首页 > 最新文献

2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

英文 中文
Topic Model Based Opinion Mining and Sentiment Analysis 基于主题模型的意见挖掘与情感分析
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441220
Krishna B Vamshi, A. Pandey, Kumar A. P. Siva
This paper discusses a new topic model based approach for opinion mining and sentiment analysis of text reviews posted in web forums or social media site which are mostly in unstructured in nature. In recent years, opinions are exchanged in clouds about any product, person, event or any interested topic. These opinions help in decision making for choosing a product or getting feedback about any topic. Opinion mining and sentiment analysis are related in a sense that opining mining deals with analyzing and summarizing expressed opinions whereas sentiment analysis classifies opinionated text into positive and negative. Aspect extraction is a crucial problem in sentiment analysis. Model proposed in the paper utilizes topic model for aspect extraction and support vector machine learning technique for sentiment classification of textual reviews. The goal is to automate the process of mining attitudes, opinions and hidden emotions from text.
本文讨论了一种新的基于主题模型的观点挖掘和情感分析方法,该方法适用于网络论坛或社交媒体网站上的非结构化文本评论。近年来,人们在云上交换关于任何产品、人物、事件或任何感兴趣的话题的意见。这些意见有助于做出选择产品的决策或获得关于任何主题的反馈。观点挖掘和情感分析在某种意义上是相关的,观点挖掘处理的是对表达的观点的分析和总结,而情感分析则将固执己见的文本分为积极和消极。面向抽取是情感分析中的一个关键问题。本文提出的模型利用主题模型进行方面提取,利用支持向量机器学习技术对文本评论进行情感分类。其目标是从文本中自动化挖掘态度、观点和隐藏情感的过程。
{"title":"Topic Model Based Opinion Mining and Sentiment Analysis","authors":"Krishna B Vamshi, A. Pandey, Kumar A. P. Siva","doi":"10.1109/ICCCI.2018.8441220","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441220","url":null,"abstract":"This paper discusses a new topic model based approach for opinion mining and sentiment analysis of text reviews posted in web forums or social media site which are mostly in unstructured in nature. In recent years, opinions are exchanged in clouds about any product, person, event or any interested topic. These opinions help in decision making for choosing a product or getting feedback about any topic. Opinion mining and sentiment analysis are related in a sense that opining mining deals with analyzing and summarizing expressed opinions whereas sentiment analysis classifies opinionated text into positive and negative. Aspect extraction is a crucial problem in sentiment analysis. Model proposed in the paper utilizes topic model for aspect extraction and support vector machine learning technique for sentiment classification of textual reviews. The goal is to automate the process of mining attitudes, opinions and hidden emotions from text.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Novel Design of Square and Circular Ring Triple Band Microstrip Patch Antenna for Satellite Application 卫星用方形和圆形环形三波段微带贴片天线的新设计
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441459
S. Yadav, Ankit Kumar Patel, K. Jaiswal, A. Pandey, Rajeev Singh
A novel design of square and circular ring triple band microstrip patch antenna is designed for satellite applications. The overall dimension of proposed antenna is (21×25mm2) and it consists of a defected ground structure. The antenna characteristics return loss, gain, group delay, VSWR, radiation pattern and radiation efficiency are discussed. Due to this shape of antenna, its provide triple band at resonating frequencies of 4.17 GHz, 7.48 GHz, 9.3GHz, with the respective impedance bandwidth 5.51%, 1.87% and 15.77% on FR4 substrate, with gain of 6.62 dBi, 4 dBi and 5.12 dBi. The proposed antenna is designed and simulated by HFSStool.
