Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474031
M. Arti
We address the problem of beamforming and combining in a large multiple-input multiple-output systems in Rayleigh fading environment. A very large number of antennas, i.e., Ns are employed at the transmitter. Some fixed number of antennas, i.e., Nt are assigned to each user. A specific transmit weight/beamforming vector is used for transmitting the symbols of a particular user; and the user utilizes a specific combining vector for detecting the transmitted signal. Two different schemes are proposed to calculate beamforming and combining vectors. In first scheme, transmit weight vectors are chosen by using the principle of maximum ratio transmission; and maximum eigen value criterion is used for calculating the combining vector. In second scheme, the concept of null space is used for the calculation of combining vector. It is shown by simulations that proposed schemes works well and second scheme performs better than first scheme.
{"title":"Beamforming and Combining in Multi-User Large MIMO Systems","authors":"M. Arti","doi":"10.1109/SPIN.2018.8474031","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474031","url":null,"abstract":"We address the problem of beamforming and combining in a large multiple-input multiple-output systems in Rayleigh fading environment. A very large number of antennas, i.e., Ns are employed at the transmitter. Some fixed number of antennas, i.e., Nt are assigned to each user. A specific transmit weight/beamforming vector is used for transmitting the symbols of a particular user; and the user utilizes a specific combining vector for detecting the transmitted signal. Two different schemes are proposed to calculate beamforming and combining vectors. In first scheme, transmit weight vectors are chosen by using the principle of maximum ratio transmission; and maximum eigen value criterion is used for calculating the combining vector. In second scheme, the concept of null space is used for the calculation of combining vector. It is shown by simulations that proposed schemes works well and second scheme performs better than first scheme.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474107
B. Murali, N. Rao
Passive components are indispensable in the design and development of Radio Frequency Integrated Circuits (RFIC). In this paper half-turn split inductor is presented with higher quality factor by 31.6% and inductance 15% over conventional planar inductor. High quality factor is a primary requirement to improve the performance of the circuit at high frequency. The quality factor and self resonant frequency is limited by parasitic capacitance effect, current crowding effect and proximity effect. In this proposed structure the quality factor is improved by dividing the each conductor turn by half and placed in to two different layers. When each conductor turns split in two layers the effective capacitance is reduced, hence quality factor is increased. The proposed structure is implemented in the area 60μm × 60μm and simulated by using the SONNET (EM) simulation tool to obtain the results.
{"title":"High Q Half-turn Split Inductor for RF Applications","authors":"B. Murali, N. Rao","doi":"10.1109/SPIN.2018.8474107","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474107","url":null,"abstract":"Passive components are indispensable in the design and development of Radio Frequency Integrated Circuits (RFIC). In this paper half-turn split inductor is presented with higher quality factor by 31.6% and inductance 15% over conventional planar inductor. High quality factor is a primary requirement to improve the performance of the circuit at high frequency. The quality factor and self resonant frequency is limited by parasitic capacitance effect, current crowding effect and proximity effect. In this proposed structure the quality factor is improved by dividing the each conductor turn by half and placed in to two different layers. When each conductor turns split in two layers the effective capacitance is reduced, hence quality factor is increased. The proposed structure is implemented in the area 60μm × 60μm and simulated by using the SONNET (EM) simulation tool to obtain the results.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474132
P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia
A delay-tolerant network is a network designed to operate over extreme distances such as those encountered in space communications, borderline networks or on an interplanetary scale. Delay tolerant networks are the opportunistic networks, that is transmission occurs as soon as two intermediate nodes comes into each others transmission range. The commonly used routing algorithm in delay tolerant networks is Epidemic Routing Protocol (ERP). Epidemic routing floods away the packets to all the neighboring nodes, which sometimes results in network congestion. The ERP doesn’t take into account the factors such as battery energy level and buffer space, so in the proposed research work, an enhanced version of ERP is hereby proposed which when deployed enables the node to consider battery energy level and buffer space while taking routing decisions. The proposed changes have resulted in the increase in message delivery ratio and decrease in traffic in the network.
