Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878223
Shaik Khashirunnisa, B. K. Chand, B. Kumari
State space estimation approaches are one of the finest approaches to predict the future behavior of real time systems like tracking, navigation, guidance systems etc. Kalman filter is employed for the estimation of system dynamics. It is very important to tune the parameters observation noise (measurement noise) and plant noise (process noise) for better estimation of dynamics of the system especially in tracking applications. Tuning of measurement noise and plant noise can be done through Nature Inspired Optimization techniques. Fuzzy logic is another approach to tune these parameters. In this paper the authors tried to estimate target motion parameters using Kalman filter and the performance is analyzed using the tuning methods Wind Driven Optimization (WDO) and fuzzy logic.
{"title":"Performance analysis of Kalman filter, fuzzy Kalman filter and wind driven optimized Kalman filter for tracking applications","authors":"Shaik Khashirunnisa, B. K. Chand, B. Kumari","doi":"10.1109/CCINTELS.2016.7878223","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878223","url":null,"abstract":"State space estimation approaches are one of the finest approaches to predict the future behavior of real time systems like tracking, navigation, guidance systems etc. Kalman filter is employed for the estimation of system dynamics. It is very important to tune the parameters observation noise (measurement noise) and plant noise (process noise) for better estimation of dynamics of the system especially in tracking applications. Tuning of measurement noise and plant noise can be done through Nature Inspired Optimization techniques. Fuzzy logic is another approach to tune these parameters. In this paper the authors tried to estimate target motion parameters using Kalman filter and the performance is analyzed using the tuning methods Wind Driven Optimization (WDO) and fuzzy logic.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878212
Sourajit Das, U. Jena
The paper presents a unique combination of texture feature extraction techniques which can be used in image texture analysis. Setting the prime objective of classifying different texture images, the Local Binary Pattern (LBP) and a modified form of Gray Level Run Length Matrix (GLRLM) are implemented initially. The next phase involves use of combination of the former two methods to extract improved features. The feature vectors were obtained by defining the features on the transformed images. These texture features are classified using two classification algorithms, KNN and multiclass SVM. The results of above feature extraction techniques with individual classifiers have been compared. The comparison yields that the combination of LBP and GLRLM texture features shows better classification rate than the features obtained from individual feature extraction techniques. Among the classifiers, Support Vector Machine has better classification rate than the Nearest Neighbor approach for the texture classification.
{"title":"Texture classification using combination of LBP and GLRLM features along with KNN and multiclass SVM classification","authors":"Sourajit Das, U. Jena","doi":"10.1109/CCINTELS.2016.7878212","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878212","url":null,"abstract":"The paper presents a unique combination of texture feature extraction techniques which can be used in image texture analysis. Setting the prime objective of classifying different texture images, the Local Binary Pattern (LBP) and a modified form of Gray Level Run Length Matrix (GLRLM) are implemented initially. The next phase involves use of combination of the former two methods to extract improved features. The feature vectors were obtained by defining the features on the transformed images. These texture features are classified using two classification algorithms, KNN and multiclass SVM. The results of above feature extraction techniques with individual classifiers have been compared. The comparison yields that the combination of LBP and GLRLM texture features shows better classification rate than the features obtained from individual feature extraction techniques. Among the classifiers, Support Vector Machine has better classification rate than the Nearest Neighbor approach for the texture classification.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130537752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878230
Rudresh Kumar, Divya Singh, T. C. Shami, H. Baskey, N. Prasad
Microwave absorbing materials are of vital importance in solving the increasing menace of electromagnetic interference problems, caused due to the proliferation of electronic devices & systems. They have potential applications in the stealth technology for radar cross section reduction. In this paper, a radar absorber structural (RAS) composite has been proposed for frequency region 8.2–18 GHz. Proposed RAS composite is based on sandwich structure where indigenously developed syntactic foam has been used as care material. RAS is designed with impedance gradation for attenuation of microwave energy and shows better than 10 dB reflection loss in X (8.2–12.4 GHz) & Ku (12.4–18 GHz) band frequency region. The measurement results of fabricated RAS composite are in good concurrence to the simulated results. The proposed RAS is compact with less weight penalty, environmental resistance, and good mechanical strength.
