首页 > 最新文献

2011 International Conference on Electronics, Communication and Computing Technologies最新文献

英文 中文
Security enhancement for MIMO based wireless network using codebook and diversity multiplexing 利用码本和分集复用技术增强MIMO无线网络的安全性
R. Raicheal, C. Arunachalaperumal
In this paper we study about the secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed.
本文利用基于码本的有限反馈传输波束形成的保密性能,研究了无线共享介质间的安全通信。避免攻击者窃取机密数据。在反馈方法中,发送方使用发送方已知的预定义码本,接收方在波束形成过程中产生指标值作为反馈后知道该码本。分析保密中断概率,判断是否被窃取。给出了保密中断概率的约束值。研究了短期功率约束下多天线(MIMO)线接信道的衰落问题。在没有发送端信道状态信息(CSI)和完全CSI的情况下,发现了秘密分集复用权衡(DMT)。当发射机没有CSI时,在使用高斯码本的同时,似乎发射机和接收机的天线都被窃取了,并且秘密DMT取决于其他自由度。当CSI在发射机(CSIT)可用时,发射机天线只被窃取。
{"title":"Security enhancement for MIMO based wireless network using codebook and diversity multiplexing","authors":"R. Raicheal, C. Arunachalaperumal","doi":"10.1109/ICECCT.2011.6077079","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077079","url":null,"abstract":"In this paper we study about the secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudo-orthogonal signature sequences for fiber optic CDMA LAN 光纤CDMA局域网的伪正交签名序列
B. Pakiaraj, M. Baladjy, R. Divya
In this paper the bit-error rate performances using Gaussian approximation technique and pseudo-orthogonal prime sequence code with a modified prime sequence code using the elements of Galoi's Field for a particular prime number have been developed. The capacities of the prime sequence codes are determined. Detailed simulation results shows the performance of the codes. The codes are useful for medium access in fiber optic CDMA LAN.
本文研究了利用高斯近似技术和伪正交素数序列码的误码率性能,并利用伽罗瓦域的元素改进了伪正交素数序列码。确定了素数序列码的容量。详细的仿真结果表明了代码的性能。该编码可用于光纤CDMA局域网的介质接入。
{"title":"Pseudo-orthogonal signature sequences for fiber optic CDMA LAN","authors":"B. Pakiaraj, M. Baladjy, R. Divya","doi":"10.1109/ICECCT.2011.6077078","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077078","url":null,"abstract":"In this paper the bit-error rate performances using Gaussian approximation technique and pseudo-orthogonal prime sequence code with a modified prime sequence code using the elements of Galoi's Field for a particular prime number have been developed. The capacities of the prime sequence codes are determined. Detailed simulation results shows the performance of the codes. The codes are useful for medium access in fiber optic CDMA LAN.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of Supply Chain Management in Rourkela steel plant 鲁克拉钢铁厂供应链管理自动化
R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda
This paper discusses the implementation of automated Supply Chain Management (SCM) in Rourkela steel plant. This paper covers the model of a SCM, highlight the complexity in Supply Chain Management. Finally this paper will suggest implementation of RFID technology at Rourkela Steel Plant to improve the existing logistic in transportation system and identification of items.
本文讨论了自动化供应链管理(SCM)在鲁克拉钢铁厂的实施。本文介绍了供应链管理的模型,强调了供应链管理的复杂性。最后,本文将建议在鲁克拉钢铁厂实施RFID技术,以改善现有的物流运输系统和物品识别。
{"title":"Automation of Supply Chain Management in Rourkela steel plant","authors":"R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda","doi":"10.1109/ICECCT.2011.6077063","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077063","url":null,"abstract":"This paper discusses the implementation of automated Supply Chain Management (SCM) in Rourkela steel plant. This paper covers the model of a SCM, highlight the complexity in Supply Chain Management. Finally this paper will suggest implementation of RFID technology at Rourkela Steel Plant to improve the existing logistic in transportation system and identification of items.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design & implementation of ARM based data acquisition system 基于ARM的数据采集系统的设计与实现
Mahboob Imran Shaik
The Rapid development of technologies in the field of electronics has brought tremendous changes in every walk of human life without being limited to any particular field. Starting with many transistors and other electronic components to embedding of large number of transistors along with in numerable other electronic components in a single chip, that too in a compact single chip, with the properties of diverse/ different functions. And these developments in electronics have also entered the ever growing field of industrial processes, viz., optimization of production, safety related aspects etc. The Design & Implementation of ARM Based Data Acquisition System presented here is an intelligent remote unit based on embedded technology for data acquisition, monitoring and output control. This system is very much compact in design, as it uses a highly integrated 32-bit RISC microcontroller along with serial A/D and D/A converters. This Device has high performance and offers the widest range of features viz., flexibility, reliability, durability, when compared with conventional and old solutions to control and data acquisition. The capabilities of input and output are expandable to maximize the functions of the system and also can be used for different applications in real time environment to control and data acquisition. Besides being a single stand-alone system, the tasks like the control, supervision, data acquisition can even be accomplished through Ethernet within the local area network (LAN) of an industrial area.
