首页 > 最新文献

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

英文 中文
Detection of selfish Nodes in MANET - a survey MANET中自私节点的检测综述
N. Ramya, S. Rathi
This paper is to identify the selfish Nodes and also improved the overall network performance in Mobile Adhoc network (MANET). In MANET, using the wireless connection, mobile devices are connected and the nodes freely move where it wants to communicate with each other. All nodes are participated in packet forwarding in order to cooperate with each node. Suppose, if the nodes are not forwarding the packets to its neighbor nodes it is called as selfish nodes. Many techniques are available for identifying selfish nodes. Many methodologies are comparing to improve the detection of selfish nodes and improve the network performance and precision speed and network throughput and reduce the detection time of selfish node. Finally, propose a collaborative contact based watchdog approach, which is based to detect the selfish nodes.
本文旨在识别自利节点,提高移动自组网(MANET)的整体网络性能。在MANET中,使用无线连接,移动设备被连接起来,节点自由地移动到它想要彼此通信的地方。所有节点都参与数据包转发,以便与每个节点相互配合。假设,如果节点没有将数据包转发给它的邻居节点,它被称为自私节点。有许多技术可用于识别自私节点。为了改进自利节点的检测,提高网络的性能和精度,提高网络的吞吐量,缩短自利节点的检测时间,人们比较了许多方法。最后,提出了一种基于协作接触的看门狗方法,该方法以检测自利节点为基础。
{"title":"Detection of selfish Nodes in MANET - a survey","authors":"N. Ramya, S. Rathi","doi":"10.1109/ICACCS.2016.7586378","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586378","url":null,"abstract":"This paper is to identify the selfish Nodes and also improved the overall network performance in Mobile Adhoc network (MANET). In MANET, using the wireless connection, mobile devices are connected and the nodes freely move where it wants to communicate with each other. All nodes are participated in packet forwarding in order to cooperate with each node. Suppose, if the nodes are not forwarding the packets to its neighbor nodes it is called as selfish nodes. Many techniques are available for identifying selfish nodes. Many methodologies are comparing to improve the detection of selfish nodes and improve the network performance and precision speed and network throughput and reduce the detection time of selfish node. Finally, propose a collaborative contact based watchdog approach, which is based to detect the selfish nodes.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparative study of DFT and Moving Window Averaging technique of current differential protection on Transmission line 输电线路电流差动保护DFT与移动窗平均技术的比较研究
Subodh Kumar Mohanty, P. K. Nayak
This paper is based on the study of current differential protection scheme on transmission line by using Moving Window Averaging technique and Discrete Fourier Transform. From the beginning of the history of power system, researchers have tried to increase the speed and sensitivity of transmission line protection in the power system protection field without compromising the security. Current differential protection scheme always provides sensitive protection with sharp discrimination of the disturbance area from the protection zone. Current differential protection scheme is immune to power swings and load encroachment. In the first method DFT, we can easily measure the phasors of the two ends of the transmission line which is very much essential for power system. With the help of moving window averaging technique extraction of the dc component of the current of transmission line is possible from both the sending and receiving ends. It is shown that under steady state condition, the differential current is zero while an internal line fault leads to non-zero differential current. The transmission line model is simulated with the help of PSCAD software.
