首页 > 最新文献

2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

英文 中文
A novel rectangular patch antenna with double L-probe fed for RADAR altimeter application 一种用于雷达高度计的新型双l探针馈电矩形贴片天线
M. Saravanan, M. Rangachar
In the paper, a printed patch antenna with a rectangular slot is presented for RADAR altimeter application. The antenna is composed of single layer air substrate with double L-Shaped probe feed oriented 90° apart from each other and also with a shorting pin for impedance matching purpose. The measurements show that the antenna has a reflection coefficient bandwidth (S11 ≤ 20dB) of 4.6% (4.2 ~ 4.4 GHz) with a center frequency of 4.3 GHz and a gain of about 5.95 dB. The proposed antenna can be used for RADAR altimeter which are operating at 4.2 ~ 4.4 GHz band. A parametric study of geometric variation of L probe is given for clear understanding of radiation mechanism.
本文提出了一种用于雷达高度计的带矩形槽的印刷贴片天线。该天线由单层空气基板组成,双l型探针馈电方向彼此相距90°,并带有用于阻抗匹配的短引脚。测量结果表明,天线的反射系数带宽(S11≤20dB)为4.6% (4.2 ~ 4.4 GHz),中心频率为4.3 GHz,增益约为5.95 dB。该天线可用于工作在4.2 ~ 4.4 GHz频段的雷达高度计。对L探针的几何变化进行了参数化研究,以便对辐射机理有更清晰的认识。
{"title":"A novel rectangular patch antenna with double L-probe fed for RADAR altimeter application","authors":"M. Saravanan, M. Rangachar","doi":"10.1109/WISPNET.2016.7566445","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566445","url":null,"abstract":"In the paper, a printed patch antenna with a rectangular slot is presented for RADAR altimeter application. The antenna is composed of single layer air substrate with double L-Shaped probe feed oriented 90° apart from each other and also with a shorting pin for impedance matching purpose. The measurements show that the antenna has a reflection coefficient bandwidth (S11 ≤ 20dB) of 4.6% (4.2 ~ 4.4 GHz) with a center frequency of 4.3 GHz and a gain of about 5.95 dB. The proposed antenna can be used for RADAR altimeter which are operating at 4.2 ~ 4.4 GHz band. A parametric study of geometric variation of L probe is given for clear understanding of radiation mechanism.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SSLEACH: Specification based secure LEACH protocol for Wireless Sensor Networks SSLEACH:基于规范的无线传感器网络安全LEACH协议
S. Kumar, A. Umamakeswari
Wireless Sensor Networks is a resource constrained environment and security plays a major role in it. LEACH is one of the existing well-known cluster-based routing protocol. This protocol is vulnerable to several routing attacks, in which sinkhole attack is one of the most vulnerable threat. Intrusion Detection System is one of the efficient security mechanisms to counter the routing attacks by raising alarms and alerting the network. This paper proposes a generic specification based intrusion detection model namely SSLEACH to counter the sinkhole attack. The proposed SSLEACH mechanism is simulated in NS2 and the results show that SSLEACH outperforms the well-known existing schemes MS-LEACH and S-LEACH in terms of performance metrics like energy consumption, packet delivery rate, normalized overhead and residual energy.
