首页 > 最新文献

2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)最新文献

英文 中文
Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol AODV协议中基于行为和节点性能的灰洞攻击检测与截断
Shrishti Jain, S. Raghuwanshi
In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.
在移动自组织网络中,节点动态地从一个地方移动到另一个地方,如果一个节点想要与另一个节点进行通信,则需要在两个通信节点之间建立通信路由。由于动态特性,许多路由攻击也会发生,如黑洞攻击和灰洞攻击。灰洞攻击是黑洞攻击的一种特殊类型,这种攻击是指恶意节点参与路由发现过程,通过它们发现路由后,这些节点开始丢弃报文,某些类型的报文会被拦截,灰洞攻击的检测过程比黑洞攻击要困难。本文提出了一种基于Ad-hoc随需应变距离矢量路由协议的基本路由策略,并将一些节点集作为入侵检测系统来检测灰洞攻击。在此,我们将行为异常基检测应用于灰洞攻击,IDS节点观察灰洞节点产生的数据异常,并将灰洞节点块消息广播给所有参与节点,以防止这种类型的攻击。整个工作使用网络模拟器-2进行仿真,利用网络基参数进行性能分析,识别异常产生节点和数据丢失识别。
{"title":"Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol","authors":"Shrishti Jain, S. Raghuwanshi","doi":"10.1109/ICAETR.2014.7012931","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012931","url":null,"abstract":"In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis and design of compact dual-band bandstop filter using E-shaped resonators 采用e型谐振腔的紧凑型双带带阻滤波器的分析与设计
A. Joshi, Deepak Bhatia
This paper presents a compact dual-band bandstop filter (DBBSF) that features two controllable stopbands at 1.8 GHz and 5.2 GHz frequencies. A drastic reduction in size of the filter was achieved by taking advantage of a simplified architecture based on E-shaped resonator. The return losses of the simulated filter are measured to be -54.03 and -42.57 dB while the insertion losses are -0.01 and -0.10 dB at the respective stop bands. Due to its compact size and satisfactory stopband performance, the filter can be useful for modern communication technology.
本文提出了一种紧凑的双频带阻滤波器(dbsf),具有1.8 GHz和5.2 GHz两个可控阻带。通过利用基于e形谐振器的简化架构,大大减小了滤波器的尺寸。模拟滤波器的回波损耗分别为-54.03和-42.57 dB,插入损耗分别为-0.01和-0.10 dB。由于其紧凑的尺寸和令人满意的阻带性能,该滤波器可用于现代通信技术。
{"title":"Analysis and design of compact dual-band bandstop filter using E-shaped resonators","authors":"A. Joshi, Deepak Bhatia","doi":"10.1109/ICAETR.2014.7012800","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012800","url":null,"abstract":"This paper presents a compact dual-band bandstop filter (DBBSF) that features two controllable stopbands at 1.8 GHz and 5.2 GHz frequencies. A drastic reduction in size of the filter was achieved by taking advantage of a simplified architecture based on E-shaped resonator. The return losses of the simulated filter are measured to be -54.03 and -42.57 dB while the insertion losses are -0.01 and -0.10 dB at the respective stop bands. Due to its compact size and satisfactory stopband performance, the filter can be useful for modern communication technology.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coexistence issues and challenges amongst cellular, WiFi and WiMAX networks 蜂窝、WiFi和WiMAX网络共存的问题和挑战
Hardeep Kaur, J. Malhotra
The existing wireless data network standards are diverse and include those in 2.5G Wireless, 3G Wireless, beyond 3G Wireless, and there are various wireless standards which come under the IEEE 802 family include WiFi and WiMAX. These wireless standards can be classified according to their distance ranges in terms of wide area network, local area network, metropolitan area network, and personal area network. This paper includes the brief introduction to wireless data networks like cellular technology, WiFi and WiMAX. This paper mainly focuses on coexistence issues of 3G with WiFi and coexistence issues of 3G with WiMAX. It also provides the suitable solution to various coexistence problems.
