首页 > 最新文献

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

英文 中文
Cycle efficient and SNR dependent CQI Decoder implementation 周期效率和信噪比依赖CQI解码器的实现
Ajay Sharma, H. Anand
Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.
信道质量指示(CQI)报告是长期演进(LTE)系统提供下行信道质量信息的重要组成部分。3GPP标准中提到CQI的编码方法是Reed Muller (RM)码,用RM码对信道进行编码可以提高CQI的传输质量。本文提出了一种依赖信噪比的CQI译码机制,在现有的CQI译码方案中,当CQI译码位数大于等于11时采用快速哈达玛变换(FHT)作为译码方案,当CQI译码位数大于11时采用维特比译码方案。本文的想法是提出一种周期高效的CQI解码方法,其中各种信噪比(SNR)水平,信道类型以及每秒百万周期(MCPS)的模拟已经进行并已经存在。
{"title":"Cycle efficient and SNR dependent CQI Decoder implementation","authors":"Ajay Sharma, H. Anand","doi":"10.1109/ICACCS.2016.7586335","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586335","url":null,"abstract":"Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks Ad-hoc网络中一种高效可靠的基于跳树的协同组播路由
Joshua Reginald Pullagura, D. Rao
A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.
移动自组织网络是一种基础设施较少的自配置网络,由移动节点随机移动位置、四处移动或加入网络。在过去的几年中,为了实现一种新的可靠路由协议,进行了仿真工作。本文主要研究了传统AODV和DSR路由协议中减少端到端延迟、网络负载和丢包等因素的方法。提出了一种合作组播自组织按需距离矢量路由协议。结果表明,AODV比CMAODV丢包量大。在AODV路由协议中,更多的丢包总量与拥塞有关,并且样本数据显示丢包随时间的分布呈爆裂性,这使得传统的泊松框架不适合对其进行建模。初步结果显示出自相似模式,使我们相信分形模型有希望描述自组织网络中的丢包。
{"title":"An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks","authors":"Joshua Reginald Pullagura, D. Rao","doi":"10.1109/ICACCS.2016.7586365","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586365","url":null,"abstract":"A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA FPGA上任意大小离散傅里叶变换的并行实现
L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang
Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.
离散傅里叶变换(DFT)是各种信号处理应用中常用的核函数之一。大多数先前的最先进的工作都集中在2的幂变换的大小上。许多非2次幂大小的DFT实现都是针对特定应用程序定制的。本文提出了一种基于现场可编程门阵列(FPGA)的任意尺寸DFT并行处理体系结构。特别地,它对于计算任意素数大小的DFT具有吸引力。提出了一种具有内存效率的旋转因子数据映射方案,将旋转因子的存储容量从n2减小到kn(k为常数)。我们实现了一个包含196个处理元素的设计,可用于从14到1024的任何转换大小n。在变换大小为59的情况下,本设计的吞吐量可以达到737.5 Msps。如果硬件有足够的资源,该设计可以很容易地扩展为具有更多处理元素的设计。我们建立了一个代码生成器来自动生成具有不同数量处理元素的设计。
{"title":"Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA","authors":"L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang","doi":"10.1109/ICACCS.2016.7586317","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586317","url":null,"abstract":"Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid cryptography mechanism for securing self-organized wireless networks 保护自组织无线网络的混合密码机制
A. Patil, Shital S Mali
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.
如今,由于无线技术在各种应用中的不断发展,无线技术的使用大大增加。无线技术的发展之一导致网络的部署,其中所有移动节点将通过无线链路直接通信,而不使用任何基站或预定义的基础设施支持。这些网络是自组织的网络,称为移动自组织网络(manet),用于这些网络的架构要么是独立的,只有一个或几个节点与基站通信,要么是分布式的。由于通信是通过无线链路进行的,这些类型的网络更容易受到几种攻击。身份验证和加密充当第一道防线,而入侵检测系统(IDS)充当第二道防线。在MANET中使用的入侵检测系统之一是增强自适应确认(EAACK),该系统基于确认报文来检测恶意活动。与其他系统(如看门狗)相比,该系统显著增加了网络开销。因此,本文采用混合加密技术来降低网络开销,显著提高网络的安全性。
{"title":"Hybrid cryptography mechanism for securing self-organized wireless networks","authors":"A. Patil, Shital S Mali","doi":"10.1109/ICACCS.2016.7586356","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586356","url":null,"abstract":"Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative study of an efficient cascaded Inverter with different loads 不同负载下高效级联逆变器的比较研究
P. M. James, Jaimol Thomas
Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.