无线传感器网络是一个资源受限的环境,其中安全问题起着至关重要的作用。LEACH是现有的知名的基于集群的路由协议之一。该协议容易受到多种路由攻击,其中天坑攻击是最容易受到攻击的威胁之一。入侵检测系统是一种有效的对抗路由攻击的安全机制,它可以对网络进行报警。本文提出了一种基于通用规范的入侵检测模型SSLEACH来对抗天坑攻击。在NS2中对所提出的SSLEACH机制进行了仿真,结果表明SSLEACH在能量消耗、分组传输速率、归一化开销和剩余能量等性能指标上优于MS-LEACH和S-LEACH。
{"title":"SSLEACH: Specification based secure LEACH protocol for Wireless Sensor Networks","authors":"S. Kumar, A. Umamakeswari","doi":"10.1109/WISPNET.2016.7566424","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566424","url":null,"abstract":"Wireless Sensor Networks is a resource constrained environment and security plays a major role in it. LEACH is one of the existing well-known cluster-based routing protocol. This protocol is vulnerable to several routing attacks, in which sinkhole attack is one of the most vulnerable threat. Intrusion Detection System is one of the efficient security mechanisms to counter the routing attacks by raising alarms and alerting the network. This paper proposes a generic specification based intrusion detection model namely SSLEACH to counter the sinkhole attack. The proposed SSLEACH mechanism is simulated in NS2 and the results show that SSLEACH outperforms the well-known existing schemes MS-LEACH and S-LEACH in terms of performance metrics like energy consumption, packet delivery rate, normalized overhead and residual energy.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Graph cut method for automatic tumor detection in prediction based reconstructed MR image 基于预测的重构MR图像中肿瘤自动检测的图切方法
A. Roy, S. Maity
Among the different types of tumor in human body, brain tumor is one of the most life-threatening diseases and it should be detected accurately in early stage for proper treatment. Recently magnetic resonance imaging (MRI) is found to be efficient in detecting tumor as it does not need any opening on the human body. Presence of tumor in brain may be detected by segmenting the captured MR images. Tumor segmentation, however, is performed manually by radiologists which is a time consuming and also a subjective process. Furthermore, presence of the radiologists in a distant location often needs transmission over a radio mobile channel for which a high bandwidth is required. Keeping these in mind, in this work, an efficient low bandwidth transmission of the captured MRI brain images followed by its reconstruction and graph cut based automatic segmentation of the tumor is proposed. Compressed sensing (CS) is used to offer the facility of low bandwidth transmission. Extensive simulation results are also shown for reconstructed images followed by segmentation results.
在人体不同类型的肿瘤中,脑肿瘤是最危及生命的疾病之一,应及早准确发现,及时治疗。近年来,人们发现磁共振成像(MRI)在检测肿瘤方面效率很高,因为它不需要在人体上开任何口子。脑内肿瘤的存在可以通过分割捕获的MR图像来检测。然而,肿瘤分割是由放射科医生手动完成的,这是一个耗时且主观的过程。此外,放射科医生在较远的地方往往需要通过无线电移动信道传输,这需要高带宽。考虑到这些,在这项工作中,提出了一种高效的低带宽传输捕获的MRI脑图像,然后进行重建和基于图切的肿瘤自动分割。压缩感知(CS)技术为低带宽传输提供了便利。对重构图像进行了广泛的仿真,并给出了分割结果。
{"title":"Graph cut method for automatic tumor detection in prediction based reconstructed MR image","authors":"A. Roy, S. Maity","doi":"10.1109/WISPNET.2016.7566386","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566386","url":null,"abstract":"Among the different types of tumor in human body, brain tumor is one of the most life-threatening diseases and it should be detected accurately in early stage for proper treatment. Recently magnetic resonance imaging (MRI) is found to be efficient in detecting tumor as it does not need any opening on the human body. Presence of tumor in brain may be detected by segmenting the captured MR images. Tumor segmentation, however, is performed manually by radiologists which is a time consuming and also a subjective process. Furthermore, presence of the radiologists in a distant location often needs transmission over a radio mobile channel for which a high bandwidth is required. Keeping these in mind, in this work, an efficient low bandwidth transmission of the captured MRI brain images followed by its reconstruction and graph cut based automatic segmentation of the tumor is proposed. Compressed sensing (CS) is used to offer the facility of low bandwidth transmission. Extensive simulation results are also shown for reconstructed images followed by segmentation results.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on text detection techniques of printed documents 打印文档文本检测技术研究
Nouman Khan, Shalini Puri
In the current era of technology advancements, the number of digital transmission libraries are growing terribly quickly, the necessity to expeditiously index, browse and retrieve transmission data is hyperbolic. In this paper, a technical analysis on textual data identification and extraction from image is given in which various approaches for text detection and extraction are discussed and an evaluation is done on the popularity of approach. Models and their techniques are compared with the help of taxonomy which aims to show how the work flow can be described by various techniques and a study of different classifiers used by different models is also given. Results of various models are shown in the form of recall and precision and we have found that 0.1% of the algorithms achieved more than 99% recall and precision and on the basis of it efficiency of model is found.