电子技术的迅速发展给人类生活的各个方面带来了巨大的变化,而不仅仅局限于某一特定领域。从许多晶体管和其他电子元件到在单个芯片中嵌入大量晶体管以及许多其他电子元件,这也是在一个紧凑的单个芯片中,具有多种/不同功能的特性。电子的这些发展也进入了不断增长的工业过程领域,即生产优化,安全相关方面等。本文介绍的基于ARM的数据采集系统的设计与实现,是一种基于嵌入式技术的数据采集、监控和输出控制的智能远程单元。该系统在设计上非常紧凑,因为它使用高度集成的32位RISC微控制器以及串行a /D和D/ a转换器。与传统和旧的控制和数据采集解决方案相比,该设备具有高性能,并提供最广泛的功能,即灵活性,可靠性,耐用性。输入和输出的能力是可扩展的,以最大限度地发挥系统的功能,也可以用于不同的应用程序在实时环境中的控制和数据采集。除了作为一个独立的系统,控制、监督、数据采集等任务甚至可以通过工业区域局域网(LAN)内的以太网来完成。
{"title":"Design & implementation of ARM based data acquisition system","authors":"Mahboob Imran Shaik","doi":"10.1109/ICECCT.2011.6077066","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077066","url":null,"abstract":"The Rapid development of technologies in the field of electronics has brought tremendous changes in every walk of human life without being limited to any particular field. Starting with many transistors and other electronic components to embedding of large number of transistors along with in numerable other electronic components in a single chip, that too in a compact single chip, with the properties of diverse/ different functions. And these developments in electronics have also entered the ever growing field of industrial processes, viz., optimization of production, safety related aspects etc. The Design & Implementation of ARM Based Data Acquisition System presented here is an intelligent remote unit based on embedded technology for data acquisition, monitoring and output control. This system is very much compact in design, as it uses a highly integrated 32-bit RISC microcontroller along with serial A/D and D/A converters. This Device has high performance and offers the widest range of features viz., flexibility, reliability, durability, when compared with conventional and old solutions to control and data acquisition. The capabilities of input and output are expandable to maximize the functions of the system and also can be used for different applications in real time environment to control and data acquisition. Besides being a single stand-alone system, the tasks like the control, supervision, data acquisition can even be accomplished through Ethernet within the local area network (LAN) of an industrial area.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134627935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A temporal table authenticated routing protocol for adhoc networks 临时表认证路由协议用于自组织网络
R. Sudha, S. Lecturer, D. Sivakumar
Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs' attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities Much work is going on to provide security to the network. One of the solution to the problem is ARAN — (Authenticated routing protocol) which is a secure protocol and provides Integrity, availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses Temporal table based schemes that can be applied to ARAN to detect selfish node and improve the performance.
