首页 > 最新文献

2014 International Conference on Communication and Signal Processing最新文献

英文 中文
Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds 通过肺音分类分析肺部疾病及检测人体肺部畸形
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950009
Jayant Mankar, P. Malviya
To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.
用听诊法分析肺音需要丰富的临床经验、良好的听诊器和良好的听音技巧。如果没有气流,肺本身就不能发声;胸腔内不同结构之间的压力差异。通过听肺音可以知道肺音的类型。裂纹产生的时间、可重复性和形状是诊断的重要参数。在本文中,我们的目的是检测和分类裂纹,以发现肺部畸形。
{"title":"Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds","authors":"Jayant Mankar, P. Malviya","doi":"10.1109/ICCSP.2014.6950009","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950009","url":null,"abstract":"To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A technical review on adaptive algorithms for acoustic echo cancellation 回声消除自适应算法研究进展
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949795
Abhishek Deb, Asutosh Kar, M. Chandra
Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.
声回波是通信中的重要问题之一。它对日常交流造成干扰。这种回声可以使用由自适应算法控制的自适应滤波器来消除。自最小均方算法(LMS)提出以来,多年来人们对该领域进行了大量的研究,以开发新的算法来有效地驱动滤波器,使其具有更好的性能。在这篇综述文章中,我们研究和讨论了所有这些算法在声学回波消除方面所做的工作。本文对现有的各种算法进行了综述,并对它们的优缺点进行了分析。它涵盖了LMS算法,递归最小二乘算法等基本算法以及它们的改进版本,如归一化最小均方算法,分数最小均方算法,滤波-x最小均方算法等。最后,在本文的最后,给出了一个表格的比较,以结束讨论。
{"title":"A technical review on adaptive algorithms for acoustic echo cancellation","authors":"Abhishek Deb, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949795","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949795","url":null,"abstract":"Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET 基于移动自治代理的MANET恶意节点检测与攻击防护性能分析
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950182
T. Stephen John, A. Aranganathan
Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.
在移动自组网(manet)中,针对移动条件下的链路和节点故障,需要为组成员提供可靠、健壮的多播路由。本文提出了一种更适合Ad Hoc网络的基于agent的组播路由方案,即点播组播路由协议(ODMRP),但采用了D-ODMRP目的驱动的点播组播路由协议,以减少转发组中需要添加的节点数量。D-ODMRP将现有的按需组播转发结构的特点引入到MANET中,以可靠网格的形式建立主干并查找组播路由。提出了一种用于MANET入侵检测系统的移动自主代理技术,该技术从源节点发射代理,随机遍历每个节点并检测恶意节点。链路故障由附近的节点检测和修复。本文对分组发送比与组播组数、节点功耗与节点数、网络面积与节点数进行了三种性能分析,结果表明本文提出的系统具有较好的性能。
{"title":"Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET","authors":"T. Stephen John, A. Aranganathan","doi":"10.1109/ICCSP.2014.6950182","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950182","url":null,"abstract":"Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Energy aware reputation based leader election for IDS in MANET 基于自适应能量感知声誉的MANET IDS领导人选举
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949972
Santoshkumar Sabat, Sujata V. Kadam
we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.
针对入侵检测服务(IDS),提出了一种高效节能的MANET领导者选举方法。由于MANET没有任何集中控制器,因此每个集群的leader选举变得非常重要。选出的leader的目的是为整个集群的IDS提供服务。我们的领导人选举是基于信誉值和每个节点的能量水平。我们在NS2环境下进行了仿真,并展示了固定传输范围节点的能耗或剩余能量与所提出的自适应能量方案的比较。自适应能量方案根据每个集群中节点之间的最大距离来调整每个节点的传输范围。与固定传输距离的节点相比,每个节点的能量是守恒的。因此leader可以为集群服务更长的生命周期,增加存活节点的百分比,节约节点的能量。
{"title":"Adaptive Energy aware reputation based leader election for IDS in MANET","authors":"Santoshkumar Sabat, Sujata V. Kadam","doi":"10.1109/ICCSP.2014.6949972","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949972","url":null,"abstract":"we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy preservation algorithm in data mining for CRM systems CRM系统数据挖掘中的隐私保护算法
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950121
Shashidhar Virupaksha, G. Sahoo, A. Vasudevan
Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.
组织拥有庞大的客户群,因此他们使用数据挖掘工具来研究他们的客户。然而,在这一过程中也可能获得有关个人的敏感信息。因此,必须保护用于数据挖掘的数据。有一些隐私保护算法可以保证隐私和保护数据。这些算法保护隐私,但数据挖掘效果显著。本文提出了一种基于聚类的噪声添加方法,既保护了隐私,又保证了数据挖掘的有效性。采用聚类技术识别数据特征,并在聚类中加入噪声,从而保留数据特征。
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blend of error control codes in OFDM - effect of channel - a comparative approach OFDM中差错控制码的混合——信道的影响——一种比较方法
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949833
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.
