between the sender side (client side) and receiver side (server side). It executes the ensure atomicity protocols. Simple optimization of Two Phase Commit Protocol (2PC) reduces non-blocking commit, logging activity, multi-threading design, and improved throughput, reduce multicasting, and reduces the variance of distributed commit protocol. It is totally based on Three Phase Commit Protocol (3PC) in a communication network infrastructure environment such as (LAN, WAN, MAN, etc.), and the performance of the transaction mechanism such as RPC Techniques depends upon the client and server performance. In this paper, we provide a detail examination of the design and performance of the transaction manager of the RPC Applications and we also compile the code and it's create a file, then after that it will execute the code step by step.
事务是顺序操作的一组/单元,用于技术、组织、编程语言和操作系统。它在远程过程调用(RPC)应用程序的帮助下检查事务管理器的性能。远程过程调用是一个用于构建分布式数据库系统的分布式应用程序。当它在发送端(客户端)和接收端(服务器端)之间进行通信时。它执行确保原子性协议。两阶段提交协议(Two Phase Commit Protocol, 2PC)的简单优化减少了非阻塞提交、日志活动、多线程设计,提高了吞吐量,减少了组广播,并减少了分布式提交协议的方差。它完全基于通信网络基础设施环境(局域网、广域网、城域网等)中的三阶段提交协议(3PC),而RPC技术等事务机制的性能取决于客户端和服务器的性能。本文对RPC应用程序事务管理器的设计和性能进行了详细的研究,并编写了相应的代码,创建了相应的文件,然后逐步执行代码。
{"title":"Design and implementation of Three Phase Commit Protocol (3PC) directory structure through Remote Procedure Call (RPC) application","authors":"Nitesh Kumar, Ashish Kumar, Soumyajit Giri","doi":"10.1109/ICICES.2014.7033930","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033930","url":null,"abstract":"Transaction is a set of/unit of sequential operations, which is used for a purpose of Technological, Organizational, programming languages, and operating systems. It examines the performance of the transaction manager with the help of Remote Procedure Calls (RPC) Applications. Remote Procedure Call is a distributed application for constructing the distributed database system. When it communicates between the sender side (client side) and receiver side (server side). It executes the ensure atomicity protocols. Simple optimization of Two Phase Commit Protocol (2PC) reduces non-blocking commit, logging activity, multi-threading design, and improved throughput, reduce multicasting, and reduces the variance of distributed commit protocol. It is totally based on Three Phase Commit Protocol (3PC) in a communication network infrastructure environment such as (LAN, WAN, MAN, etc.), and the performance of the transaction mechanism such as RPC Techniques depends upon the client and server performance. In this paper, we provide a detail examination of the design and performance of the transaction manager of the RPC Applications and we also compile the code and it's create a file, then after that it will execute the code step by step.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86661611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Synchronization of Lu and Bhalekar-Gejji chaotic systems using sliding mode control Lu和Bhalekar-Gejji混沌系统的滑模同步控制
J. P. Singh, P. Singh, B. K. Roy
In this paper synchronization of two different chaotic systems is proposed using Sliding Mode Control scheme. Lu chaotic system is used as master system and Bhalekar-Gejji chaotic system is used as slave system. Convergence of the synchronizing error is achieved using the Lyapunov stability theory. Synchronization of master and slave system is achieved using the PI (Proportional-Integral) switching surface of the sliding mode control scheme. Finally, numerical simulations are proposed to demonstrate the effectiveness of proposed synchronization strategy.
本文提出了采用滑模控制方法实现两个不同混沌系统的同步。以Lu混沌系统为主系统,以Bhalekar-Gejji混沌系统为从系统。利用李雅普诺夫稳定性理论实现了同步误差的收敛。利用滑模控制方案的PI(比例积分)切换面实现主从系统的同步。最后,通过数值仿真验证了所提同步策略的有效性。
{"title":"Synchronization of Lu and Bhalekar-Gejji chaotic systems using sliding mode control","authors":"J. P. Singh, P. Singh, B. K. Roy","doi":"10.1109/ICICES.2014.7034171","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034171","url":null,"abstract":"In this paper synchronization of two different chaotic systems is proposed using Sliding Mode Control scheme. Lu chaotic system is used as master system and Bhalekar-Gejji chaotic system is used as slave system. Convergence of the synchronizing error is achieved using the Lyapunov stability theory. Synchronization of master and slave system is achieved using the PI (Proportional-Integral) switching surface of the sliding mode control scheme. Finally, numerical simulations are proposed to demonstrate the effectiveness of proposed synchronization strategy.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87432282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stronger authentication for password using virtual password and secret little functions 使用虚拟密码和秘密小函数对密码进行更强的认证
P. Umadevi, V. Saranya
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks by adversaries. To prevent users passwords from adversaries by implementing a differentiated virtual password concept in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users passwords. A user-specified function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. Further we propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt a secret little functions in which security is enhanced by hiding secret functions/algorithms. Analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. The virtual password mechanism is the first one which is able to defend against all three attacks together.
人们享受在线服务、自动柜员机(atm)和普适计算带来的便利,但在线环境、自动柜员机和普适计算可能会带来许多风险。通过实现差异化的虚拟密码概念,使用户可以自由选择从弱安全性到强安全性的虚拟密码方案,而虚拟密码只需要少量的人工计算就可以确保用户密码的安全。用户指定的函数/程序用于实现虚拟密码概念,并在安全性与需要少量人工计算的复杂性之间进行权衡。进一步提出了几个功能作为系统推荐功能,并进行了安全性分析。对于用户指定的函数,我们采用秘密小函数,通过隐藏秘密函数/算法来增强安全性。分析所提出的方案如何防御网络钓鱼、密钥记录和肩部冲浪攻击。虚拟密码机制是第一个能够同时防御这三种攻击的机制。
{"title":"Stronger authentication for password using virtual password and secret little functions","authors":"P. Umadevi, V. Saranya","doi":"10.1109/ICICES.2014.7033936","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033936","url":null,"abstract":"People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks by adversaries. To prevent users passwords from adversaries by implementing a differentiated virtual password concept in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users passwords. A user-specified function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. Further we propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt a secret little functions in which security is enhanced by hiding secret functions/algorithms. Analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. The virtual password mechanism is the first one which is able to defend against all three attacks together.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88535490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1