为卫星应用设计了一种新颖的方形和圆形环形三波段微带贴片天线。所建议的天线的总体尺寸为(21×25mm2),它由一个缺陷的地面结构组成。讨论了天线的特性,回波损耗、增益、群延迟、驻波比、辐射方向图和辐射效率。由于天线的这种形状,其在谐振频率为4.17 GHz、7.48 GHz、9.3GHz时提供三频带,在FR4衬底上阻抗带宽分别为5.51%、1.87%和15.77%,增益分别为6.62 dBi、4 dBi和5.12 dBi。利用HFSStool软件对该天线进行了设计和仿真。
{"title":"A Novel Design of Square and Circular Ring Triple Band Microstrip Patch Antenna for Satellite Application","authors":"S. Yadav, Ankit Kumar Patel, K. Jaiswal, A. Pandey, Rajeev Singh","doi":"10.1109/ICCCI.2018.8441459","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441459","url":null,"abstract":"A novel design of square and circular ring triple band microstrip patch antenna is designed for satellite applications. The overall dimension of proposed antenna is (21×25mm2) and it consists of a defected ground structure. The antenna characteristics return loss, gain, group delay, VSWR, radiation pattern and radiation efficiency are discussed. Due to this shape of antenna, its provide triple band at resonating frequencies of 4.17 GHz, 7.48 GHz, 9.3GHz, with the respective impedance bandwidth 5.51%, 1.87% and 15.77% on FR4 substrate, with gain of 6.62 dBi, 4 dBi and 5.12 dBi. The proposed antenna is designed and simulated by HFSStool.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Log sigmoid function based patch independent image haze removal method 基于Log sigmoid函数的图像去雾方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441310
Sriparna Banerjee, S. S. Chaudhuri
This paper contains a novel haze-removal algorithm, where the evaluation of the desired channel containing pixels with minimum intensity values is carried out using a patch-independent method in contrast to most of the existing methods, where this was done by dividing the images into several patches of fixed size. This helps to overcome the halo-artifacts, which are mainly present along the edges, where there is a sharp change of intensities due to non-uniform transmission within the patches. Here the atmospheric light evaluated by using a binary Support Vector Machine classifier and transmission estimation is performed by introducing a constant K1, whose value is dependent on the pixel intensity values in respective color channels. The contrast enhancement of the haze-free images obtained after scene radiance recovery and removal of artifacts present mostly in the sky region is done by using log-sigmoid function and a constant K2, whose values are dependent on standard deviation values and mean values of histograms of each color channel respectively. Moreover satisfactory results are obtained by performing comparative study of qualitative and quantitative analyses of output images obtained by applying this proposed method on hazy images with respect to various, noteworthy existing methods.
本文包含了一种新的雾霾去除算法,该算法使用一种与patch无关的方法来评估包含最小强度值像素的所需通道,而不是通过将图像划分为固定大小的几个patch来完成的大多数现有方法。这有助于克服晕形伪影,晕形伪影主要存在于边缘,在边缘,由于斑块内的不均匀传输,强度会发生急剧变化。这里使用二值支持向量机分类器评估大气光,并通过引入常数K1进行传输估计,其值依赖于各自颜色通道中的像素强度值。场景亮度恢复和去除主要存在于天空区域的伪影后得到的无雾图像的对比度增强是通过对数-sigmoid函数和常数K2来实现的,K2的值分别依赖于每个颜色通道直方图的标准差值和平均值。此外,将该方法应用于模糊图像的输出图像,与现有的各种值得注意的方法进行定性和定量分析对比研究,获得了满意的结果。
{"title":"Log sigmoid function based patch independent image haze removal method","authors":"Sriparna Banerjee, S. S. Chaudhuri","doi":"10.1109/ICCCI.2018.8441310","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441310","url":null,"abstract":"This paper contains a novel haze-removal algorithm, where the evaluation of the desired channel containing pixels with minimum intensity values is carried out using a patch-independent method in contrast to most of the existing methods, where this was done by dividing the images into several patches of fixed size. This helps to overcome the halo-artifacts, which are mainly present along the edges, where there is a sharp change of intensities due to non-uniform transmission within the patches. Here the atmospheric light evaluated by using a binary Support Vector Machine classifier and transmission estimation is performed by introducing a constant K1, whose value is dependent on the pixel intensity values in respective color channels. The contrast enhancement of the haze-free images obtained after scene radiance recovery and removal of artifacts present mostly in the sky region is done by using log-sigmoid function and a constant K2, whose values are dependent on standard deviation values and mean values of histograms of each color channel respectively. Moreover satisfactory results are obtained by performing comparative study of qualitative and quantitative analyses of output images obtained by applying this proposed method on hazy images with respect to various, noteworthy existing methods.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio 基于认证的认知无线电主用户仿真攻击缓解
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441397
J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi
With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.