本文基于移动窗平均技术和离散傅里叶变换对传输线电流差动保护方案进行了研究。从电力系统历史开始,研究者们就在电力系统保护领域试图在不影响安全性的前提下提高输电线路保护的速度和灵敏度。电流差动保护方案总是提供敏感的保护,对干扰区和保护区域有明显的区分。电流差动保护方案不受功率波动和负载侵占的影响。在第一种方法中,我们可以方便地测量输电线两端的相量,这对电力系统是非常重要的。利用移动窗平均技术可以从发送端和接收端提取传输线电流的直流分量。结果表明,在稳态条件下,差动电流为零,而内线故障导致差动电流不为零。利用PSCAD软件对传输线模型进行了仿真。
{"title":"A comparative study of DFT and Moving Window Averaging technique of current differential protection on Transmission line","authors":"Subodh Kumar Mohanty, P. K. Nayak","doi":"10.1109/ICACCS.2016.7586348","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586348","url":null,"abstract":"This paper is based on the study of current differential protection scheme on transmission line by using Moving Window Averaging technique and Discrete Fourier Transform. From the beginning of the history of power system, researchers have tried to increase the speed and sensitivity of transmission line protection in the power system protection field without compromising the security. Current differential protection scheme always provides sensitive protection with sharp discrimination of the disturbance area from the protection zone. Current differential protection scheme is immune to power swings and load encroachment. In the first method DFT, we can easily measure the phasors of the two ends of the transmission line which is very much essential for power system. With the help of moving window averaging technique extraction of the dc component of the current of transmission line is possible from both the sending and receiving ends. It is shown that under steady state condition, the differential current is zero while an internal line fault leads to non-zero differential current. The transmission line model is simulated with the help of PSCAD software.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Aggregation of blurred images through weighted FBA to remove camera shake 通过加权FBA对模糊图像进行聚合,消除相机抖动
K. Gayathri, P. Marikkannu
Many algorithms were designed to remove image blur due to camera shake, either with one or multiple input images, by using the deconvolution problem. If the photographer takes a burst of images, a modality available in virtually all modern digital cameras, it is possible to combine all the images to get a clean sharp version. This algorithm does not use blur estimation or its inverse problem. The proposed algorithm is strikingly simple where the average weight is calculated using Fourier domain which depends on the Fourier spectrum magnitude. Here, burst of images are taken into an account and each image in the burst is blurred differently. The proposed Fourier burst accumulation algorithm shows that one can obtain a sharp image by combining all the images together which is blurred differently. This can be implemented in modern smart phones.
利用反卷积问题,设计了许多算法来消除由相机抖动引起的图像模糊,无论是一个或多个输入图像。如果摄影师拍摄了一组图像,这是几乎所有现代数码相机都有的一种模式,那么将所有图像组合在一起就有可能得到一个清晰的版本。该算法不使用模糊估计及其逆问题。所提出的算法非常简单,其中平均权值是使用傅里叶域计算的,这取决于傅里叶谱的幅度。在这里,图像的突发被考虑和每个图像的突发模糊不同。提出的傅立叶突发积累算法表明,将不同模糊程度的图像组合在一起可以得到清晰的图像。这可以在现代智能手机中实现。
{"title":"Aggregation of blurred images through weighted FBA to remove camera shake","authors":"K. Gayathri, P. Marikkannu","doi":"10.1109/ICACCS.2016.7586402","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586402","url":null,"abstract":"Many algorithms were designed to remove image blur due to camera shake, either with one or multiple input images, by using the deconvolution problem. If the photographer takes a burst of images, a modality available in virtually all modern digital cameras, it is possible to combine all the images to get a clean sharp version. This algorithm does not use blur estimation or its inverse problem. The proposed algorithm is strikingly simple where the average weight is calculated using Fourier domain which depends on the Fourier spectrum magnitude. Here, burst of images are taken into an account and each image in the burst is blurred differently. The proposed Fourier burst accumulation algorithm shows that one can obtain a sharp image by combining all the images together which is blurred differently. This can be implemented in modern smart phones.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance enhancement of MC-CDMA system for high speed mobile users 面向高速移动用户的MC-CDMA系统性能提升
N. J. Emmanuel, R. Banupriya, N. Vijaya, G. Susithra, S. Anitha
Wireless broadband access system is operated in high mobility as well as high data rate environment. It is essential to consider the system that can be applied with or without perfect channel state information, has additional spectrum efficiency, and reducing selective fading issues. The proposed method is known as MC CDMA multilevel coding system model. The multilevel coding system model is able to solve all those problems. Consider this system can accommodate different bandwidth usage, Qos and channel response for each user. From the results of research, it can be concluded that in common the MC CDMA multilevel coding scheme gives good performance with high speed user in non-coherent channel transmission method.