在当今技术进步的时代,数字传输库的数量以惊人的速度增长,快速索引、浏览和检索传输数据的必要性是惊人的。本文对图像文本数据的识别与提取进行了技术分析,讨论了文本检测与提取的各种方法,并对各种方法的普及程度进行了评价。在分类法的帮助下,对模型及其技术进行了比较,目的是展示如何用各种技术来描述工作流,并对不同模型使用的不同分类器进行了研究。各种模型的结果以查全率和查准率的形式显示,我们发现有0.1%的算法达到了99%以上的查全率和查准率,并在此基础上发现了模型的效率。
{"title":"A study on text detection techniques of printed documents","authors":"Nouman Khan, Shalini Puri","doi":"10.1109/WISPNET.2016.7566589","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566589","url":null,"abstract":"In the current era of technology advancements, the number of digital transmission libraries are growing terribly quickly, the necessity to expeditiously index, browse and retrieve transmission data is hyperbolic. In this paper, a technical analysis on textual data identification and extraction from image is given in which various approaches for text detection and extraction are discussed and an evaluation is done on the popularity of approach. Models and their techniques are compared with the help of taxonomy which aims to show how the work flow can be described by various techniques and a study of different classifiers used by different models is also given. Results of various models are shown in the form of recall and precision and we have found that 0.1% of the algorithms achieved more than 99% recall and precision and on the basis of it efficiency of model is found.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hilbert transform based edge detection approach for wideband spectrum sensing in cognitive radios 基于希尔伯特变换的认知无线电宽带频谱感知边缘检测方法
Manobendu Sarker
Cognitive radio is now come into attention for researchers as a new solution to face the challenge of the fast growing bandwidth demand. Spectrum sensing is a major problem for dynamic spectrum management in cognitive radio networks. This paper introduces a simple Hilbert transform based approach for efficient spectrum sensing of wideband channel in which soft de-noising is used to suppress the noise level. In this approach the effect of noise is suppressed first by averaging PSD of the received signal then de-noised by soft thresholding. Frequency boundaries of bands are found more accurately by Hilbert transform which is shown in simulation result so it will also ease to characterize by vacant or occupied by determining the average PSD of the consecutive bands. Our proposed method has also improved performance of detection in low SNR region than the conventional methods which is also portrayed by simulation result.
认知无线电作为一种新的解决方案正受到研究人员的关注,以应对快速增长的带宽需求。频谱感知是认知无线电网络中动态频谱管理的主要问题。本文介绍了一种简单的基于希尔伯特变换的宽带信道高效频谱检测方法,该方法采用软降噪来抑制噪声电平。在这种方法中,噪声的影响首先通过平均接收信号的PSD来抑制,然后通过软阈值去噪。仿真结果表明,希尔伯特变换可以更准确地找到频带的频率边界,通过确定连续频带的平均PSD也可以很容易地表征为空或占用。仿真结果表明,该方法在低信噪比区域的检测性能优于传统方法。
{"title":"Hilbert transform based edge detection approach for wideband spectrum sensing in cognitive radios","authors":"Manobendu Sarker","doi":"10.1109/WISPNET.2016.7566547","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566547","url":null,"abstract":"Cognitive radio is now come into attention for researchers as a new solution to face the challenge of the fast growing bandwidth demand. Spectrum sensing is a major problem for dynamic spectrum management in cognitive radio networks. This paper introduces a simple Hilbert transform based approach for efficient spectrum sensing of wideband channel in which soft de-noising is used to suppress the noise level. In this approach the effect of noise is suppressed first by averaging PSD of the received signal then de-noised by soft thresholding. Frequency boundaries of bands are found more accurately by Hilbert transform which is shown in simulation result so it will also ease to characterize by vacant or occupied by determining the average PSD of the consecutive bands. Our proposed method has also improved performance of detection in low SNR region than the conventional methods which is also portrayed by simulation result.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120857299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fractional frequency reuse to enhance down link performance in MU Massive MIMO 分数频率复用提高MU Massive MIMO下链路性能
Amrita Ruperee, S. Nema
In Multi User (MU) Massive MIMO Base Station is provided with large number of antennas to serve number of single antenna user terminals. It offers several benefits over conventional MIMO and takes the advantage of multipath propagation by sending and receiving multiple data signals in same time-frequency resource which increases the throughput, coverage, and reliability. Massive MIMO, averages out the small scale fading and thermal noise. This averaging is done as the number of BS antennas increases without limit (M ≫ K). One of the limiting factor for the performance of Massive MIMO system is pilot contamination. Reuse of the orthogonal pilot sequences in adjacent cells cause pilot contamination. Pilot contamination causes poor channel estimation at the BS and degrades the performance of the system. The proposed scheme improves the performance of downlink by optimized allocation of pilot sequences and using fractional frequency reuse factor (1/N). All the available pilot signals are equally divided among the cells as per the cluster size (N = 1, 3, 7). In the proposed scheme orthogonal pilot signal is transmitted by each user terminal to get the Channel State Information (CSI) to estimate the channel. SIR and terminal capacity for the downlink are calculated for the given number of user terminals using linear precoding (Matched Filter and Zero Forcing) schemes which are the function of the estimated channel and the pilot transmission power (ρp). It is observed that there is significant improvement in Pilot Signal to Interference Plus Noise (PSINR), SIR and terminal capacity by reducing fractional frequency reuse factor i.e. (N = 1, 3, 7).