随着无线通信技术的飞速发展和使用的增加,由于信道噪声和入侵者入侵数据而导致的数据损坏是不可避免的。主要用户仿真攻击是认知无线电物理层的重要攻击之一。认知无线电是为解决因过度使用无线设备而出现的频谱不足问题而兴起的。本文的重点是通过一些称为身份验证标签的特殊序列来减轻PUEA。该标签有两种生成方式:将金码作为认证标签,将伪噪声(PN)作为标签。标签嵌入信号并传输到认知无线电。减小PUEA可以消除带宽的浪费,实现有效的动态频谱接入。
{"title":"Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio","authors":"J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441397","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441397","url":null,"abstract":"With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Using Blink Parameters from EEG Data for Lie Detection 利用脑电瞬变参数进行测谎的研究
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441238
J. Immanuel, Ajay Joshua, S. George
The use of EEG signals taken from human brain showcases promising information for detecting lies and false intent in a person with increased accuracy. The physical changes detected by and EEG device are concomitant to human reaction and cannot be controlled by a person. Blinking is one such component that changes when a person lies. Blink rate cannot be simply calculated by physical observation. There are certain other methods to detect blink rate, making use of ocular tracking devices however, this method of using EEG signals to extract ocular characteristics allows this methodology to be combined with other techniques to detect lies using EEG signals. This means that a single EEG acquisition device can be used as a comprehensive lie detector. A person's blink rate decreases drastically while they are lying and then increases rapidly moments after. This can be used to check if a response to a question is true or false. For the purpose of this study we have collected data from 10 subjects, taking 10 readings from each. We have studied the number of blinks and thus the blinks per minute of a subject during and after they have told a lie. The results were then used to check if the accuracy of our method. The outcomes of the study showed a decrease in blink rate during a lie with 95.12% accuracy. This proves that blink characteristics extracted from EEG datasets can be used as an effective means to detect lies in a subject. This method provides an alternative to the existing polygraph tests used in lie detection which can conceivably be made admissible in court in the future.
从人脑中提取的脑电图信号的使用,显示了在检测一个人的谎言和虚假意图方面有希望的信息,其准确性更高。脑电图仪检测到的身体变化是伴随人的反应而来的,是人无法控制的。当一个人说谎时,眨眼就会发生变化。眨眼频率不能简单地通过物理观察来计算。还有一些其他的方法来检测眨眼频率,利用眼动追踪装置,然而,这种方法使用脑电图信号提取眼部特征,允许该方法与其他技术相结合,利用脑电图信号检测谎言。这意味着一个单一的脑电图采集设备可以作为一个全面的测谎仪。一个人在说谎时眨眼的频率会急剧下降,然后在说谎后迅速增加。这可以用来检查对问题的回答是对还是错。为了本研究的目的,我们收集了10个受试者的数据,每个受试者取10个读数。我们研究了受试者在说谎时和说谎后每分钟眨眼的次数。然后用这些结果来检验我们的方法是否准确。研究结果显示,撒谎时眨眼次数减少,准确率达到95.12%。这证明了从脑电数据中提取眨眼特征可以作为检测受试者谎言的有效手段。这种方法为现有的测谎测试提供了一种替代方法,可以想象,将来在法庭上是可以接受的。
{"title":"A Study on Using Blink Parameters from EEG Data for Lie Detection","authors":"J. Immanuel, Ajay Joshua, S. George","doi":"10.1109/ICCCI.2018.8441238","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441238","url":null,"abstract":"The use of EEG signals taken from human brain showcases promising information for detecting lies and false intent in a person with increased accuracy. The physical changes detected by and EEG device are concomitant to human reaction and cannot be controlled by a person. Blinking is one such component that changes when a person lies. Blink rate cannot be simply calculated by physical observation. There are certain other methods to detect blink rate, making use of ocular tracking devices however, this method of using EEG signals to extract ocular characteristics allows this methodology to be combined with other techniques to detect lies using EEG signals. This means that a single EEG acquisition device can be used as a comprehensive lie detector. A person's