{"title":"Design, fabrication and evaluation of low density, broadband microwave absorbing composite for X & Ku band","authors":"Rudresh Kumar, Divya Singh, T. C. Shami, H. Baskey, N. Prasad","doi":"10.1109/CCINTELS.2016.7878230","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878230","url":null,"abstract":"Microwave absorbing materials are of vital importance in solving the increasing menace of electromagnetic interference problems, caused due to the proliferation of electronic devices & systems. They have potential applications in the stealth technology for radar cross section reduction. In this paper, a radar absorber structural (RAS) composite has been proposed for frequency region 8.2–18 GHz. Proposed RAS composite is based on sandwich structure where indigenously developed syntactic foam has been used as care material. RAS is designed with impedance gradation for attenuation of microwave energy and shows better than 10 dB reflection loss in X (8.2–12.4 GHz) & Ku (12.4–18 GHz) band frequency region. The measurement results of fabricated RAS composite are in good concurrence to the simulated results. The proposed RAS is compact with less weight penalty, environmental resistance, and good mechanical strength.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878237
A. Yadav, N. Yadav
In this work an introduction to intelligent electric vehicle is presented. Design and development of intelligent vehicle for intelligent behavior quick output, cost is very cheap and it avoided the hurdle in his way so it is called safe intelligent electric vehicle. An introduction of intelligent vehicle that how it changes his performances according to the environment that can adapt the change as like environment. Also describes the application of intelligent machines. Intelligence machines number of areas like aerial navigation, sea and space exploration and multitalented robots are presented.
{"title":"An intelligent electric vehicle (IEV) using LabVIEW","authors":"A. Yadav, N. Yadav","doi":"10.1109/CCINTELS.2016.7878237","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878237","url":null,"abstract":"In this work an introduction to intelligent electric vehicle is presented. Design and development of intelligent vehicle for intelligent behavior quick output, cost is very cheap and it avoided the hurdle in his way so it is called safe intelligent electric vehicle. An introduction of intelligent vehicle that how it changes his performances according to the environment that can adapt the change as like environment. Also describes the application of intelligent machines. Intelligence machines number of areas like aerial navigation, sea and space exploration and multitalented robots are presented.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878191
Kshitij Sirohi, Aastha Tanwar, Himanshu, P. Jindal
This paper presents the automated irrigation system with enhanced water conservation, using weather forecast and concept of wireless sensor networks. Each node consisting of soil moisture, smoke and temperature sensors communicates with the coordinator, using ZigBee protocol, which then sends updates to the farmer via SMS using GSM protocol. Hargreaves equation for reference evapotranspiration has been used for the determination of water requirements of the crop. Based upon the calculated crop evapotranspiration from the equation and rainfall forecast obtained from the internet, irrigation cycle of the crop has been modified. An experimental test bed has been developed to implement the proposed idea which can be easily and effectively extended to actual crop fields. The proposed work is very useful for farmers due to the prevailing unpredictable weather conditions.
{"title":"Automated irrigation and fire alert system based on hargreaves equation using weather forecast and ZigBee protocol","authors":"Kshitij Sirohi, Aastha Tanwar, Himanshu, P. Jindal","doi":"10.1109/CCINTELS.2016.7878191","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878191","url":null,"abstract":"This paper presents the automated irrigation system with enhanced water conservation, using weather forecast and concept of wireless sensor networks. Each node consisting of soil moisture, smoke and temperature sensors communicates with the coordinator, using ZigBee protocol, which then sends updates to the farmer via SMS using GSM protocol. Hargreaves equation for reference evapotranspiration has been used for the determination of water requirements of the crop. Based upon the calculated crop evapotranspiration from the equation and rainfall forecast obtained from the internet, irrigation cycle of the crop has been modified. An experimental test bed has been developed to implement the proposed idea which can be easily and effectively extended to actual crop fields. The proposed work is very useful for farmers due to the prevailing unpredictable weather conditions.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878216
Suddha Shakti Goutam Ashe, I. Ali
In recent years, the rapid growth of the silent killer, Diabetes, is a major reason of concern for health and also started a buzz among our society. On the same time, World Health Organization (WHO) is a dedicated health organization from United Nations quotes, “By 2030 diabetes will be one of the seventh leading causes of death, whereas, the global prevalence of diabetes was estimated to be about 9% among adults aged above 18 (measured in 2014)”. Though, diabetes is not completely curable but early stage detection can helps in controlling the degree of severity of this silent killer. One of the controlling factors, which could help in early detection, is the retina of the eye, a light sensitive metabolically active region on which noninvasive observation can possible. As eye is a metabolically active organ, it gets affected at the earliest stage for the people suffering from Diabetes. Thereafter, analyzing the symptoms of retina, like, miroaneurysms, exudates, and edemas can predict the degree of severity. Since, a plan is required towards the studying these symptoms on digital image, the fundus image of the retina, and the detection of attributes, like, miroaneurysms, exudates and edemas. Before carrying out the analysis, it is very essential to properly locate the optic disc and macula which are geometrically important for the detection of Diabetic Retinopathy on digital images. In this paper, we propose intensity based preprocessing algorithm which is suitable for the detection of optic disc (OD) and Macula before the analysis of Diabetic Retinopathy.