无线宽带接入系统是在高移动性和高数据速率环境下运行的。必须考虑系统是否可以在有或没有完美信道状态信息的情况下应用,具有额外的频谱效率,并减少选择性衰落问题。所提出的方法被称为mccdma多级编码系统模型。多层编码系统模型能够很好地解决这些问题。考虑到该系统可以为每个用户提供不同的带宽使用、Qos和信道响应。研究结果表明,在一般情况下,MC - CDMA多电平编码方案在非相干信道下具有良好的高速用户传输性能。
{"title":"Performance enhancement of MC-CDMA system for high speed mobile users","authors":"N. J. Emmanuel, R. Banupriya, N. Vijaya, G. Susithra, S. Anitha","doi":"10.1109/ICACCS.2016.7586339","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586339","url":null,"abstract":"Wireless broadband access system is operated in high mobility as well as high data rate environment. It is essential to consider the system that can be applied with or without perfect channel state information, has additional spectrum efficiency, and reducing selective fading issues. The proposed method is known as MC CDMA multilevel coding system model. The multilevel coding system model is able to solve all those problems. Consider this system can accommodate different bandwidth usage, Qos and channel response for each user. From the results of research, it can be concluded that in common the MC CDMA multilevel coding scheme gives good performance with high speed user in non-coherent channel transmission method.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation of Drum kit synthesizer 鼓组合成器的仿真
Vinay Kumar, Amit Kumar, Dipen Patel, Rosepreet Kaur Bhogal
The World is slowly turning out from hard work to smart work i.e. from hardware to software. The Purpose of envelope generation is to provide a feel of Drum kit. The various parts of Drum kit can be felt, played and heard with real time simulation. The Karplus Strong Algorithm is used to generate the sounds of different instruments like cymbal, metallic plink, kick drum, Hihat. The elementary signals like sine wave, square wave have been used in order to get the appropriate sounds of different instruments. The actual sound of the particular instrument like snare drum and Tom Tom are generated by using the Butterworth filter of different order. The Physical appearance of the whole drum kit can be visualized on a Graphical User Interface and this can analyze and synthesize the sounds with different frequencies [4]. The users can play the instruments through a keyboard and generate their own music notes, melodies, songs. This Software based kit can be helpful in learning the different musical instruments. The overall approach was to provide a software based sound system which is adaptable, cost effective, can be easily affordable for the users, through which different music notes can be generated etc. This work can be further expanded for creating any software based musical studio.
世界正在慢慢地从艰苦工作转向智能工作,即从硬件到软件。信封生成的目的是提供鼓包的感觉。鼓套件的各个部分可以感觉到,播放和听到与实时模拟。Karplus强算法用于生成不同乐器的声音,如铙钹,金属叮当声,踢鼓,Hihat。利用正弦波、方波等基本信号,可以得到不同乐器对应的声音。像小鼓和汤姆汤姆这样的特殊乐器的实际声音是通过使用不同顺序的巴特沃斯滤波器产生的。整个鼓组的物理外观可以在图形用户界面上可视化,这可以分析和合成不同频率的声音[4]。用户可以通过键盘演奏乐器,并生成自己的音符、旋律和歌曲。这个基于软件的工具包可以帮助学习不同的乐器。总体方法是提供一个基于软件的声音系统,它具有适应性,成本效益,可以很容易地为用户负担得起,通过它可以生成不同的音符等。这项工作可以进一步扩展,以创建任何基于软件的音乐工作室。
{"title":"Simulation of Drum kit synthesizer","authors":"Vinay Kumar, Amit Kumar, Dipen Patel, Rosepreet Kaur Bhogal","doi":"10.1109/ICACCS.2016.7586318","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586318","url":null,"abstract":"The World is slowly turning out from hard work to smart work i.e. from hardware to software. The Purpose of envelope generation is to provide a feel of Drum kit. The various parts of Drum kit can be felt, played and heard with real time simulation. The Karplus Strong Algorithm is used to generate the sounds of different instruments like cymbal, metallic plink, kick drum, Hihat. The elementary signals like sine wave, square wave have been used in order to get the appropriate sounds of different instruments. The actual sound of the particular instrument like snare drum and Tom Tom are generated by using the Butterworth filter of different order. The Physical appearance of the whole drum kit can be visualized on a Graphical User Interface and this can analyze and synthesize the sounds with different frequencies [4]. The users can play the instruments through a keyboard and generate their own music notes, melodies, songs. This Software based kit can be helpful in learning the different musical instruments. The overall approach was to provide a software based sound system which is adaptable, cost effective, can be easily affordable for the users, through which different music notes can be generated etc. This work can be further expanded for creating any software based musical studio.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129356244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal strategies for searching a mobile object using mobile sensors in a grid environment 网格环境下移动传感器搜索移动目标的最优策略