在多用户(MU)大规模MIMO (Massive MIMO)中,基站配备了大量的天线,为多个单天线用户终端提供服务。与传统MIMO相比,它提供了几个优点,并利用多路径传播的优势,在同一时频资源中发送和接收多个数据信号,从而增加了吞吐量、覆盖范围和可靠性。大规模MIMO,平均小规模衰落和热噪声。这种平均是随着BS天线数量无限制地增加(M比K)而进行的。大规模MIMO系统性能的限制因素之一是导频污染。在相邻单元中重复使用正交导频序列会导致导频污染。导频污染会导致BS的信道估计不良,从而降低系统的性能。该方案通过优化导频序列分配和使用分数频率复用因子(1/N)来提高下行链路的性能。根据簇大小(N = 1,3,7),将所有可用的导频信号平均分配到单元中。在该方案中,每个用户终端发送正交导频信号,获得信道状态信息(CSI),以估计信道。对于给定数量的用户终端,使用线性预编码(匹配滤波器和零强制)方案计算下行链路的SIR和终端容量,这些方案是估计信道和导频发射功率(ρp)的函数。观察到,通过降低分数频率复用因子即(N = 1,3,7),导频信号干扰加噪声(PSINR), SIR和终端容量有显着改善。
{"title":"Fractional frequency reuse to enhance down link performance in MU Massive MIMO","authors":"Amrita Ruperee, S. Nema","doi":"10.1109/WISPNET.2016.7566451","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566451","url":null,"abstract":"In Multi User (MU) Massive MIMO Base Station is provided with large number of antennas to serve number of single antenna user terminals. It offers several benefits over conventional MIMO and takes the advantage of multipath propagation by sending and receiving multiple data signals in same time-frequency resource which increases the throughput, coverage, and reliability. Massive MIMO, averages out the small scale fading and thermal noise. This averaging is done as the number of BS antennas increases without limit (M ≫ K). One of the limiting factor for the performance of Massive MIMO system is pilot contamination. Reuse of the orthogonal pilot sequences in adjacent cells cause pilot contamination. Pilot contamination causes poor channel estimation at the BS and degrades the performance of the system. The proposed scheme improves the performance of downlink by optimized allocation of pilot sequences and using fractional frequency reuse factor (1/N). All the available pilot signals are equally divided among the cells as per the cluster size (N = 1, 3, 7). In the proposed scheme orthogonal pilot signal is transmitted by each user terminal to get the Channel State Information (CSI) to estimate the channel. SIR and terminal capacity for the downlink are calculated for the given number of user terminals using linear precoding (Matched Filter and Zero Forcing) schemes which are the function of the estimated channel and the pilot transmission power (ρp). It is observed that there is significant improvement in Pilot Signal to Interference Plus Noise (PSINR), SIR and terminal capacity by reducing fractional frequency reuse factor i.e. (N = 1, 3, 7).","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient stream cipher using Genetic Algorithm 基于遗传算法的高效流密码
Ankit Kumar, Kakali Chatterjee
Cryptography is essential to protect and secure data using a key. Different types of cryptographic techniques are found for data security. Genetic Algorithm is essentially used for obtaining optimal solution. Also, it can be efficiently used for random number generation which are very important in cryptography. This paper discusses the application of genetic algorithms for stream ciphers. Key generation is the most important factor in stream ciphers. In this paper Genetic Algorithm is used in the key generation process where key selection depends upon the fitness function. Here genetic algorithm is repeated for key selection. In each iteration, the key having highest fitness value is selected which further be compared with the threshold value. Selected key was unique and non-repeating. Therefore encryption with selected key are highly encrypted because of more randomness of key. This paper shows that the generated keys using GA are unique and more secure for encryption of data.