blink rate decreases drastically while they are lying and then increases rapidly moments after. This can be used to check if a response to a question is true or false. For the purpose of this study we have collected data from 10 subjects, taking 10 readings from each. We have studied the number of blinks and thus the blinks per minute of a subject during and after they have told a lie. The results were then used to check if the accuracy of our method. The outcomes of the study showed a decrease in blink rate during a lie with 95.12% accuracy. This proves that blink characteristics extracted from EEG datasets can be used as an effective means to detect lies in a subject. This method provides an alternative to the existing polygraph tests used in lie detection which can conceivably be made admissible in court in the future.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fortified File Transfer Framework - A TranSecure Model 强化文件传输框架-一个transsecure模型
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441210
N. Chidambaram, K. Vineela, Matthew J Jebin, J. Balaji, P. Raj
In this era of silicon age, the internet services have become an indispensable part of human life. People moving fast towards the digitized world and sending an information have never been much easier from the onset of file transfer applications, cloud-based applications, messengers and email services. Big companies and startups prefer cloud-based software solutions due to its accessibility, security and easy sharing features. Unfortunately, “Where there are rivers, there are potholes”. Crackers and unethical hackers exist in the environment, who make this digitization a ‘nightmare’ for newcomers and existing users. Millions of security breaches have occurred in decades in which few of them are highly severe. The hackers stole highly sensitive information such as personal and official. And this incident left with millions of information at risk of spamming, phishing attacks and etc. The proposed approach focuses the transferring file securely (TranSecure) from the authenticated user. Therefore there requires features for encrypting the data such that even if it is stolen it will be indecipherable. Thus the user's privacy is still satisfied. This demand brings out the idea of the approach which securely transmits data between users along with first in class encryption and compression for security and storage space conservation respectively.
在这个硅时代,互联网服务已经成为人类生活中不可或缺的一部分。随着文件传输应用程序、基于云的应用程序、信使和电子邮件服务的出现,人们迅速向数字化世界迈进,发送信息从未像现在这样容易。大公司和初创公司更喜欢基于云的软件解决方案,因为它的可访问性、安全性和易于共享的特性。不幸的是,“哪里有河流,哪里就有坑洼”。环境中存在着黑客和不道德的黑客,他们使数字化成为新手和现有用户的“噩梦”。几十年来发生了数以百万计的安全漏洞,其中很少有非常严重的。黑客窃取了个人和官方等高度敏感的信息。这一事件导致数百万信息面临垃圾邮件、网络钓鱼攻击等风险。提出的方法侧重于从经过身份验证的用户安全地传输文件(TranSecure)。因此,需要对数据进行加密的功能,这样即使数据被盗,也无法破译。因此,用户的隐私仍然得到了满足。这种需求引出了在用户之间安全传输数据的方法的思想,并分别采用了一流的安全性加密和压缩,以节省存储空间。
{"title":"Fortified File Transfer Framework - A TranSecure Model","authors":"N. Chidambaram, K. Vineela, Matthew J Jebin, J. Balaji, P. Raj","doi":"10.1109/ICCCI.2018.8441210","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441210","url":null,"abstract":"In this era of silicon age, the internet services have become an indispensable part of human life. People moving fast towards the digitized world and sending an information have never been much easier from the onset of file transfer applications, cloud-based applications, messengers and email services. Big companies and startups prefer cloud-based software solutions due to its accessibility, security and easy sharing features. Unfortunately, “Where there are rivers, there are potholes”. Crackers and unethical hackers exist in the environment, who make this digitization a ‘nightmare’ for newcomers