逆变器是一种用于将直流电源转换为交流电源的设备,它已经从简单的两电平转换电路发展到采用高效配置的多电平转换系统。它在光伏系统、高压直流输电系统、柔性交流输电装置、工业驱动、隔离电源、可再生能源集成等方面的应用日益受到人们的关注。每天都有大量的工作试图做出更好的配置,以减少系统的尺寸、空间和成本。本文讨论了一种比现有配置更有利且易于实现的配置。它还提出了与广泛接受的现有配置进行比较分析的结果。所采用的控制是正弦脉宽调制,对两种拓扑结构进行比较。利用MATLAB-Simulink进行仿真分析。
{"title":"Comparative study of an efficient cascaded Inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586343","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586343","url":null,"abstract":"Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proper use of web technology to teach older people: A case study 正确使用网络技术来教育老年人:一个案例研究
Chandrima Chatterjee, Arunasish Acharya
In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.
近年来,随着通信技术的飞速发展,人们在日常生活中越来越多地使用信息通信进行人机交互。随着年龄的增长,人们的年龄越来越大,身体结构、认知、行为都发生了变化。他们变得依赖别人。在这种背景下,研究人员有动力去寻找可能的方法,利用网络技术来帮助这些老年人以一种有效的方式进行日常活动。因此,安排了讲习班,在讲习班中,共邀请了16名老年人参加了讲习班。在这个工作坊中,他们学习了如何使用IRCTC网站和facebook。研究人员发现,老年人使用那些吸引他们的兴趣和相对容易使用的应用程序:面对面的指导方法学习效果更好。要了解新技术,他们需要花很多时间。他们需要额外的工具来提醒容易学习的东西。为了扩展本研究,应该使用移动应用程序的最佳方法来对老年人进行教学。
{"title":"Proper use of web technology to teach older people: A case study","authors":"Chandrima Chatterjee, Arunasish Acharya","doi":"10.1109/ICACCS.2016.7586383","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586383","url":null,"abstract":"In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
National advisory committee 国家咨询委员会
E. Jeyakumar, L. Prabha
{"title":"National advisory committee","authors":"E. Jeyakumar, L. Prabha","doi":"10.1109/icaccs.2016.7586305","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586305","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism 利用基于P2P的市场引导分布式路由机制提高混合无线网络的吞吐量
G. Poovila, N. Kavitha, Jim Mathew Philip
Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.
下一代无线系统可以通过集成网络提供无处不在的高速接入,并有望支持广泛的服务。为了实现先进的服务,混合无线网络(HWN)架构结合了支持提供高吞吐量无线网络的自组织网络和基础设施网络路由。在混合无线网络(HWN)中,基础设施网络中的基站(bse)作为自组织网络中移动节点(MNs)的中继进行远程通信,而自组织网络则扩大了基础设施网络的覆盖范围。在现有的研究中,路由机制采用链路状态算法,通过中间跳中继将数据包从源传输到目的,使用最短路径。此外,由于路由拥塞和路由维护的不可用性,ad-hoc网络在路由中也继承了延迟、丢包、吞吐量最小和能耗大等缺点。本文面临的挑战是如何改进有效的路由,从而从市场导向的分布式路由机制(MDR)中吸收分布式路由算法(DRA)和交易市场管理的优点。通过仿真结果验证了DRA是一种高效的路由,从而提高了高吞吐量。除了这种机制之外,还需要包括安全特性来提供机密性,以实现数据包从源到目的的安全传输。为了防止攻击者的攻击,需要使用RSA (Rivest-Shamir-Adleman)安全算法对数据包进行加密和解密。
{"title":"Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism","authors":"G. Poovila, N. Kavitha, Jim Mathew Philip","doi":"10.1109/ICACCS.2016.7586380","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586380","url":null,"abstract":"Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of passive forensic techniques for detection of copy-move attacks on digital videos 对数字视频复制移动攻击检测的被动取证技术综述
Shashank Sharma, S. Dhavale
In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.
近年来,数字视频编辑工具的易用性和可用性已成为视频法医专家面临的主要挑战,如何准确地鉴定任何可疑的数字视频内容。此外,这种编辑工具领域的广泛和快速发展以及反取证技术的改进使任何naïve用户能够以最小的痕迹/足迹编辑,更改和修改任何数字视频。最近在数字视频取证领域的调查突出了这一领域研究的必要性。从个人到组织,从国防和安全机构到执法机构,都需要验证数字视频内容的完整性。此外,探索更新和更有效的被动(或盲)视频伪造检测方法的需求日益重要。这是因为数字视频在大多数国家都被接受为证据,而现实生活中涉及数字视频篡改的案件,除了嫌疑视频之外,往往很少有其他参考信息的补充。本文旨在通过回顾该领域的现有文献和研究工作,突出被动或盲目数字视频取证领域的挑战和机遇,重点关注数字视频的时空或复制移动攻击。
{"title":"A review of passive forensic techniques for detection of copy-move attacks on digital videos","authors":"Shashank Sharma, S. Dhavale","doi":"10.1109/ICACCS.2016.7586396","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586396","url":null,"abstract":"In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Chief guest & session chairs 首席嘉宾和会议主席
R. Venkatesan
{"title":"Chief guest & session chairs","authors":"R. Venkatesan","doi":"10.1109/icaccs.2016.7586304","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586304","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1