Tanmoy Hazra, M. Nene, C. R. S. Kumar
This paper aims to find optimal strategies for mobile sensors to search a mobile object in a square/rectangular grid environment. Strategies decide the initial position of mobile sensors, optimizing search space and number of mobile sensors assigned for searching the mobile object. In the proposed methodology, mobile sensors are searchers and the mobile object is the target. In this article, optimal strategies for different grid structures are analyzed and illustrated with suitable figures. Basic mathematical and logical concepts are applied to find the strategies. These strategies are invariable for any size of grid environment. The novelty of the proposed methodology is to determine strategies for searching a target using minimum number of searchers for all sizes of square/rectangular grid environments with 100% detection rate. To the best of our knowledge, no article presents or demonstrates such case study for making strategy policies to solve such kind of problems.
本文旨在寻找移动传感器在方形/矩形网格环境中搜索移动目标的最优策略。策略确定移动传感器的初始位置,优化搜索空间和分配用于搜索移动目标的移动传感器数量。在该方法中,移动传感器是搜索器,移动目标是目标。本文分析了不同网格结构下的优化策略,并用合适的图形进行了说明。运用基本的数学和逻辑概念来寻找策略。这些策略对于任何大小的网格环境都是不变的。该方法的新颖之处在于,在所有大小的正方形/矩形网格环境中,以100%的检测率,使用最少的搜索器来确定搜索目标的策略。据我们所知,没有文章提出或展示了这样的案例研究,制定战略政策来解决这类问题。
{"title":"Optimal strategies for searching a mobile object using mobile sensors in a grid environment","authors":"Tanmoy Hazra, M. Nene, C. R. S. Kumar","doi":"10.1109/ICACCS.2016.7586394","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586394","url":null,"abstract":"This paper aims to find optimal strategies for mobile sensors to search a mobile object in a square/rectangular grid environment. Strategies decide the initial position of mobile sensors, optimizing search space and number of mobile sensors assigned for searching the mobile object. In the proposed methodology, mobile sensors are searchers and the mobile object is the target. In this article, optimal strategies for different grid structures are analyzed and illustrated with suitable figures. Basic mathematical and logical concepts are applied to find the strategies. These strategies are invariable for any size of grid environment. The novelty of the proposed methodology is to determine strategies for searching a target using minimum number of searchers for all sizes of square/rectangular grid environments with 100% detection rate. To the best of our knowledge, no article presents or demonstrates such case study for making strategy policies to solve such kind of problems.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124704451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis and recommendations for network and communication security for mission critical infrastructure 关键任务基础设施的网络和通信安全分析和建议
Sudipto Roy, M. Nene
The criticality of maintaining a complete degree of secrecy for any critical infrastructure based communication is a must. The seriousness of the requirement ensures success in terms of financial and competitive gains. Such critical infrastructure can be closely related to the one used by the armed forces for their operational objectives. Defense forces of developed country are more rapidly moving towards a unified solution that will take care of the network and the communication security, thus ensuring interoperable modules between different plethora of equipment. However the same solution may not be apt for armies of developing countries. These developing countries use equipment whose profile are spread over decades of manufacturing. In addition, the countries in which communication and network devices have been developed are different with varied optimum operational parameters. Whereas a complete overhaul of network and communication equipment, aligning to all modern security standards is desired, the same may not be feasible for the economics of developing countries. This paper tries to analyze the network and communication security requirements of a critical infrastructure, as in case of armed forces, of a developing country. We also bring out the possible recommendations under the economic and vintage equipment profile constraints.