现有的无线数据网络标准是多种多样的,包括2.5G无线,3G无线,超过3G无线,以及IEEE 802家族下的各种无线标准,包括WiFi和WiMAX。这些无线标准可以根据其距离范围分为广域网、局域网、城域网和个人局域网。本文简要介绍了蜂窝技术、WiFi和WiMAX等无线数据网络。本文主要研究3G与WiFi的共存问题以及3G与WiMAX的共存问题。并为各种共存问题提供了合适的解决方案。
{"title":"Coexistence issues and challenges amongst cellular, WiFi and WiMAX networks","authors":"Hardeep Kaur, J. Malhotra","doi":"10.1109/ICAETR.2014.7012886","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012886","url":null,"abstract":"The existing wireless data network standards are diverse and include those in 2.5G Wireless, 3G Wireless, beyond 3G Wireless, and there are various wireless standards which come under the IEEE 802 family include WiFi and WiMAX. These wireless standards can be classified according to their distance ranges in terms of wide area network, local area network, metropolitan area network, and personal area network. This paper includes the brief introduction to wireless data networks like cellular technology, WiFi and WiMAX. This paper mainly focuses on coexistence issues of 3G with WiFi and coexistence issues of 3G with WiMAX. It also provides the suitable solution to various coexistence problems.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Universal approximation using probabilistic neural networks with sigmoid activation functions 具有s型激活函数的概率神经网络的通用逼近
R. Murugadoss, M. Ramakrishnan
In this paper we demonstrate that finite linear combinations of compositions of a fixed, univariate function and a set of affine functional can uniformly approximate any continuous function of n real variables with support in the unit hypercube; only mild conditions are imposed on the univariate function. Our results settle an open question about representability in the class of single bidden layer neural networks. In particular, we show that arbitrary decision regions can be arbitrarily well approximated by continuous feedforward neural networks with only a single internal, hidden layer and any continuous sigmoidal nonlinearity. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI).
本文证明了一个固定的单变量函数与一组仿射泛函的组合的有限线性组合可以在单位超立方体上一致逼近任何有支持的n个实变量的连续函数;对单变量函数只施加轻微的条件。我们的结果解决了一个关于单隐层神经网络可表征性的开放性问题。特别地,我们证明了任意决策区域可以被连续前馈神经网络任意地很好地逼近,只有一个单一的内部,隐藏层和任何连续s型非线性。本文讨论了其他可能由人工神经网络实现的非线性的近似性质。每天的登记有N个案例,每个案例都是众所周知的刺激-答案对所代表的。这项工作的目标是开发一个函数,它允许找到入口变量向量t到出口变量向量p的向量F是任何函数,在这种情况下是电力消耗。它们的人工神经网络(ANN)建模是多感知器层(PMC)。另一种建模形式是使用插值算法(AI)。
{"title":"Universal approximation using probabilistic neural networks with sigmoid activation functions","authors":"R. Murugadoss, M. Ramakrishnan","doi":"10.1109/ICAETR.2014.7012920","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012920","url":null,"abstract":"In this paper we demonstrate that finite linear combinations of compositions of a fixed, univariate function and a set of affine functional can uniformly approximate any continuous function of n real variables with support in the unit hypercube; only mild conditions are imposed on the univariate function. Our results settle an open question about representability in the class of single bidden layer neural networks. In particular, we show that arbitrary decision regions can be arbitrarily well approximated by continuous feedforward neural networks with only a single internal, hidden layer and any continuous sigmoidal nonlinearity. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI).","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Association rule mining for web usage data to improve websites 关联规则挖掘web使用数据,改进网站
Avadh Kishor Singh, Ajeet Kumar, A. Maurya
Association rule mining along with frequent items has been comprehensively research in data mining. In this paper, we proposed a model for association rules to mine the generated frequent k-itemset. We take this process as extraction of rules which expressed most useful information. Therefore, transactional knowledge of using websites is considered to solve the purpose. In this paper we use interestingness measure that plays an important role in invalid rules thereby reducing the size of rule data sets. The performance analysis attempted with Apriori, most frequent rule mining algorithm and interestingness measure to compare the efficiency of websites. The proposed work reduces large number of immaterial rules and produces new set of rules with interesting measure. Our extensive experiments will use relevant rule mining to enhance websites and data accuracy.