{"title":"Enhanced Epidemic Routing Protocol in Delay Tolerant Networks","authors":"P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia","doi":"10.1109/SPIN.2018.8474132","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474132","url":null,"abstract":"A delay-tolerant network is a network designed to operate over extreme distances such as those encountered in space communications, borderline networks or on an interplanetary scale. Delay tolerant networks are the opportunistic networks, that is transmission occurs as soon as two intermediate nodes comes into each others transmission range. The commonly used routing algorithm in delay tolerant networks is Epidemic Routing Protocol (ERP). Epidemic routing floods away the packets to all the neighboring nodes, which sometimes results in network congestion. The ERP doesn’t take into account the factors such as battery energy level and buffer space, so in the proposed research work, an enhanced version of ERP is hereby proposed which when deployed enables the node to consider battery energy level and buffer space while taking routing decisions. The proposed changes have resulted in the increase in message delivery ratio and decrease in traffic in the network.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474145
Karush Suri, Rinki Gupta
Surface electromyography (sEMG) is becoming exceeding useful in applications involving analysis of human motion such as in human-machine interface, assistive technology, healthcare and prosthetic development. The proposed work presents a novel dual stage classification approach for classification of grasping gestures from sEMG signals. A statistical assessment of these activities is presented to determine the similar characteristics between the considered activities. Similar activities are grouped together. In the first stage of classification, an activity is identified as belonging to a group, which is then further classified as one of the activities within the group in the second stage of classification. The performance of the proposed approach is compared to the conventional single stage classification approach in terms of classification accuracies. The classification accuracies obtained using the proposed dual stage classification are significantly higher as compared to that for single stage classification.
{"title":"Dual Stage Classification of Hand Gestures using Surface Electromyogram","authors":"Karush Suri, Rinki Gupta","doi":"10.1109/SPIN.2018.8474145","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474145","url":null,"abstract":"Surface electromyography (sEMG) is becoming exceeding useful in applications involving analysis of human motion such as in human-machine interface, assistive technology, healthcare and prosthetic development. The proposed work presents a novel dual stage classification approach for classification of grasping gestures from sEMG signals. A statistical assessment of these activities is presented to determine the similar characteristics between the considered activities. Similar activities are grouped together. In the first stage of classification, an activity is identified as belonging to a group, which is then further classified as one of the activities within the group in the second stage of classification. The performance of the proposed approach is compared to the conventional single stage classification approach in terms of classification accuracies. The classification accuracies obtained using the proposed dual stage classification are significantly higher as compared to that for single stage classification.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474249
B. Rathor, M. Bhadu, S. K. Bishnoi
This paper analysis and investigates the effect of symmetrical fault on grid connected AC microgrid and improve the stability to primary control of synchronous distribution generators. In this ac microgrid four distribution generation units three renewable energy sources PV energy farm, wind energy farm and hydro power source and diesel generator is connected for backup power. The various power system stabilizers are used in control scheme and reduced the damping oscillation overshoot and settling time and comparison of time domain response having without power system stabilizes (PSS), with simple PSS like delta PSS and acceleration power (Pa) PSS, multi-band PSS (MB-PSS) and robust fuzzy based design PSS. Analyzing and performance of the various robust controller as microgrid system stability accessed on simpowersystem toolbox of MATLAB software.
{"title":"Modern Controller Techniques of Improve Stability of AC Microgrid","authors":"B. Rathor, M. Bhadu, S. K. Bishnoi","doi":"10.1109/SPIN.2018.8474249","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474249","url":null,"abstract":"This paper analysis and investigates the effect of symmetrical fault on grid connected AC microgrid and improve the stability to primary control of synchronous distribution generators. In this ac microgrid four distribution generation units three renewable energy sources PV energy farm, wind energy farm and hydro power source and diesel generator is connected for backup power. The various power system stabilizers are used in control scheme and reduced the damping oscillation overshoot and settling time and comparison of time domain response having without power system stabilizes (PSS), with simple PSS like delta PSS and acceleration power (Pa) PSS, multi-band PSS (MB-PSS) and robust fuzzy based design PSS. Analyzing and performance of the various robust controller as microgrid system stability accessed on simpowersystem toolbox of MATLAB software.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474121
Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta
The Symmetric and Asymmetric Cryptographic techniques and algorithms as existing in the literature are either too simple and traditional or too complex to code and understand. In the current research work, a new Cryptographic technique is being proposed which is a blend of both. To show the effectiveness of the proposed "Cyclic Cryptographic Technique", it has been compared with well-known Cryptographic technique(s) such as Caesar Cipher, Vigenere Cipher and Affine Cipher and the result exceed the expectations.
