Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586317
L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang
Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.
{"title":"Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA","authors":"L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang","doi":"10.1109/ICACCS.2016.7586317","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586317","url":null,"abstract":"Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586335
Ajay Sharma, H. Anand
Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.
{"title":"Cycle efficient and SNR dependent CQI Decoder implementation","authors":"Ajay Sharma, H. Anand","doi":"10.1109/ICACCS.2016.7586335","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586335","url":null,"abstract":"Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586356
A. Patil, Shital S Mali
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.
{"title":"Hybrid cryptography mechanism for securing self-organized wireless networks","authors":"A. Patil, Shital S Mali","doi":"10.1109/ICACCS.2016.7586356","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586356","url":null,"abstract":"Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586365
Joshua Reginald Pullagura, D. Rao
A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.
{"title":"An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks","authors":"Joshua Reginald Pullagura, D. Rao","doi":"10.1109/ICACCS.2016.7586365","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586365","url":null,"abstract":"A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586343
P. M. James, Jaimol Thomas
Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.
{"title":"Comparative study of an efficient cascaded Inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586343","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586343","url":null,"abstract":"Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/icaccs.2016.7586305
E. Jeyakumar, L. Prabha
{"title":"National advisory committee","authors":"E. Jeyakumar, L. Prabha","doi":"10.1109/icaccs.2016.7586305","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586305","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586383
Chandrima Chatterjee, Arunasish Acharya
In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.
{"title":"Proper use of web technology to teach older people: A case study","authors":"Chandrima Chatterjee, Arunasish Acharya","doi":"10.1109/ICACCS.2016.7586383","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586383","url":null,"abstract":"In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586380
G. Poovila, N. Kavitha, Jim Mathew Philip
Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.
{"title":"Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism","authors":"G. Poovila, N. Kavitha, Jim Mathew Philip","doi":"10.1109/ICACCS.2016.7586380","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586380","url":null,"abstract":"Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586388
T. Lavanya, J. C. Pamila, K. Veningston
Opinions are vital in almost all human activities and are key influencers of online user's behavior. In this regard, when we need to make a decision, we often search for the opinions of others. Opinions and its related concepts such as sentiments and emotions are the subjects of study of sentiment analysis and opinion mining. The inception of mining opinions from online reviews coincide with the social media on the Web, e.g., reviews, discussion forums, blogs, micro blogs, Twitter, and social networks. Due to the large volume of opinionated data generated and available in digital forms, it become essential to mine such data and find opinions or sentiments in order to obtain the overall opinion on the topic i.e. products, politics, sports, education reforms, and so on. In this direction, it is proposed to design an algorithm which extracts opinion targets and opinion words using word alignment model for online reviews extracted from Twitter. An opinion target is defined as the topic about which users express their opinions. An opinion words are defined as the words that are used to express users' opinions. The aim of the project is to determine the thoughts of blog or review writer with respect to some topic or the overall contextual polarity of online reviews using word alignment model. The key objective of this project is to design an algorithm that predict opinion words and opinion targets for analyzing the market status of a product by mining user reviews posted in social networking site namely the Twitter. For evaluation, Benchmark Customer Review Dataset and real tweets dataset pertaining to product reviews extracted using Twitter API. The results are measured in terms of Precision and Recall for accuracy of finding opinion words and targets in order to be an essential ingredient for opinion mining and sentiment analysis. The experimental results show that the proposed method achieves better accuracy in an efficient way. In addition, the ultimate outcome of this project to make choice of designing potential consumer oriented products e.g. Mobile, laptop, and so on.
{"title":"Online review analytics using word alignment model on Twitter data","authors":"T. Lavanya, J. C. Pamila, K. Veningston","doi":"10.1109/ICACCS.2016.7586388","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586388","url":null,"abstract":"Opinions are vital in almost all human activities and are key influencers of online user's behavior. In this regard, when we need to make a decision, we often search for the opinions of others. Opinions and its related concepts such as sentiments and emotions are the subjects of study of sentiment analysis and opinion mining. The inception of mining opinions from online reviews coincide with the social media on the Web, e.g., reviews, discussion forums, blogs, micro blogs, Twitter, and social networks. Due to the large volume of opinionated data generated and available in digital forms, it become essential to mine such data and find opinions or sentiments in order to obtain the overall opinion on the topic i.e. products, politics, sports, education reforms, and so on. In this direction, it is proposed to design an algorithm which extracts opinion targets and opinion words using word alignment model for online reviews extracted from Twitter. An opinion target is defined as the topic about which users express their opinions. An opinion words are defined as the words that are used to express users' opinions. The aim of the project is to determine the thoughts of blog or review writer with respect to some topic or the overall contextual polarity of online reviews using word alignment model. The key objective of this project is to design an algorithm that predict opinion words and opinion targets for analyzing the market status of a product by mining user reviews posted in social networking site namely the Twitter. For evaluation, Benchmark Customer Review Dataset and real tweets dataset pertaining to product reviews extracted using Twitter API. The results are measured in terms of Precision and Recall for accuracy of finding opinion words and targets in order to be an essential ingredient for opinion mining and sentiment analysis. The experimental results show that the proposed method achieves better accuracy in an efficient way. In addition, the ultimate outcome of this project to make choice of designing potential consumer oriented products e.g. Mobile, laptop, and so on.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586372
S. Gopalakrishnan, P. M. Kumar
Data Collection schemes fail to supply a secure reliable network in terms of quality, traffic, and end-to-end affiliation. during this paper, a Improved rate Energy-efficient and Link-aware Cluster-Tree (IVELCT) theme for knowledge assortment in WSNs is projected which might effectively mitigate the issues of coverage distance, mobility, delay, traffic, tree intensity, and end-to-end affiliation. The projected IVELCT constructs the information assortment Tree (DCT) supported the cluster head location. the information assortment node within the DCT doesn't participate in sensing on this explicit spherical, however, it merely collects the information packet from the cluster head and delivers it to the sink. The designed IVELCT theme minimizes the energy exploitation, reduces the end-to-end delay and traffic in cluster head in WSNs by effective usage of the DCT. The strength of the IVELCT algorithmic rule is to construct an easy tree structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation. It additionally maintains the cluster for a substantial quantity of your time. Simulation results have incontestable that IVELCT provides higher QoS in terms of energy consumption, throughput, end-to-end delay, and network time period for mobility-based WSNs.
{"title":"An Improved velocity Energy-efficient and Link-aware Cluster-Tree based data collection scheme for mobile networks","authors":"S. Gopalakrishnan, P. M. Kumar","doi":"10.1109/ICACCS.2016.7586372","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586372","url":null,"abstract":"Data Collection schemes fail to supply a secure reliable network in terms of quality, traffic, and end-to-end affiliation. during this paper, a Improved rate Energy-efficient and Link-aware Cluster-Tree (IVELCT) theme for knowledge assortment in WSNs is projected which might effectively mitigate the issues of coverage distance, mobility, delay, traffic, tree intensity, and end-to-end affiliation. The projected IVELCT constructs the information assortment Tree (DCT) supported the cluster head location. the information assortment node within the DCT doesn't participate in sensing on this explicit spherical, however, it merely collects the information packet from the cluster head and delivers it to the sink. The designed IVELCT theme minimizes the energy exploitation, reduces the end-to-end delay and traffic in cluster head in WSNs by effective usage of the DCT. The strength of the IVELCT algorithmic rule is to construct an easy tree structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation. It additionally maintains the cluster for a substantial quantity of your time. Simulation results have incontestable that IVELCT provides higher QoS in terms of energy consumption, throughput, end-to-end delay, and network time period for mobility-based WSNs.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}