现代技术在商业世界中的作用是非常必要和移动的。无论是合作、电话、社交媒体等,在一个特定的行业,最终,信息是被交流的东西。它的重要性在商务交流领域得到了更多的研究和探索。与此同时,无论通信媒介如何,都非常强调各方之间的安全通信。这就是软件和神秘技术发挥作用的地方。信息安全在保护通信中涉及的消息或信息方面起着至关重要的作用。如今,从小型供应商到企业巨头,每个商业组织都直接或间接地依赖于加密专家。这项工作是数据保护技术和安全的结合。本文对正交频分复用技术中BPSK、QPSK、8QAM、16QAM、32QAM和64qam调制方案的性能进行了比较分析。RS(Reed Solomon)码与卷积码被用作串联错误控制码。然后对编码后的数据位进行加密,加强版权保护。利用AWGN(加性高斯白噪声信道)、瑞利和瑞利衰落信道等调制方案绘制了BER Vs Eb/No图。计算各种内部和外部码率的相关值,以验证加密操作。
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 50–75 GHz V-band low power and high gain down-conversion mixer 50 - 75ghz v波段低功率高增益下变频混频器的设计
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950123
K. Suriya, G. Durga
This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).
本文提出了一种基于90纳米CMOS技术的工作在弱反转偏置区的v波段低功率下变频混频器的设计。混合器在源驱动拓扑中呈现双平衡吉尔伯特单元结构,射频信号应用于门,本振(LO)信号应用于源。在标准电源电压为1.2 V的60 GHz射频信号下,实现了7.297 dB的高转换增益。其他性能参数包括:低电平到射频端口隔离度大于40 dB,三阶输入截距点(IIP3)为-1.692 dBm, OP1dB为-7.382 dBm,低电平输入功率为-6 dBm时的直流功耗为548 μW,表明该混频器适用于低功率毫米波(MMW)无线电应用。混合器的设计和模拟使用安捷伦的先进设计系统(ADS)。
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A node authentication clustering based security for ADHOC network 基于节点认证集群的ADHOC网络安全
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950038
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
在过去的几十年里,从有线网络向无线网络的迁移是一个不断发展的领域。各种无线应用都是由基于移动性和可扩展性的节点组成的。在所有的无线网络中,移动自组织网络是当今最重要和最独特的应用之一。所有的节点都是自雇的,不固定在固定的网络基础设施上,它既可以作为发送方,也可以作为接收方,在网络的通信范围内直接与网络中的其他节点通信。无线网络中的节点也可以作为中继节点向其邻居传递消息。由于无线网络中的节点具有自我配置的能力,因此它们被部署在基于关键任务的应用程序中,如军事用途或任何类型的紧急恢复。由于网络介质的开放和节点的广泛分布,使得网络容易受到恶意攻击者的攻击。在这种情况下,有必要部署有效的IDS机制来防止或保护网络免受攻击。在现有系统中,EAACK (Enhanced Adaptive Acknowledgement)作为一种IDS被提出,它是专门为MANET设计的。本文提出了一种结合E2AACK(端到端自适应确认)机制的ip溯源机制来检测和防范网络中的恶意节点。恶意节点活动可以通过ip跟踪来检测,并通过获得两端节点的确认来阻止。仿真结果表明,E2AACK方法提供了更高的检测率和预防能力,极大地影响了网络在吞吐量和延迟方面的性能。
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of a Radio on visible light system for indoor communication 一种室内通信可见光无线电系统的设计与实现
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949814
A. Devi, S. Prince
Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.
可见光通信是一种数据通信介质,使用的光谱在390nm-700nm之间。led在可见光通信(VLC)中用于数据传输和照明目的。led可以很容易地用逻辑' 1'和' 0'切换开和关,数据可以串行发送。我们可以在许多领域实现VLC,但有可能彻底改变电信行业的一个有前途的延伸是在GSM系统中部署光无线。由于医院、飞机、加油站等场所的射频限制。VLC可以作为这些问题的替代解决方案。本课题的主要目的是设计和分析光无线系统,为低限制射频区域的用户提供连接。提出了一种可见光无线电(RoVL)的原型模型,并进行了开发和测试。
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis of windowing techniques in minimizing side lobes in an antenna array 最小化天线阵列侧瓣的加窗技术的比较分析
Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950075
Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth
Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.
为了减小天线辐射方向图中的侧瓣,人们进行了大量的研究。在这一过程中采用了许多新颖的技术。窗窗技术是减少侧叶的关键技术之一。本文的重点是评价和比较不同加窗技术在减少端射阵列侧瓣方面的效率。比较选择的窗法有Bartlett窗、Hamming窗、Hanning窗、Blackman Harris窗。数组中的元素数分别为8和16。最后,我们比较了每个窗口在侧瓣电平(SLL)方面的性能,并生成了每个窗口的极坐标图和辐射图。因此我们发现布莱克曼哈里斯窗口的性能非常好而且是一个非常好的通用窗口,有很好的副瓣抑制和中等宽度的主瓣。
{"title":"Comparative analysis of windowing techniques in minimizing side lobes in an antenna array","authors":"Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth","doi":"10.1109/ICCSP.2014.6950075","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950075","url":null,"abstract":"Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 International Conference on Communication and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1