关联规则挖掘和频繁项挖掘在数据挖掘中得到了广泛的研究。在本文中,我们提出了一种关联规则模型来挖掘生成的频繁k项集。我们把这个过程看作是对表达最有用信息的规则的提取。因此,使用网站的交易知识被认为是解决问题的目的。在本文中,我们使用了在无效规则中起重要作用的有趣度度量,从而减少了规则数据集的大小。性能分析尝试使用Apriori、最常用的规则挖掘算法和兴趣度度量来比较网站的效率。该方法减少了大量的非物质规则,并产生了一套具有有趣度量的新规则。我们广泛的实验将使用相关的规则挖掘来提高网站和数据的准确性。
{"title":"Association rule mining for web usage data to improve websites","authors":"Avadh Kishor Singh, Ajeet Kumar, A. Maurya","doi":"10.1109/ICAETR.2014.7012882","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012882","url":null,"abstract":"Association rule mining along with frequent items has been comprehensively research in data mining. In this paper, we proposed a model for association rules to mine the generated frequent k-itemset. We take this process as extraction of rules which expressed most useful information. Therefore, transactional knowledge of using websites is considered to solve the purpose. In this paper we use interestingness measure that plays an important role in invalid rules thereby reducing the size of rule data sets. The performance analysis attempted with Apriori, most frequent rule mining algorithm and interestingness measure to compare the efficiency of websites. The proposed work reduces large number of immaterial rules and produces new set of rules with interesting measure. Our extensive experiments will use relevant rule mining to enhance websites and data accuracy.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Review: Performance analysis of space-time-frequency MIMO OFDM techniques 综述:空时频MIMO OFDM技术的性能分析
C. Padmaja, Dr. B. L. Malleswari
The ever increasing development in wireless cellular mobile systems for future generation is that by using MIMO architecture, it is possible to increase the system capacity, higher bit rate, smaller bit error rate and reliability. MIMO systems have multiple antennas both at the transmitter and at the receiver.
下一代无线蜂窝移动系统日益发展的趋势是,采用MIMO架构可以增加系统容量、提高比特率、减小误码率和提高可靠性。MIMO系统在发射器和接收器上都有多个天线。
{"title":"Review: Performance analysis of space-time-frequency MIMO OFDM techniques","authors":"C. Padmaja, Dr. B. L. Malleswari","doi":"10.1109/ICAETR.2014.7012941","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012941","url":null,"abstract":"The ever increasing development in wireless cellular mobile systems for future generation is that by using MIMO architecture, it is possible to increase the system capacity, higher bit rate, smaller bit error rate and reliability. MIMO systems have multiple antennas both at the transmitter and at the receiver.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SiC soft- switched dc - ac converter for high frequency application 用于高频应用的碳化硅软开关dc - ac变换器
C. Ashwini, Eril Paul, P. Lakshmi
With the advancements in power electronics and semiconductor technologies, there has been a high improvement in the performance of the electronics systems and devices. In order to make the system compact, the number of components used should be less. When the device has to be used for high frequency applications, the switching losses increases and efficiency of the system reduces. Therefore, the emerging semiconductor Silicon Carbide is made use to operate at higher frequencies in the range of Mega Hertz. To further reduce the switching losses, soft switching technique is implemented. Also, to minimize the number of components used and the cost, a single inductor multi output dc - ac converter is employed. In this paper, a comparative analysis of the silicon and silicon carbide devices in a mutli - output dc - ac soft switched converter is performed using MATLAB/SIMULINK.