and existing users. Millions of security breaches have occurred in decades in which few of them are highly severe. The hackers stole highly sensitive information such as personal and official. And this incident left with millions of information at risk of spamming, phishing attacks and etc. The proposed approach focuses the transferring file securely (TranSecure) from the authenticated user. Therefore there requires features for encrypting the data such that even if it is stolen it will be indecipherable. Thus the user's privacy is still satisfied. This demand brings out the idea of the approach which securely transmits data between users along with first in class encryption and compression for security and storage space conservation respectively.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiband Strip Line Antenna with Half Ground Structure 半接地结构的多波段带状线天线
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441240
Ankit Kumar Patel, A. Pandey, S. Yadav, Sweta Singh, Rajeev Singh
In this paper the radiation characteristics of designed antenna is presented under simultaneous excitation of both ground and patch. The designed antenna operates at multiple frequency bands in 1–100 GHz frequency range. The first four resonating modes have the fractional bandwidth of 29.8%, 8.54%, 16.23% and 12.6% with order by in the frequency range of 2.9-3.9 GHz, 9.5-10.35 GHz, 15.15-17.95 GHz and 20.45-23.2 GHz respectively. The practical implementation of the proposed antenna is suitable for WiMAX (3.5 GHz), satellite communication (S, X, Ku, Ka-band), vehicle speed detection, closed range targeting radar, SHF, RF engineering and millimeter waves (30–100 GHz). With the utilization of half ground structure the designed antenna averts a major surface-wave loss to obtain the multiband behavior for the given design structure. The presented strip line antenna has reasonably good gain and low VSWR $pmb{(< 2)}$ for all operating bands.
本文给出了所设计天线在地和贴片同时激励下的辐射特性。设计的天线在1 - 100ghz频率范围内工作于多个频段。在2.9 ~ 3.9 GHz、9.5 ~ 10.35 GHz、15.15 ~ 17.95 GHz和20.45 ~ 23.2 GHz频率范围内,前四种谐振模式的分数带宽依次为29.8%、8.54%、16.23%和12.6%。该天线的实际实现适用于WiMAX (3.5 GHz)、卫星通信(S、X、Ku、ka波段)、车速检测、近距离目标雷达、SHF、射频工程和毫米波(30-100 GHz)。设计的天线采用半接地结构,避免了大量的表面波损耗,从而获得了给定设计结构的多频段性能。所提出的带状线天线在所有工作波段均具有较好的增益和较低的驻波比$pmb{(< 2)}$。
{"title":"A Multiband Strip Line Antenna with Half Ground Structure","authors":"Ankit Kumar Patel, A. Pandey, S. Yadav, Sweta Singh, Rajeev Singh","doi":"10.1109/ICCCI.2018.8441240","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441240","url":null,"abstract":"In this paper the radiation characteristics of designed antenna is presented under simultaneous excitation of both ground and patch. The designed antenna operates at multiple frequency bands in 1–100 GHz frequency range. The first four resonating modes have the fractional bandwidth of 29.8%, 8.54%, 16.23% and 12.6% with order by in the frequency range of 2.9-3.9 GHz, 9.5-10.35 GHz, 15.15-17.95 GHz and 20.45-23.2 GHz respectively. The practical implementation of the proposed antenna is suitable for WiMAX (3.5 GHz), satellite communication (S, X, Ku, Ka-band), vehicle speed detection, closed range targeting radar, SHF, RF engineering and millimeter waves (30–100 GHz). With the utilization of half ground structure the designed antenna averts a major surface-wave loss to obtain the multiband behavior for the given design structure. The presented strip line antenna has reasonably good gain and low VSWR $pmb{(< 2)}$ for all operating bands.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks 无线传感器网络中节能、安全的多用户广播认证方案
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441228
R. Maidhili, G. Karthik
Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.
