首页 > 最新文献

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network 无线传感器网络流量过滤抑制分布式拒绝服务攻击
S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan
Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.
无线传感器网络(WSNs)是一种广泛使用的网络,由于其广泛的应用而引起了众多研究人员的关注。它们是资源受限的网络,其中内存容量、能量和内存消耗是有限的。因此,它们容易受到几种安全威胁和攻击。其中一种攻击是分布式拒绝服务(DDoS)。这些攻击的目的是用大量的数据包压倒目标,使其资源枯竭,并挫败其获取真正数据包的能力,使受害者无法给出期望的响应。这将导致网络拥塞,受害者变得疲惫不堪,从而导致拒绝服务。在本文中,我们提出了一种流量过滤机制,该机制部署了缓解措施,以抑制攻击者试图在有限的时间内用大量数据包造成拒绝服务的动机来淹没无线传感器网络。
{"title":"Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network","authors":"S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan","doi":"10.1109/ICCCNT.2014.6963043","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963043","url":null,"abstract":"Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An enhanced data security and trust management enabled framework for cloud computing systems 支持云计算系统的增强数据安全和信任管理框架
J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu
Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.
云计算是IT企业按需提供服务的一种新兴的先进技术。云计算包括许多优点,如灵活性、改进的性能和低成本。除了优势之外,云还存在许多安全问题和挑战。在本文中,我们提出了一个增强的云数据安全框架,该框架遵循完整性、保密性和可用性等安全策略。数据通过128位加密和RSA算法存储在云端,然后我们使用信任管理,即可信方审计员(TPA)代替客户端审计数据。因此,我们将展示如何有效地保护与性能分析相关的数据。
{"title":"An enhanced data security and trust management enabled framework for cloud computing systems","authors":"J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu","doi":"10.1109/ICCCNT.2014.6963097","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963097","url":null,"abstract":"Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Binary biometric template generation towards security and class separability 面向安全性和类可分离性的二进制生物识别模板生成
Eslam Hamouda, Xiaohui Yuan, O. Ouda, T. Hamza, Lei Chen
Due to the wide usage of biometrics, its security issues deserve more attention. Many of biometric protection systems require the biometric templates to be presented in a binary form. Therefore, extracting binary templates from real-valued biometric data is a key step in biometric data protection systems. In addition to meeting the security and privacy requirements, binary biometric templates allow fast matching and reduced storage. The main challenge of these approaches is how to convert the real-valued templates into corresponding binary representation which retains the original information. In this paper, we present a novel method that employs Genetic Algorithms(GA)to generate a binarization scheme which used to transform the real-valued templates into robust binary ones. The main role of GA is to search for the optimal quantization and encoding parameters to generate the binarization scheme. Experiments were conducted with ORL face database for recognition. Our results demonstrated that binary templates achieved promising performance in terms of equal error rate for face recognition using a simple hamming distance classifier.
由于生物识别技术的广泛应用,其安全问题值得更多的关注。许多生物识别保护系统要求生物识别模板以二进制形式呈现。因此,从实值生物特征数据中提取二进制模板是生物特征数据保护系统的关键步骤。除了满足安全和隐私要求外,二进制生物识别模板还允许快速匹配和减少存储。这些方法的主要挑战是如何将实值模板转换成相应的保留原始信息的二进制表示。本文提出了一种利用遗传算法生成二值化方案的新方法,用于将实值模板转化为鲁棒二值模板。遗传算法的主要作用是寻找最优的量化和编码参数来生成二值化方案。实验采用ORL人脸数据库进行识别。我们的研究结果表明,在使用简单的汉明距离分类器进行人脸识别时,二进制模板在相等错误率方面取得了很好的性能。
{"title":"Binary biometric template generation towards security and class separability","authors":"Eslam Hamouda, Xiaohui Yuan, O. Ouda, T. Hamza, Lei Chen","doi":"10.1109/ICCCNT.2014.6963117","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963117","url":null,"abstract":"Due to the wide usage of biometrics, its security issues deserve more attention. Many of biometric protection systems require the biometric templates to be presented in a binary form. Therefore, extracting binary templates from real-valued biometric data is a key step in biometric data protection systems. In addition to meeting the security and privacy requirements, binary biometric templates allow fast matching and reduced storage. The main challenge of these approaches is how to convert the real-valued templates into corresponding binary representation which retains the original information. In this paper, we present a novel method that employs Genetic Algorithms(GA)to generate a binarization scheme which used to transform the real-valued templates into robust binary ones. The main role of GA is to search for the optimal quantization and encoding parameters to generate the binarization scheme. Experiments were conducted with ORL face database for recognition. Our results demonstrated that binary templates achieved promising performance in terms of equal error rate for face recognition using a simple hamming distance classifier.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring the QoS of Personal Cloud Storage 测量个人云存储服务质量
Pengyan Shen, Kai Guo, Mingzhong Xiao
Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.