对于任何基于关键基础设施的通信,保持完全保密的重要性是必须的。这一要求的严肃性确保了财务和竞争收益方面的成功。这种关键的基础设施可以与武装部队为实现其行动目标所使用的基础设施密切相关。发达国家的国防力量正在更快地朝着统一的解决方案发展,该解决方案将照顾网络和通信安全,从而确保不同设备之间的互操作模块。然而,同样的解决方案可能不适用于发展中国家的军队。这些发展中国家使用的设备分布在几十年的制造业中。此外,发展通信和网络设备的国家各不相同,最佳操作参数各不相同。虽然对网络和通信设备进行全面检修,使其符合所有现代安全标准是可取的,但对发展中国家的经济来说,同样的做法可能是不可行的。本文试图分析一个发展中国家的关键基础设施的网络和通信安全要求,如武装部队的情况。我们还提出了在经济和老式设备配置限制下可能的建议。
{"title":"Analysis and recommendations for network and communication security for mission critical infrastructure","authors":"Sudipto Roy, M. Nene","doi":"10.1109/ICACCS.2016.7586382","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586382","url":null,"abstract":"The criticality of maintaining a complete degree of secrecy for any critical infrastructure based communication is a must. The seriousness of the requirement ensures success in terms of financial and competitive gains. Such critical infrastructure can be closely related to the one used by the armed forces for their operational objectives. Defense forces of developed country are more rapidly moving towards a unified solution that will take care of the network and the communication security, thus ensuring interoperable modules between different plethora of equipment. However the same solution may not be apt for armies of developing countries. These developing countries use equipment whose profile are spread over decades of manufacturing. In addition, the countries in which communication and network devices have been developed are different with varied optimum operational parameters. Whereas a complete overhaul of network and communication equipment, aligning to all modern security standards is desired, the same may not be feasible for the economics of developing countries. This paper tries to analyze the network and communication security requirements of a critical infrastructure, as in case of armed forces, of a developing country. We also bring out the possible recommendations under the economic and vintage equipment profile constraints.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Program length based estimated facts assembly with minimal information loss in Wireless sensor networks 无线传感器网络中基于程序长度的最小信息损失估计事实汇编
K. Lalitha, V. M. Barkavi, R. Thangarajan, K. S. Preethi
In Wireless sensor networks (WSN), how to collect the major amount of data and reduce the data size is a delinquent issue. The existing methods concentrated on the data similarities based on the threshold limit. Those approaches may reduce the number of wireless communications but may not guarantee the bandwidth requirements. To ensure the communication and bandwidth requirements, clusters are framed based on the relationship of data and information gathering is done at the global level, in the sink node. A tree based routing topology known as convergecast is applied to transfer the collected information among sensors. The main aim of the time scheduling on a single frequency channel is to minimize the number of time slots required (schedule length) to complete convergecast. To reduce the effect of interference, multiple frequency transmission scheduling is implemented. The results predict that the communication and information gathering is greatly reduced without compromising the bandwidth requirements due to this global data collection approach.