移动自组织网络(MANET)是一种多跳无线移动节点的集合,在没有集中控制或建立基础设施的情况下相互通信。由于节点的移动性、干扰和基础设施较少,该网络中的无线链路非常容易出错,并且经常出现故障。因此,在一个高度动态的环境中,路由是一项至关重要的任务。近年来,针对移动自组织网络提出了几种路由协议,其中突出的是DSR, AODV和TORA。然而,这些MANET安全路由协议中的大多数并没有为所有MANET的攻击提供完整的解决方案,并且假设参与MANET的任何节点都不是自私的,并且它将合作支持不同的网络功能。其中一种解决方案是ARAN -(认证路由协议),它是一种安全协议,提供完整性、可用性、机密性、真实性、不可否认性、授权和匿名性,但经过认证的自私节点可能会推断该协议的性能,并可能通过丢弃数据包来干扰网络。本文讨论了一种基于时态表的方案,该方案可以应用于ARAN来检测自利节点,从而提高性能。
{"title":"A temporal table authenticated routing protocol for adhoc networks","authors":"R. Sudha, S. Lecturer, D. Sivakumar","doi":"10.1109/ICECCT.2011.6077060","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077060","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs' attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities Much work is going on to provide security to the network. One of the solution to the problem is ARAN — (Authenticated routing protocol) which is a secure protocol and provides Integrity, availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses Temporal table based schemes that can be applied to ARAN to detect selfish node and improve the performance.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Modelling and performance analysis of PID power system stabilizer using adaptation law in Simulink environment Simulink环境下基于自适应律的PID电力系统稳定器建模与性能分析
K. Gowrishankar
In this paper, a self tuning Proportional Integral Derivative (PID) with PSS controller is presented for improving stability of a system in simulink environment. The development of a PID with power system stabilizer in order to maintain stability and enhance the performance of a power system is described widely. The application of the PID with PSS controller is investigated by means of simulation studies on a single machine infinite bus system. The functional blocks of PID with PSS are developed in Simulink and simulation studies are carried out. A study case for the validation of the proposed simulink mechanism is presented and analysed with control application for a synchronous generator excitation system. The superior performance of this stabilizer in comparison to PSS proves the efficiency of this new PID with PSS controller. The comparison studies carried out for various results such as speed deviation, field voltage, rotor angle and load angle in Simulink based MATLAB environment.
为了提高系统在simulink环境下的稳定性,提出了一种带PSS控制器的自整定比例积分导数(PID)方法。为了保持电力系统的稳定和提高电力系统的性能,人们广泛地描述了带稳定器的PID的发展。通过对单机无限总线系统的仿真研究,探讨了PID与PSS控制器的应用。在Simulink中开发了带PSS的PID功能模块,并进行了仿真研究。通过对同步发电机励磁系统的控制应用,对所提出的simulink机构进行了验证和分析。与PSS相比,该稳定器的优越性能证明了该PID与PSS控制器的有效性。在基于Simulink的MATLAB环境下,对转速偏差、场电压、转子角、负载角等各种结果进行了对比研究。
{"title":"Modelling and performance analysis of PID power system stabilizer using adaptation law in Simulink environment","authors":"K. Gowrishankar","doi":"10.1109/ICECCT.2011.6077075","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077075","url":null,"abstract":"In this paper, a self tuning Proportional Integral Derivative (PID) with PSS controller is presented for improving stability of a system in simulink environment. The development of a PID with power system stabilizer in order to maintain stability and enhance the performance of a power system is described widely. The application of the PID with PSS controller is investigated by means of simulation studies on a single machine infinite bus system. The functional blocks of PID with PSS are developed in Simulink and simulation studies are carried out. A study case for the validation of the proposed simulink mechanism is presented and analysed with control application for a synchronous generator excitation system. The superior performance of this stabilizer in comparison to PSS proves the efficiency of this new PID with PSS controller. The comparison studies carried out for various results such as speed deviation, field voltage, rotor angle and load angle in Simulink based MATLAB environment.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient data replication method for data access applications in vehicular ad-hoc networks 车载自组织网络中数据访问应用的一种高效数据复制方法
M. Akila, T. Iswarya
Due to the high vehicle mobility, the topology of vehicular ad hoc networks (VANETs) dynamically changes, and disconnections may frequently occur. When two vehicles are disconnected, they are not able to access data from each other. Data replication has been widely used to reduce the effect of intermittent connectivity and improve data access performance in distributed systems. However, many nodes in VANET may only have limited storage space, and thus cannot replicate all the data such as large music files or video clips. To address this problem, we propose an efficient data replication method for data access applications in VANETs. In this method the vehicles are grouped into a platoon and they contribute part of their buffers to replicate data for others in the same platoon and share data with them. When a vehicle leaves the platoon, it prefetches interested data and transfers its buffered data to other vehicles in advance so that they can still access the data after it leaves. We implement this algorithm in NS-2 and GrooveNet Simulators. The GroveNet Simulator is used to generate the vehicle mobility trace file, which is used in the ns-2 simulations. Extensive simulation results show that this method provides high data availability, low data access overhead, and low false alarm rate.