{"title":"A new method for detection of optical disc and macula for diabetic retinopathy","authors":"Suddha Shakti Goutam Ashe, I. Ali","doi":"10.1109/CCINTELS.2016.7878216","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878216","url":null,"abstract":"In recent years, the rapid growth of the silent killer, Diabetes, is a major reason of concern for health and also started a buzz among our society. On the same time, World Health Organization (WHO) is a dedicated health organization from United Nations quotes, “By 2030 diabetes will be one of the seventh leading causes of death, whereas, the global prevalence of diabetes was estimated to be about 9% among adults aged above 18 (measured in 2014)”. Though, diabetes is not completely curable but early stage detection can helps in controlling the degree of severity of this silent killer. One of the controlling factors, which could help in early detection, is the retina of the eye, a light sensitive metabolically active region on which noninvasive observation can possible. As eye is a metabolically active organ, it gets affected at the earliest stage for the people suffering from Diabetes. Thereafter, analyzing the symptoms of retina, like, miroaneurysms, exudates, and edemas can predict the degree of severity. Since, a plan is required towards the studying these symptoms on digital image, the fundus image of the retina, and the detection of attributes, like, miroaneurysms, exudates and edemas. Before carrying out the analysis, it is very essential to properly locate the optic disc and macula which are geometrically important for the detection of Diabetic Retinopathy on digital images. In this paper, we propose intensity based preprocessing algorithm which is suitable for the detection of optic disc (OD) and Macula before the analysis of Diabetic Retinopathy.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126703713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878193
Amit Barve, Ashwin Kini, Onkar Ekbote, J. Abraham
Routing algorithms in Mobile Ad hoc Networks like DSR, AODV use flooding as the primary mechanism for discovery of routes in the network. In flooding, each node forwards flood packets to its neighbors so as to ensure that the packets reach the intended destination. Forwarding of redundant flood packets create extra overhead on network bandwidth. However, only a subset of nodes need to forward the packet to make it reach its destination. Clustering has been proven as an efficient mechanism to reduce flooding overhead in MANETs. Active Clustering algorithms use explicit control packets to create and maintain clusters whereas passive clustering piggybacks the control information in the outgoing data packets thus significantly reducing control overhead. The proposed algorithm integrates Passive Clustering with DSR routing protocol. Route Discovery phase of DSR floods the Route Request packets in the entire network. However, the proposed algorithm creates the clusters in the network in the initial phase of Route Discovery process and once the clusters are formed only a subset of nodes will forward the Route Request packets. This approach reduces the overhead on bandwidth by curtailing the flooding of packets and thereby increasing the packet delivery ratio. The simulation results show that optimized DSR algorithm enhances the packet delivery ratio by minimum of 20% and reduces the RREQ flooding by a minimum of 30%.
{"title":"Optimization of DSR routing protocol in MANET using passive clustering","authors":"Amit Barve, Ashwin Kini, Onkar Ekbote, J. Abraham","doi":"10.1109/CCINTELS.2016.7878193","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878193","url":null,"abstract":"Routing algorithms in Mobile Ad hoc Networks like DSR, AODV use flooding as the primary mechanism for discovery of routes in the network. In flooding, each node forwards flood packets to its neighbors so as to ensure that the packets reach the intended destination. Forwarding of redundant flood packets create extra overhead on network bandwidth. However, only a subset of nodes need to forward the packet to make it reach its destination. Clustering has been proven as an efficient mechanism to reduce flooding overhead in MANETs. Active Clustering algorithms use explicit control packets to create and maintain clusters whereas passive clustering piggybacks the control information in the outgoing data packets thus significantly reducing control overhead. The proposed algorithm integrates Passive Clustering with DSR routing protocol. Route Discovery phase of DSR floods the Route Request packets in the entire network. However, the proposed algorithm creates the clusters in the network in the initial phase of Route Discovery process and once the clusters are formed only a subset of nodes will forward the Route Request packets. This approach reduces the overhead on bandwidth by curtailing the flooding of packets and thereby increasing the packet delivery ratio. The simulation results show that optimized DSR algorithm enhances the packet delivery ratio by minimum of 20% and reduces the RREQ flooding by a minimum of 30%.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127774840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878215
K. Rana, Vineet Kumar, S. S. Nair
In this work, an application of constrained genetic algorithm (CGA) based optimization approach has been explored for design of low pass and high pass finite impulse response (FIR) digital filters. To accomplish the task of optimal filter design, a novel constraint function has been proposed and integrated with the fitness function in CGA environment. CGA minimizes the fitness function under supervision of the proposed constraint. Performances of designed FIR digital filters have been compared with the recently published designs of same order and the intensive MATLAB simulations based investigations have confirmed the superiority of the proposed designs in terms of smaller pass band and stop band ripples.