如今,个人云存储(PCS)服务已经被数以百万计的用户广泛使用,这不仅是因为其可靠的无处不在的存储,还因为许多令人兴奋的第三方应用程序基于用户的数据作为覆盖网络工作。然而,我们通常对pc的性能知之甚少,而这对于普通用户和程序员来说都是非常重要的。本文对b百度、金山软件、Box和DropBox这四种流行的pc服务进行了测量研究。通过使用存储提供商提供的REST api,我们收集了超过41,000个传输超过200GB文件的存储操作的信息,描述了文件传输速度分布,并分析了影响文件传输速度的重要方面。事实上,我们发现中国的一些重要特征不同于美国和欧洲的情况,这是很重要的。我们相信我们的工作可以帮助研究人员和开发人员理解这些流行存储服务的行为。
{"title":"Measuring the QoS of Personal Cloud Storage","authors":"Pengyan Shen, Kai Guo, Mingzhong Xiao","doi":"10.1109/ICCCNT.2014.6963099","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963099","url":null,"abstract":"Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of area and power efficient complex number multiplier 面积和功率高效的复数乘法器的设计
B. S. Premananda, S. S. Pai, B. Shashank, S. Bhat
Complex number multiplication is one of the most important arithmetic operations in signal processing. The paper proposes a design of high speed 8-bit complex number multiplier where the multiplication process is carried out using Vedic Mathematics [1], Urdhva Tiryagbhyam (Vertically and Cross-wise) sutra and the addition achieved by use of modified adder architectures to reduce the area occupied and power dissipated. Multiplication is realized using modified 8-bit multipliers [2]. The proposed 8-bit multiplier [2] results in a 6.23% increase in speed, 1.88% decrease in area and 13.84% decrease in power dissipation when compared to the normal 8-bit Vedic multiplier. Further, the proposed 8-bit complex number multiplier results in a 9.11% decrease in power dissipated when compared to the normal 8-bit complex number Vedic multiplier.