无线传感器网络(WSN)由许多具有传感器节点的集群组成。集群中的所有传感器节点连接在一起,并在网络中动态广播最新的感知数据。由于无线传感器网络的分散性和转发性,它几乎被用于所有需要多用户认证的实时应用中,但仍然可能导致冒充攻击(攻击者节点冒充合法节点,在网络中发送虚假广播消息)。为了提供安全的广播认证,并使传输速率和计算量最小化,提出了一种基于身份和汇聚节点的椭圆曲线加密方案。最初,汇聚节点通过ECC根据节点ID生成公私钥,并将私钥分发给网络中的节点,公钥分发给用户。用户使用公钥加密和广播控制消息以验证其身份验证,而节点使用接收器提供的私钥解密广播消息。如果签名得到验证,节点和用户将相互验证,否则连接将被拒绝,可以防止冒充攻击。在攻击场景中,如果攻击者冒充合法用户发送虚假的广播消息,则由于签名验证过程中出现的不匹配而疏通攻击者。该认证方案具有较高的安全性,并且可以阻止来自网络的攻击者。无线传感器网络在数据传输过程中消耗大量能量。为了提高能效,本项目采用了低能耗的MAC协议。通过在MAC层集成IEEE 802.15.4/ZigBee标准,实现无线传感器网络的节能数据采集。该工作的主要目标是在认证后进行广播,防止通过认证进行的资源消耗攻击,减少无线传感器网络通信中的能量浪费和安全性。
{"title":"Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441228","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441228","url":null,"abstract":"Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Random and Triple burst error correction code with low redundancy for Network-on-Chip link 片上网络链路的低冗余随机和三突发纠错码
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441245
M. Maheswari, B. Murugeshwari
Error correction code with higher error correction capability with minimum redundant bit is the need of the day for on-chip interconnect link. Hence, in this paper an energy competent low redundancy error correction code with more error correction is proposed. The proposed error correction code is capable of correcting single random error as well as burst errors of up to triple bits. The proposed code has redundancy bits same as that of the single error correction- double error detection (SEC-DED) Hamming code and has small increase in the decoder complexity to make it to correct up to triple burst errors. The proposed code has been implemented using 180 nm technology using verilog coding. The performance of the code has been assessed based on area and power consumption of codec as well as router placed with codec and without codec. The proposed code occupies up to 29 % less area compared to 25% less power compared to the existing codes. Also the performance of the code for residual error rate, link swing voltage and link power consumption have been analyzed and is found to be minimum compared to other codes.
具有较高纠错能力和最小冗余位的纠错码是片上互连链路的需求。为此,本文提出了一种能量胜任、纠错能力强的低冗余纠错码。所提出的纠错码既能纠错单随机错误,也能纠错高达三比特的突发错误。该码具有与单纠错-双错误检测(SEC-DED)汉明码相同的冗余位,并且解码器复杂度增加很小,可以纠错最多三次突发错误。所提出的代码已使用180纳米技术使用verilog编码实现。根据编解码器的面积和功耗,以及带编解码器和不带编解码器的路由器,对代码的性能进行了评估。与现有代码相比,拟议代码占用的面积减少了29%,功耗减少了25%。分析了该码在剩余错误率、链路摆幅电压和链路功耗方面的性能,与其他码相比,该码是最小的。
{"title":"Random and Triple burst error correction code with low redundancy for Network-on-Chip link","authors":"M. Maheswari, B. Murugeshwari","doi":"10.1109/ICCCI.2018.8441245","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441245","url":null,"abstract":"Error correction code with higher error correction capability with minimum redundant bit is the need of the day for on-chip interconnect link. Hence, in this paper an energy competent low redundancy error correction code with more error correction is proposed. The proposed error correction code is capable of correcting single random error as well as burst errors of up to triple bits. The proposed code has redundancy bits same as that of the single error correction- double error detection (SEC-DED) Hamming code and has small increase in the decoder complexity to make it to correct up to triple burst errors. The proposed code has been implemented using 180 nm technology using verilog coding. The performance of the code has been assessed based on area and power consumption of codec as well as router placed with codec and without codec. The proposed code occupies up to 29 % less area compared to 25% less power compared to the existing codes. Also the performance of the code for residual error rate, link swing voltage and link power consumption have been analyzed and is found to be minimum compared to other codes.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modified CSA-CIA for Reducing Propagation Delay 改进CSA-CIA,减少传播延迟