{"title":"Efficient FIR filter designs using constrained genetic algorithms based optimization","authors":"K. Rana, Vineet Kumar, S. S. Nair","doi":"10.1109/CCINTELS.2016.7878215","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878215","url":null,"abstract":"In this work, an application of constrained genetic algorithm (CGA) based optimization approach has been explored for design of low pass and high pass finite impulse response (FIR) digital filters. To accomplish the task of optimal filter design, a novel constraint function has been proposed and integrated with the fitness function in CGA environment. CGA minimizes the fitness function under supervision of the proposed constraint. Performances of designed FIR digital filters have been compared with the recently published designs of same order and the intensive MATLAB simulations based investigations have confirmed the superiority of the proposed designs in terms of smaller pass band and stop band ripples.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878210
Alain D. Díaz Alonso, C. Travieso, J. B. Alonso, M. Dutta, Anushikha Singh
This paper proposes a biometric system to identify people using common biomedical sensors. A dataset is built by groups of signals acquired from 25 people, and is used in the system. The present proposal applies a combination of principal components analysis and support vector machines to identify people by a group of biometric signals: electrocardiogram, airflow, temperature, pulse oximetry, electromyogram and galvanic skin response. The testing results have achieved a 92% of correct identification rate.
{"title":"Biometric personal identification system using biomedical sensors","authors":"Alain D. Díaz Alonso, C. Travieso, J. B. Alonso, M. Dutta, Anushikha Singh","doi":"10.1109/CCINTELS.2016.7878210","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878210","url":null,"abstract":"This paper proposes a biometric system to identify people using common biomedical sensors. A dataset is built by groups of signals acquired from 25 people, and is used in the system. The present proposal applies a combination of principal components analysis and support vector machines to identify people by a group of biometric signals: electrocardiogram, airflow, temperature, pulse oximetry, electromyogram and galvanic skin response. The testing results have achieved a 92% of correct identification rate.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/CCINTELS.2016.7878194
Rupal Sinha, P. Jindal
In wireless communication, physical layer security is widely used for secure communication between the transmitter and the receiver. In this paper, the secrecy performance of two cooperative schemes, decode-and-forward (DF) and amplify-and-forward (AF) relays is investigated in a single hop wireless relaying system. The achievable secrecy rate is investigated with these two types of relays under the constraint of total power transmitted. In the given jamming relay network, the relay transmits jamming signal while receiving data signal from the source. It is indicated by the resulting analysis that the AF relays have better secrecy rate as compared to the DF relays in the given condition. The secrecy rate of the AF relay is higher than that of the DF relay by 71.88% at a distance of 70 m between the relay and the eavesdropper in this jamming relay network.
{"title":"Performance analysis of cooperative schemes under total transmit power constraint in single hop wireless relaying system","authors":"Rupal Sinha, P. Jindal","doi":"10.1109/CCINTELS.2016.7878194","DOIUrl":"https://doi.org/10.1109/CCINTELS.2016.7878194","url":null,"abstract":"In wireless communication, physical layer security is widely used for secure communication between the transmitter and the receiver. In this paper, the secrecy performance of two cooperative schemes, decode-and-forward (DF) and amplify-and-forward (AF) relays is investigated in a single hop wireless relaying system. The achievable secrecy rate is investigated with these two types of relays under the constraint of total power transmitted. In the given jamming relay network, the relay transmits jamming signal while receiving data signal from the source. It is indicated by the resulting analysis that the AF relays have better secrecy rate as compared to the DF relays in the given condition. The secrecy rate of the AF relay is higher than that of the DF relay by 71.88% at a distance of 70 m between the relay and the eavesdropper in this jamming relay network.","PeriodicalId":158982,"journal":{"name":"2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128604434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}