密码学对于使用密钥保护和保护数据至关重要。不同类型的加密技术被发现用于数据安全。遗传算法本质上是用来求最优解的。此外,它还可以有效地用于密码学中非常重要的随机数生成。本文讨论了遗传算法在流密码中的应用。密钥生成是流密码中最重要的环节。本文将遗传算法应用于密钥生成过程中,密钥的选择取决于适应度函数。这里重复遗传算法进行键选择。在每次迭代中,选择适应度值最高的键与阈值进行比较。所选键唯一且不重复。因此,由于密钥的随机性较大,使用选定密钥进行加密具有较高的密码性。本文证明了采用遗传算法生成的密钥具有唯一性,对数据加密具有更高的安全性。
{"title":"An efficient stream cipher using Genetic Algorithm","authors":"Ankit Kumar, Kakali Chatterjee","doi":"10.1109/WISPNET.2016.7566557","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566557","url":null,"abstract":"Cryptography is essential to protect and secure data using a key. Different types of cryptographic techniques are found for data security. Genetic Algorithm is essentially used for obtaining optimal solution. Also, it can be efficiently used for random number generation which are very important in cryptography. This paper discusses the application of genetic algorithms for stream ciphers. Key generation is the most important factor in stream ciphers. In this paper Genetic Algorithm is used in the key generation process where key selection depends upon the fitness function. Here genetic algorithm is repeated for key selection. In each iteration, the key having highest fitness value is selected which further be compared with the threshold value. Selected key was unique and non-repeating. Therefore encryption with selected key are highly encrypted because of more randomness of key. This paper shows that the generated keys using GA are unique and more secure for encryption of data.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Low cross polarized wideband printed fork-like fed slot antenna 低交叉极化宽带印刷叉状馈电槽天线
M. Sundaravel, Himanshu Shekhar
A wideband printed slot antenna fed with fork like microstrip feed is presented. The proposed antenna is backed by a perfect metallic conductor (PEC) metal plate placed at a distance λg/4 from slot aperture ground plane to improve impedance bandwidth and gain over operating frequency range of 2.1 to 3.5GHz. The enhanced bandwidth of the antenna for a VSWR ≤ 2 is 58% and gain of the antenna is around 9dB over the band. Design and simulation results are presented and the antenna exhibits stable radiation pattern throughout the bandwidth.
提出了一种采用叉形微带馈电的宽带印刷槽天线。在2.1 ~ 3.5GHz的工作频率范围内,采用完美金属导体(PEC)金属板支撑天线,与槽孔接地面的距离为λg/4,提高了天线的阻抗带宽和增益。当驻波比≤2时,天线的增强带宽为58%,增益约为9dB。设计和仿真结果表明,该天线在整个带宽范围内具有稳定的辐射方向图。
{"title":"Low cross polarized wideband printed fork-like fed slot antenna","authors":"M. Sundaravel, Himanshu Shekhar","doi":"10.1109/WISPNET.2016.7566440","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566440","url":null,"abstract":"A wideband printed slot antenna fed with fork like microstrip feed is presented. The proposed antenna is backed by a perfect metallic conductor (PEC) metal plate placed at a distance λg/4 from slot aperture ground plane to improve impedance bandwidth and gain over operating frequency range of 2.1 to 3.5GHz. The enhanced bandwidth of the antenna for a VSWR ≤ 2 is 58% and gain of the antenna is around 9dB over the band. Design and simulation results are presented and the antenna exhibits stable radiation pattern throughout the bandwidth.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game theory based mitigation of Interest flooding in Named Data Network 基于博弈论的命名数据网兴趣泛滥缓解
V. Selvi, Ramdinesh, R. Shebin, Varunya
The Distributed Denial of Service (DDoS) attacks are a serious threat in today's Internet where packets from large number of compromised hosts block the path to the victim nodes and overload the victim servers. In the newly proposed future Internet Architecture, Named Data Networking (NDN), the architecture itself has prevention measures to reduce the overload to the servers. This on the other hand increases the work and security threats to the intermediate routers. Our project aims at identifying the DDoS attack in NDN which is known as Interest flooding attack, mitigate the consequence of it and provide service to the legitimate users. We have developed a game model for the DDoS attacks and provide possible countermeasures to stop the flooding of interests. Through this game theory model, we either forward or redirect or drop the incoming interest packets thereby reducing the PIT table consumption. This helps in identifying the nodes that send malicious interest packets and eradicate their actions of sending malicious interests further. The main highlight of this work is that we have implemented the Game Theory model in the NDN architecture. It was primarily imposed for the IP internet architecture.