由于车辆的高移动性,车辆自组织网络(vanet)的拓扑结构会发生动态变化,并且经常发生断开。当两辆车断开连接时,它们无法访问彼此的数据。在分布式系统中,数据复制被广泛用于减少间歇性连接的影响和提高数据访问性能。然而,VANET中的许多节点可能只有有限的存储空间,因此无法复制所有数据,例如大型音乐文件或视频剪辑。为了解决这个问题,我们提出了一种高效的数据复制方法,用于VANETs中的数据访问应用。在这种方法中,车辆被分组成一个排,它们贡献一部分缓冲区为同一排中的其他车辆复制数据并与它们共享数据。当车辆离开队列时,它会预取感兴趣的数据,并提前将其缓冲的数据传输给其他车辆,以便在车辆离开后它们仍然可以访问这些数据。我们在NS-2和GrooveNet模拟器上实现了该算法。使用GroveNet Simulator生成ns-2仿真中使用的车辆移动跟踪文件。大量的仿真结果表明,该方法具有较高的数据可用性、较低的数据访问开销和较低的虚警率。
{"title":"An efficient data replication method for data access applications in vehicular ad-hoc networks","authors":"M. Akila, T. Iswarya","doi":"10.1109/ICECCT.2011.6077062","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077062","url":null,"abstract":"Due to the high vehicle mobility, the topology of vehicular ad hoc networks (VANETs) dynamically changes, and disconnections may frequently occur. When two vehicles are disconnected, they are not able to access data from each other. Data replication has been widely used to reduce the effect of intermittent connectivity and improve data access performance in distributed systems. However, many nodes in VANET may only have limited storage space, and thus cannot replicate all the data such as large music files or video clips. To address this problem, we propose an efficient data replication method for data access applications in VANETs. In this method the vehicles are grouped into a platoon and they contribute part of their buffers to replicate data for others in the same platoon and share data with them. When a vehicle leaves the platoon, it prefetches interested data and transfers its buffered data to other vehicles in advance so that they can still access the data after it leaves. We implement this algorithm in NS-2 and GrooveNet Simulators. The GroveNet Simulator is used to generate the vehicle mobility trace file, which is used in the ns-2 simulations. Extensive simulation results show that this method provides high data availability, low data access overhead, and low false alarm rate.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security layers and reliable communications towards green computing 面向绿色计算的安全层和可靠通信
T. Narasimmalou, G. Appasami
Green computing is one of the emerging computing technologies to provide Green environment. It is mainly used to protect environment, optimize energy consumption and keeps green environment. Green computing also refers to environmentally energy sustainable computing. Modern world needs Secured and reliable data in unsecured communications. Energy efficient usage, Optimum resource allocation and dynamic routing help for green computing. The intelligent machines collaborative decisions and information sharing without direct human intervention is one Machine point to another machine point communication. In this paper we discussed secured and reliable point to point communications towards green computing.
绿色计算是提供绿色环境的新兴计算技术之一。主要用于保护环境,优化能源消耗,保持绿色环境。绿色计算也指环境能源可持续的计算。现代世界需要在不安全的通信中获得安全可靠的数据。能源高效使用、资源优化分配和动态路由有助于实现绿色计算。智能机器在没有人类直接干预的情况下进行协同决策和信息共享,是一个机器点与另一个机器点之间的通信。本文讨论了面向绿色计算的安全可靠的点对点通信。
{"title":"Security layers and reliable communications towards green computing","authors":"T. Narasimmalou, G. Appasami","doi":"10.1109/ICECCT.2011.6077080","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077080","url":null,"abstract":"Green computing is one of the emerging computing technologies to provide Green environment. It is mainly used to protect environment, optimize energy consumption and keeps green environment. Green computing also refers to environmentally energy sustainable computing. Modern world needs Secured and reliable data in unsecured communications. Energy efficient usage, Optimum resource allocation and dynamic routing help for green computing. The intelligent machines collaborative decisions and information sharing without direct human intervention is one Machine point to another machine point communication. In this paper we discussed secured and reliable point to point communications towards green computing.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation and management solution for privacy identification and electrical energy theft 隐私识别与电能盗窃调查管理解决方案
A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi
This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.