复数乘法是信号处理中最重要的算术运算之一。本文提出了一种高速8位复数乘法器的设计,其中乘法过程使用吠陀数学[1],Urdhva Tiryagbhyam(垂直和交叉)经文进行,并使用改进的加法器架构实现加法,以减少占用的面积和功耗。乘法是使用改进的8位乘法器实现的[2]。与普通的8位Vedic乘法器相比,所提出的8位乘法器[2]的速度提高了6.23%,面积减少了1.88%,功耗降低了13.84%。此外,与普通的8位复数Vedic乘法器相比,所提出的8位复数乘法器的功耗降低了9.11%。
{"title":"Design of area and power efficient complex number multiplier","authors":"B. S. Premananda, S. S. Pai, B. Shashank, S. Bhat","doi":"10.1109/ICCCNT.2014.6963017","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963017","url":null,"abstract":"Complex number multiplication is one of the most important arithmetic operations in signal processing. The paper proposes a design of high speed 8-bit complex number multiplier where the multiplication process is carried out using Vedic Mathematics [1], Urdhva Tiryagbhyam (Vertically and Cross-wise) sutra and the addition achieved by use of modified adder architectures to reduce the area occupied and power dissipated. Multiplication is realized using modified 8-bit multipliers [2]. The proposed 8-bit multiplier [2] results in a 6.23% increase in speed, 1.88% decrease in area and 13.84% decrease in power dissipation when compared to the normal 8-bit Vedic multiplier. Further, the proposed 8-bit complex number multiplier results in a 9.11% decrease in power dissipated when compared to the normal 8-bit complex number Vedic multiplier.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study of a WSN cooperation vehicle information collection method 一种WSN协同车辆信息采集方法的研究
Huang Beilei, Sheng Mingyu, Zhao Jiao
Intelligent transportation system (ITS) is an effective way to solve the increasingly serious traffic problems. It is also the development direction of traffic system in the future. The collection technology of road traffic information is one of the key technologies of ITS. Vehicle information can be obtained by the communication between vehicles and RSUs which is deployed on the side of the road. But the deployment cost of RSUs is higher. In the view of the shortage of the current information collection method, the collection method and the related technology of road traffic information have been researched in this paper, and a traffic information collection method based on WSN have been discussed. The emphasis is the data collecting and processing, and the routing strategy based on node correlation degree. Finally, the effectiveness of the scheme is analyzed.
智能交通系统(ITS)是解决日益严重的交通问题的有效途径。这也是未来交通系统的发展方向。道路交通信息采集技术是智能交通系统的关键技术之一。车辆信息可以通过车辆与部署在路边的rsu之间的通信来获取。但是rsu的部署成本更高。针对当前信息采集方法的不足,本文对道路交通信息的采集方法及相关技术进行了研究,探讨了一种基于WSN的交通信息采集方法。重点是数据的采集和处理,以及基于节点关联度的路由策略。最后,对该方案的有效性进行了分析。
{"title":"Study of a WSN cooperation vehicle information collection method","authors":"Huang Beilei, Sheng Mingyu, Zhao Jiao","doi":"10.1109/ICCCNT.2014.6963151","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963151","url":null,"abstract":"Intelligent transportation system (ITS) is an effective way to solve the increasingly serious traffic problems. It is also the development direction of traffic system in the future. The collection technology of road traffic information is one of the key technologies of ITS. Vehicle information can be obtained by the communication between vehicles and RSUs which is deployed on the side of the road. But the deployment cost of RSUs is higher. In the view of the shortage of the current information collection method, the collection method and the related technology of road traffic information have been researched in this paper, and a traffic information collection method based on WSN have been discussed. The emphasis is the data collecting and processing, and the routing strategy based on node correlation degree. Finally, the effectiveness of the scheme is analyzed.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational fluid dynamics-based system identification of marine vehicles 基于计算流体动力学的船舶系统辨识
M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd
In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.
本文提出了一种新的基于计算流体动力学的船舶和水下航行器系统辨识方法。该方法与传统的实际系统辨识实验有明显的相似性,具有直观的优点。这有助于用户快速设置可靠的仿真实验,并消除了在仿真中执行实际实验通常需要的冗长的抽象/建模。仿真时间相当合理,并且可以使用开源软件进行,从而消除了传统的基于实际实验的系统识别通常相关的高成本和“耗时”。使用两个案例研究来演示该过程,并讨论可能证明有用的候选应用程序。
{"title":"Computational fluid dynamics-based system identification of marine vehicles","authors":"M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd","doi":"10.1109/ICCCNT.2014.6963066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963066","url":null,"abstract":"In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study and application on power communication operation mode checking and analysis method 电力通信运行模式检测与分析方法的研究与应用
Shengchao Yan, S. Lv, Juan Qi
In order to realize security checking on power communication operation mode, we introduce a new method for service and system security checking and analyzing, which include the multidimensional analysis and the N-1 service impact analysis. Based on this method we managed to design and realize the system, which can monitor and display the effective mode security checking and result analysis, as well as, highly improve management efficiency for the power communication network.