分布式拒绝服务(DDoS)攻击是当今互联网的一个严重威胁,来自大量受损主机的数据包阻塞了通往受害节点的路径,并使受害服务器过载。在新提出的未来互联网架构NDN (Named Data Networking)中,该架构本身就有预防措施,以减少对服务器的过载。另一方面,这也增加了中间路由器的工作和安全威胁。我们的项目旨在识别NDN中被称为兴趣泛滥攻击的DDoS攻击,减轻其后果并为合法用户提供服务。我们已经为DDoS攻击开发了一个游戏模型,并提供了可能的对策来阻止利益泛滥。通过这个博弈论模型,我们可以转发或重定向或丢弃传入的兴趣包,从而减少PIT表的消耗。这有助于识别发送恶意兴趣包的节点,并进一步根除其发送恶意兴趣的行为。这项工作的主要亮点是我们在NDN架构中实现了博弈论模型。它主要适用于IP互联网架构。
{"title":"Game theory based mitigation of Interest flooding in Named Data Network","authors":"V. Selvi, Ramdinesh, R. Shebin, Varunya","doi":"10.1109/WISPNET.2016.7566220","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566220","url":null,"abstract":"The Distributed Denial of Service (DDoS) attacks are a serious threat in today's Internet where packets from large number of compromised hosts block the path to the victim nodes and overload the victim servers. In the newly proposed future Internet Architecture, Named Data Networking (NDN), the architecture itself has prevention measures to reduce the overload to the servers. This on the other hand increases the work and security threats to the intermediate routers. Our project aims at identifying the DDoS attack in NDN which is known as Interest flooding attack, mitigate the consequence of it and provide service to the legitimate users. We have developed a game model for the DDoS attacks and provide possible countermeasures to stop the flooding of interests. Through this game theory model, we either forward or redirect or drop the incoming interest packets thereby reducing the PIT table consumption. This helps in identifying the nodes that send malicious interest packets and eradicate their actions of sending malicious interests further. The main highlight of this work is that we have implemented the Game Theory model in the NDN architecture. It was primarily imposed for the IP internet architecture.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network localization with noisy distances by non-convex optimization 基于非凸优化的带噪声距离网络定位
A. Saha, B. Sau
A distance based network localization determines the positions of the nodes in the network subject to some distance constraints. The network localization problem may be modeled as a non-convex nonlinear optimization problem with distance constraints which are either convex or non-convex. Existing network localization algorithms either eliminate the non-convex distance constraints or relax them into convex constraints to employ the traditional convex optimization methods, e.g., SDP, for estimating positions of nodes with noisy distances. In practice, the estimated solution of such a converted problem gives errors due to the modification of constraints. In this paper, we employ the nonlinear Lagrangian method for non-convex optimization which efficiently estimates node positions solving the original network localization problem without any modification. The proposed method involves numerical computations. By increasing the number of iterations (not very high, usually less than hundred) in computations, a desired level of accuracy may be achieved.
基于距离的网络定位在一定距离约束下确定网络中节点的位置。网络定位问题可以建模为距离约束为凸或非凸的非凸非线性优化问题。现有的网络定位算法或消除非凸距离约束,或将其放宽为凸约束,采用传统的凸优化方法(如SDP)来估计带噪声距离的节点位置。在实际应用中,由于约束条件的改变,这种转换问题的估计解存在误差。本文采用非线性拉格朗日方法进行非凸优化,在不做任何修改的情况下有效地估计节点位置,解决了原有的网络定位问题。该方法涉及数值计算。通过增加计算中的迭代次数(不是很高,通常少于100次),可以达到期望的精度水平。
{"title":"Network localization with noisy distances by non-convex optimization","authors":"A. Saha, B. Sau","doi":"10.1109/WISPNET.2016.7566224","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566224","url":null,"abstract":"A distance based network localization determines the positions of the nodes in the network subject to some distance constraints. The network localization problem may be modeled as a non-convex nonlinear optimization problem with distance constraints which are either convex or non-convex. Existing network localization algorithms either eliminate the non-convex distance constraints or relax them into convex constraints to employ the traditional convex optimization methods, e.g., SDP, for estimating positions of nodes with noisy distances. In practice, the estimated solution of such a converted problem gives errors due to the modification of constraints. In this paper, we employ the nonlinear Lagrangian method for non-convex optimization which efficiently estimates node positions solving the original network localization problem without any modification. The proposed method involves numerical computations. By increasing the number of iterations (not very high, usually less than hundred) in computations, a desired level of accuracy may be achieved.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1