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441482
Shubham Sarkar, Sujan Sarkar, Jishan Mehedi
An adder is a fundamental component of various Very Large-Scale Integration (VLSI) circuits like Central Processing Unit (CPU), Arithmetic Logic Unit (ALU), Memory Access Unit (MAU) etc. A various number of operations can be achieved by adders such as addition, subtraction, multiplication, division, exponentiation etc. The basic circuit of the adder is designed using logic gates. The demand for high-performance VLSI systems are increasing rapidly for use in small and portable devices. The speed related to operation depends upon the delay of the adder as it happens to be one of the most fundamental components of all the computing units and it is a very important parameter for high performance. There have been so many research works on reducing the delay associated with the adder. In this paper, we have done a comparative study of Carry Save Adder (CSA) and Carry Increment Adder (CIA) and proposed a hybrid adder circuit to decrease the delay associated with the adder to an optimum level. As CIA has favorable performance regarding propagation delay and CSA also happens to have good performance in higher bit operations. A simulation study has been carried out for comparative study, the coding has been done using Verilog hardware description language (HDL) and the simulation has been realized with the help of Xilinx ISE 14.7 environment. The result shows the effectiveness of the hybrid circuit proposed for propagation delay improvement.
加法器是各种超大规模集成电路(VLSI)的基本组件,如中央处理器(CPU)、算术逻辑单元(ALU)、内存访问单元(MAU)等。加法器可以实现各种各样的运算,如加、减、乘、除、取幂等。加法器的基本电路采用逻辑门设计。用于小型和便携式设备的高性能VLSI系统的需求正在迅速增加。与运算相关的速度取决于加法器的延迟,因为它恰好是所有计算单元中最基本的组件之一,它是高性能的一个非常重要的参数。关于如何减少加法器的延迟,已经有很多研究工作。本文对进位保存加法器(CSA)和进位增量加法器(CIA)进行了比较研究,提出了一种混合加法器电路,将加法器相关的延迟降低到最佳水平。由于CIA在传输延迟方面具有良好的性能,而CSA在高比特运算方面也具有良好的性能。采用Verilog硬件描述语言(HDL)进行编码,并在Xilinx ISE 14.7环境下实现仿真。实验结果表明,所提出的混合电路在改善传输延迟方面是有效的。
{"title":"Modified CSA-CIA for Reducing Propagation Delay","authors":"Shubham Sarkar, Sujan Sarkar, Jishan Mehedi","doi":"10.1109/ICCCI.2018.8441482","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441482","url":null,"abstract":"An adder is a fundamental component of various Very Large-Scale Integration (VLSI) circuits like Central Processing Unit (CPU), Arithmetic Logic Unit (ALU), Memory Access Unit (MAU) etc. A various number of operations can be achieved by adders such as addition, subtraction, multiplication, division, exponentiation etc. The basic circuit of the adder is designed using logic gates. The demand for high-performance VLSI systems are increasing rapidly for use in small and portable devices. The speed related to operation depends upon the delay of the adder as it happens to be one of the most fundamental components of all the computing units and it is a very important parameter for high performance. There have been so many research works on reducing the delay associated with the adder. In this paper, we have done a comparative study of Carry Save Adder (CSA) and Carry Increment Adder (CIA) and proposed a hybrid adder circuit to decrease the delay associated with the adder to an optimum level. As CIA has favorable performance regarding propagation delay and CSA also happens to have good performance in higher bit operations. A simulation study has been carried out for comparative study, the coding has been done using Verilog hardware description language (HDL) and the simulation has been realized with the help of Xilinx ISE 14.7 environment. The result shows the effectiveness of the hybrid circuit proposed for propagation delay improvement.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 International Conference on Computer Communication and Informatics (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1