{"title":"C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques","authors":"Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta","doi":"10.1109/SPIN.2018.8474121","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474121","url":null,"abstract":"The Symmetric and Asymmetric Cryptographic techniques and algorithms as existing in the literature are either too simple and traditional or too complex to code and understand. In the current research work, a new Cryptographic technique is being proposed which is a blend of both. To show the effectiveness of the proposed \"Cyclic Cryptographic Technique\", it has been compared with well-known Cryptographic technique(s) such as Caesar Cipher, Vigenere Cipher and Affine Cipher and the result exceed the expectations.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474062
K. Bhushan, B. Gupta
In the last one decade, cloud computing has evolved as a new and promising computational platform that provides cost effective and scalable computing facility. The merger of SDN technology with the cloud computing environment simplifies the cloud’s networking complexities and significantly improves the manageability, programmability, dynamism, and scalability of the cloud. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software based traffic analysis, centralized control over the network, etc. greatly improves the DDoS attack detection and mitigation capabilities of the cloud. In this paper, we first discuss about various essential features of SDN that makes it suitable networking technology for cloud computing. Moreover, we propose an approach to detect DDoS attacks in SDN-based cloud by utilizing the features of SDN. The proposed approach can detect the DDoS attacks with very low communicational and computational overhead. Our claims are well supported by the extensive simulation based experiments.
{"title":"Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment","authors":"K. Bhushan, B. Gupta","doi":"10.1109/SPIN.2018.8474062","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474062","url":null,"abstract":"In the last one decade, cloud computing has evolved as a new and promising computational platform that provides cost effective and scalable computing facility. The merger of SDN technology with the cloud computing environment simplifies the cloud’s networking complexities and significantly improves the manageability, programmability, dynamism, and scalability of the cloud. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software based traffic analysis, centralized control over the network, etc. greatly improves the DDoS attack detection and mitigation capabilities of the cloud. In this paper, we first discuss about various essential features of SDN that makes it suitable networking technology for cloud computing. Moreover, we propose an approach to detect DDoS attacks in SDN-based cloud by utilizing the features of SDN. The proposed approach can detect the DDoS attacks with very low communicational and computational overhead. Our claims are well supported by the extensive simulation based experiments.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474124
Chiranjib Patra, Samir Biswas, Sourish Mullick
In Wireless Sensor Networks (WSN) the determination of right clusters is NP-hard problem. Hence a lot of indirect methods have been used to go around and approximately solve the problem. In this communication, an effort has been made to use various objective functions from optimization methods to optimize upon this NP-hard problem in determining good clusters. Using this good clusters as solutions, we use LEACH-C framework in assessing the efficiency of the communication and connectivity of the network. Moreover, we also introduce another optimization method called simulated annealing inspired Gompertz (SAIG) to compare upon some of the well-known existing optimization methods.
{"title":"Effect of Different Optimization Methods in Determining the Clusterheads in Wireless Sensor Network","authors":"Chiranjib Patra, Samir Biswas, Sourish Mullick","doi":"10.1109/SPIN.2018.8474124","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474124","url":null,"abstract":"In Wireless Sensor Networks (WSN) the determination of right clusters is NP-hard problem. Hence a lot of indirect methods have been used to go around and approximately solve the problem. In this communication, an effort has been made to use various objective functions from optimization methods to optimize upon this NP-hard problem in determining good clusters. Using this good clusters as solutions, we use LEACH-C framework in assessing the efficiency of the communication and connectivity of the network. Moreover, we also introduce another optimization method called simulated annealing inspired Gompertz (SAIG) to compare upon some of the well-known existing optimization methods.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474179
Samridhi Mathur, Poonam Sharma
Since the last few decades, a dominant area of research in the vision community has been the gesture recognition, mainly for the purpose of Human Computer Interaction (HCI) and recognition of sign language. In this paper, we are using Zernike Moments as shape descriptors. The proposed system for recognizing sign language mainly consists of following five modules: (1) gesture segmentation based on motion detection analysis, (2) real time detection of both hand regions and face region, (3) key frame extraction for removing redundant frames, (4) the feature extraction phase consists of tracking the hands trajectory in terms of orientation, tracking distance of hands from the centre of the face and determining the hand posture using rotation invariant Zernike Moments and finally (5) gesture recognition based on these extracted features using Dynamic Time Warping (DTW) methodology.