在无线传感器网络(WSN)中,如何收集大量的数据并减小数据量是一个亟待解决的问题。现有的方法主要是基于阈值限制的数据相似度。这些方法可能会减少无线通信的数量,但可能无法保证带宽要求。为了保证通信和带宽的要求,集群是基于数据关系框架的,信息收集是在全局级的汇聚节点上完成的。采用基于树的路由拓扑(称为convergecast)在传感器之间传输收集到的信息。在单个频率信道上进行时间调度的主要目的是尽量减少完成汇聚所需的时隙数量(调度长度)。为了减少干扰的影响,实现了多频传输调度。结果预测,由于这种全球数据收集方法,在不影响带宽需求的情况下,大大减少了通信和信息收集。
{"title":"Program length based estimated facts assembly with minimal information loss in Wireless sensor networks","authors":"K. Lalitha, V. M. Barkavi, R. Thangarajan, K. S. Preethi","doi":"10.1109/ICACCS.2016.7586404","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586404","url":null,"abstract":"In Wireless sensor networks (WSN), how to collect the major amount of data and reduce the data size is a delinquent issue. The existing methods concentrated on the data similarities based on the threshold limit. Those approaches may reduce the number of wireless communications but may not guarantee the bandwidth requirements. To ensure the communication and bandwidth requirements, clusters are framed based on the relationship of data and information gathering is done at the global level, in the sink node. A tree based routing topology known as convergecast is applied to transfer the collected information among sensors. The main aim of the time scheduling on a single frequency channel is to minimize the number of time slots required (schedule length) to complete convergecast. To reduce the effect of interference, multiple frequency transmission scheduling is implemented. The results predict that the communication and information gathering is greatly reduced without compromising the bandwidth requirements due to this global data collection approach.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128105156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of dual shift invariant wavelet transform in blasting vibration signal denoising 双移不变小波变换在爆破振动信号去噪中的应用
Liang Mengdi, Zheng Wu, Xia Liangmeng
In this paper, it mainly introduces the study of wavelet analysis which is applied in the blasting vibration signal. Two methods, namely, decomposition and reconstruction of forcing denoising method and wavelet transform threshold denoising, are comparatively introduced in this paper. On the basis of two methods, a dual threshold shift invariant denoising method is proposed. Firstly, according to the specific circumstances, the layers of shift invariant are determined, and then the results after shift invariant should be de-noising with double threshold denoising method, finally, take the average of them, and fuse to get the final result. And it not only can remove the noise effectively, but also can save the detail information.
本文主要介绍了小波分析在爆破振动信号分析中的应用。对比介绍了分解重构强迫去噪法和小波变换阈值去噪法两种方法。在这两种方法的基础上,提出了一种双阈值移不变去噪方法。首先根据具体情况确定平移不变量的层数,然后对平移不变量后的结果用双阈值去噪方法去噪,最后对其取平均值,融合得到最终结果。该方法不仅能有效地去除噪声,还能保存图像的细节信息。
{"title":"Application of dual shift invariant wavelet transform in blasting vibration signal denoising","authors":"Liang Mengdi, Zheng Wu, Xia Liangmeng","doi":"10.1109/ICACCS.2016.7586357","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586357","url":null,"abstract":"In this paper, it mainly introduces the study of wavelet analysis which is applied in the blasting vibration signal. Two methods, namely, decomposition and reconstruction of forcing denoising method and wavelet transform threshold denoising, are comparatively introduced in this paper. On the basis of two methods, a dual threshold shift invariant denoising method is proposed. Firstly, according to the specific circumstances, the layers of shift invariant are determined, and then the results after shift invariant should be de-noising with double threshold denoising method, finally, take the average of them, and fuse to get the final result. And it not only can remove the noise effectively, but also can save the detail information.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Web page steganography with Attribute Truth Table 用属性真值表实现网页隐写
B. Reddy, K. Kuppusamy, T. Sivakumar
The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web pages. The Tag repository collects all potential tags and Attribute Truth Table is built over the Tag repository for giving the binary values for the attribute orders in the Tag repository. This Attribute Truth Table helps in concealing the secrete information into the web page. The decoding of the secrete information is carried out using tailor made client side plug-in.
使用网页作为掩护媒介的隐写术的发展提出了具有挑战性的研究问题。网页信息隐藏是一种将信息隐藏在机密性、可靠性和可用性等隐私策略之外的方法。提出了一种基于标签库和属性真值表的网页数据隐藏方法。标签存储库收集所有可能的标签,并且在标签存储库上构建属性真值表,用于为标签存储库中的属性顺序提供二进制值。此属性真值表有助于将秘密信息隐藏到网页中。使用定制的客户端插件对机密信息进行解码。
{"title":"Towards Web page steganography with Attribute Truth Table","authors":"B. Reddy, K. Kuppusamy, T. Sivakumar","doi":"10.1109/ICACCS.2016.7586359","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586359","url":null,"abstract":"The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web pages. The Tag repository collects all potential tags and Attribute Truth Table is built over the Tag repository for giving the binary values for the attribute orders in the Tag repository. This Attribute Truth Table helps in concealing the secrete information into the web page. The decoding of the secrete information is carried out using tailor made client side plug-in.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1