为了实现对电力通信运行模式的安全检测,提出了一种新的业务和系统安全检测与分析方法,包括多维度分析和N-1业务影响分析。在此基础上,设计并实现了对有效模式安全检测和结果分析进行监控和显示的系统,极大地提高了电力通信网络的管理效率。
{"title":"Study and application on power communication operation mode checking and analysis method","authors":"Shengchao Yan, S. Lv, Juan Qi","doi":"10.1109/ICCCNT.2014.6963073","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963073","url":null,"abstract":"In order to realize security checking on power communication operation mode, we introduce a new method for service and system security checking and analyzing, which include the multidimensional analysis and the N-1 service impact analysis. Based on this method we managed to design and realize the system, which can monitor and display the effective mode security checking and result analysis, as well as, highly improve management efficiency for the power communication network.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131255448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a compact ultra wide band microstrip patch antenna 一种小型超宽带微带贴片天线的设计
Satyabrata Maiti, Sudip Kumar Rajak, A. Mukherjee
This paper deals with a new compact, ultrawideband (UWB) antenna using a coaxial probe feed technique by introducing some slots in the square patch of 20mm × 20 mm. The proposed antenna is designed to operate from 1.82 to 3.72 GHz with the center frequency at 2.20 GHz. Size reduction of 83% is also presented in this paper. The antenna has nearly good Omni-directional radiation pattern and peak gain of 3.65 dBi. The group delay profile of the proposed antenna lies within 1ns. The areas of applications are medical imaging, wireless communication, and vehicular radar. Theoretical investigations have been done by An soft designer software.
采用同轴探头馈电技术,在20mm × 20mm的方形贴片上引入一些缝隙,设计了一种新型的小型超宽带(UWB)天线。该天线工作频率为1.82 ~ 3.72 GHz,中心频率为2.20 GHz。本文还提出了尺寸减小83%的方法。该天线具有良好的全向辐射方向图,峰值增益为3.65 dBi。该天线的群延迟分布在1ns以内。应用领域包括医学成像、无线通信和车载雷达。采用An软件设计软件进行了理论研究。
{"title":"Design of a compact ultra wide band microstrip patch antenna","authors":"Satyabrata Maiti, Sudip Kumar Rajak, A. Mukherjee","doi":"10.1109/ICCCNT.2014.6963083","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963083","url":null,"abstract":"This paper deals with a new compact, ultrawideband (UWB) antenna using a coaxial probe feed technique by introducing some slots in the square patch of 20mm × 20 mm. The proposed antenna is designed to operate from 1.82 to 3.72 GHz with the center frequency at 2.20 GHz. Size reduction of 83% is also presented in this paper. The antenna has nearly good Omni-directional radiation pattern and peak gain of 3.65 dBi. The group delay profile of the proposed antenna lies within 1ns. The areas of applications are medical imaging, wireless communication, and vehicular radar. Theoretical investigations have been done by An soft designer software.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Foot plant detection for motion capture data by curve saliency 基于曲线显著性的足部植物运动捕捉数据检测
Jingting Lu, Xiaoping Liu
Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.
足部植物检测是大多数运动编辑研究的基础步骤。由于被捕获的运动的脚板,精确提取足部植物是困难的。在本文中,我们提出了一种通用的、有效的脚植物检测方法。关键思想是通过搜索边界周围最显著的点来确定足部植物的边界。通过这种方法,可以精确地从大多数平坦地形运动中提取足部植物。实验结果表明了该方法的通用性和鲁棒性。
{"title":"Foot plant detection for motion capture data by curve saliency","authors":"Jingting Lu, Xiaoping Liu","doi":"10.1109/ICCCNT.2014.6963001","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963001","url":null,"abstract":"Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1