在过去的几十年里,视觉界的一个主要研究领域是手势识别,主要是为了人机交互(HCI)和手语识别。在本文中,我们使用泽尼克矩作为形状描述符。本文提出的手语识别系统主要由以下五个模块组成:(1)基于运动检测分析的手势分割;(2)手部区域和面部区域的实时检测;(3)关键帧提取,去除冗余帧;(4)特征提取阶段包括从方向上跟踪手部轨迹;利用旋转不变泽尼克矩(Zernike Moments)跟踪手距面部中心的距离,确定手的姿态;最后(5)利用动态时间扭曲(Dynamic Time Warping, DTW)方法基于这些提取的特征进行手势识别。
{"title":"Sign Language Gesture Recognition using Zernike Moments and DTW","authors":"Samridhi Mathur, Poonam Sharma","doi":"10.1109/SPIN.2018.8474179","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474179","url":null,"abstract":"Since the last few decades, a dominant area of research in the vision community has been the gesture recognition, mainly for the purpose of Human Computer Interaction (HCI) and recognition of sign language. In this paper, we are using Zernike Moments as shape descriptors. The proposed system for recognizing sign language mainly consists of following five modules: (1) gesture segmentation based on motion detection analysis, (2) real time detection of both hand regions and face region, (3) key frame extraction for removing redundant frames, (4) the feature extraction phase consists of tracking the hands trajectory in terms of orientation, tracking distance of hands from the centre of the face and determining the hand posture using rotation invariant Zernike Moments and finally (5) gesture recognition based on these extracted features using Dynamic Time Warping (DTW) methodology.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/SPIN.2018.8474175
Khyati Chopra, R. Bose, A. Joshi
In this paper, game theoretic framework is used as a mathematical tool to address security problems in mobile wireless sensor network (MWSN). In most of the existing works, only attacker and a defender are considered as the two players of the game. With the use of recent advancements made in the mean field game theory, we have proposed a novel extensive game with multiple players for MWSN security, such that the aggregator node can securely compute aggregation data even in the presence of an attack. The proposed scheme enables the aggregator node and an individual node in MWSN to strategically make defense decisions and hence, the confidential data could be faithfully transmitted to base station (BS) for security. Also, each node in this dynamic distributed network, knows the information about its own state and the information about the other nodes’ aggregate effect in the MWSN. Optimal strategic equilibrium solution to our proposed mean field extensive game is given, such that the utility of each player is maximized in the game. Extensive game analysis and study shows that our proposed dynamic algorithm strategically outperforms existing static approach.
{"title":"Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework","authors":"Khyati Chopra, R. Bose, A. Joshi","doi":"10.1109/SPIN.2018.8474175","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474175","url":null,"abstract":"In this paper, game theoretic framework is used as a mathematical tool to address security problems in mobile wireless sensor network (MWSN). In most of the existing works, only attacker and a defender are considered as the two players of the game. With the use of recent advancements made in the mean field game theory, we have proposed a novel extensive game with multiple players for MWSN security, such that the aggregator node can securely compute aggregation data even in the presence of an attack. The proposed scheme enables the aggregator node and an individual node in MWSN to strategically make defense decisions and hence, the confidential data could be faithfully transmitted to base station (BS) for security. Also, each node in this dynamic distributed network, knows the information about its own state and the information about the other nodes’ aggregate effect in the MWSN. Optimal strategic equilibrium solution to our proposed mean field extensive game is given, such that the utility of each player is maximized in the game. Extensive game analysis and study shows that our proposed dynamic algorithm strategically outperforms existing static approach.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}