本文讨论了一个系统来确定一个给定的人的身份请求是否存在。检查是通过比较申请人属性(签名除外)和注册数据库来执行的。在生物特征资料的搜寻方面,生物特征识别系统(BIS),即自动指纹识别系统(AFIS)数据库,是根据在申请记录上捕获的生物特征资料进行搜寻的。如果匹配的记录已经存在,或者存在一些部分匹配的记录,那么应用程序处理将被路由到“Resolve Duplicate”流程。欺诈调查应用程序建立在隐私识别和管理解决方案(PRIMS)框架上,该框架基于身份识别和认证解决方案。该解决方案的结构是实时捕获个人身份和生物特征数据,并立即检查个人身份,并使用该框架制作电子身份证和护照。PRIMS框架支持身份管理,如人员登记和申请处理、身份验证、安全文件制作和卡片库存控制、发放和发放后管理、服务点的认证/授权。PRIMS框架是用灵活的、基于组件的、面向服务的体系结构构建的。PRIMS框架集成了管理注册人员端到端生命周期和保护文件所需的许多功能。PRIMS提供了一个高度可配置的工作流和业务规则引擎,并允许显著的可变性,以支持注册处理领域的独特客户需求、安全文档的不同技术、不同的解决方案和生物识别技术的使用。
{"title":"Investigation and management solution for privacy identification and electrical energy theft","authors":"A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi","doi":"10.1109/ICECCT.2011.6077073","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077073","url":null,"abstract":"This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault tolerant wireless sensor network for remote data acquisition 用于远程数据采集的容错无线传感器网络
R. K. Mugelan, M. Alsath, V. Yokesh
This paper enables the personnel to monitor and acquire data from hazardous environments where the human inspection is difficult. The wireless sensor motes are developed for measuring the real-time parameters like temperature, humidity, pressure etc. Further ZigBee protocol has been utilized to enable Inter networking of sensor motes which allows the personnel to aggregate data which makes the available data more reliable. The data sensed by different motes are communicated to the cluster head. The cluster head performs data aggregation which is then communicated to the officials through GSM technology. Whenever the measured real time data crosses a predefined threshold, a complete picture of the environment is sent to the official's mobile as MMS. Failure of any node wont affect the Data Aggregation and data from the remaining node can be used to know about the Environment. The proposed algorithm is built using Atmel Processor and the results are presented.
本文使人员能够监控和获取人类难以检测的危险环境中的数据。开发了用于实时测量温度、湿度、压力等参数的无线传感器。此外,还利用ZigBee协议实现传感器节点的互连网络,使人员能够聚合数据,从而使可用数据更加可靠。不同节点感知到的数据被传送到簇头。集群头执行数据聚合,然后通过GSM技术与官员通信。每当测量的实时数据超过预定义的阈值时,一幅完整的环境图像就会以彩信的形式发送到官员的手机上。任何节点的故障都不会影响数据聚合,剩余节点的数据可用于了解环境。在Atmel处理器上构建了该算法,并给出了结果。
{"title":"Fault tolerant wireless sensor network for remote data acquisition","authors":"R. K. Mugelan, M. Alsath, V. Yokesh","doi":"10.1109/ICECCT.2011.6077072","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077072","url":null,"abstract":"This paper enables the personnel to monitor and acquire data from hazardous environments where the human inspection is difficult. The wireless sensor motes are developed for measuring the real-time parameters like temperature, humidity, pressure etc. Further ZigBee protocol has been utilized to enable Inter networking of sensor motes which allows the personnel to aggregate data which makes the available data more reliable. The data sensed by different motes are communicated to the cluster head. The cluster head performs data aggregation which is then communicated to the officials through GSM technology. Whenever the measured real time data crosses a predefined threshold, a complete picture of the environment is sent to the official's mobile as MMS. Failure of any node wont affect the Data Aggregation and data from the remaining node can be used to know about the Environment. The proposed algorithm is built using Atmel Processor and the results are presented.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"596 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 International Conference on Electronics, Communication and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1