随着电力电子和半导体技术的进步,电子系统和器件的性能有了很大的提高。为了使系统紧凑,使用的组件数量应该少一些。当器件必须用于高频应用时,开关损耗增加,系统效率降低。因此,新兴的半导体碳化硅被用于在兆赫兹范围内的更高频率下工作。为了进一步降低开关损耗,采用了软开关技术。此外,为了尽量减少使用的元件数量和成本,采用了单电感多输出直流-交流变换器。本文利用MATLAB/SIMULINK对多输出直流-交流软开关变换器中的硅器件和碳化硅器件进行了对比分析。
{"title":"SiC soft- switched dc - ac converter for high frequency application","authors":"C. Ashwini, Eril Paul, P. Lakshmi","doi":"10.1109/ICAETR.2014.7012838","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012838","url":null,"abstract":"With the advancements in power electronics and semiconductor technologies, there has been a high improvement in the performance of the electronics systems and devices. In order to make the system compact, the number of components used should be less. When the device has to be used for high frequency applications, the switching losses increases and efficiency of the system reduces. Therefore, the emerging semiconductor Silicon Carbide is made use to operate at higher frequencies in the range of Mega Hertz. To further reduce the switching losses, soft switching technique is implemented. Also, to minimize the number of components used and the cost, a single inductor multi output dc - ac converter is employed. In this paper, a comparative analysis of the silicon and silicon carbide devices in a mutli - output dc - ac soft switched converter is performed using MATLAB/SIMULINK.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combined neural network approach for mining order-preserving sub matrices from repeated dataset 基于组合神经网络的重复数据集保序子矩阵挖掘
Reeta Dangi, R. C. Jain, Vivek Sharma
Order-preserving sub matrices (OPSM's) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their correct values. For example, in analyzing gene expression profiles obtained from micro-array experiments, the comparative magnitudes are important both since they represent the change of gene activities across the experiments, and since there is naturally a high level of noise in data that makes the exact values non trustable. To manage with data noise, repeated experiments are often conducted to collect multiple measurements. This paper includes Eigen value decomposition combined for solving data mining from order preserving sub-matrices from repeated dataset. Experimental results shows this method gives far better results in terms of time and candidate pattern ratio.
当数据项的相对大小比它们的正确值更重要时,保序子矩阵(OPSM)在捕获数据中的并发模式方面非常有用。例如,在分析从微阵列实验中获得的基因表达谱时,比较量很重要,因为它们代表了整个实验中基因活动的变化,而且由于数据中自然存在高水平的噪声,使得精确值不可信。为了处理数据噪声,经常进行重复实验以收集多个测量值。本文将特征值分解结合到重复数据集的保序子矩阵数据挖掘中。实验结果表明,该方法在时间和候选模式比方面都有较好的效果。
{"title":"Combined neural network approach for mining order-preserving sub matrices from repeated dataset","authors":"Reeta Dangi, R. C. Jain, Vivek Sharma","doi":"10.1109/ICAETR.2014.7012887","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012887","url":null,"abstract":"Order-preserving sub matrices (OPSM's) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their correct values. For example, in analyzing gene expression profiles obtained from micro-array experiments, the comparative magnitudes are important both since they represent the change of gene activities across the experiments, and since there is naturally a high level of noise in data that makes the exact values non trustable. To manage with data noise, repeated experiments are often conducted to collect multiple measurements. This paper includes Eigen value decomposition combined for solving data mining from order preserving sub-matrices from repeated dataset. Experimental results shows this method gives far better results in terms of time and candidate pattern ratio.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved energy efficient secure multipath AODV routing protocol for MANET 改进的能源效率安全多路径AODV路由协议的MANET
Hrishabha Raj Jain, S. Sharma
In mobile ad hoc network (MANET), energy consumption is one among the foremost vital restrictions that deteriorate the performance of the whole network. Multi-path routing is better than the single path routing in ad hoc networks, because multi path routing allows the establishment of multiple path between a single source and single destination node. This paper presents a new approach of energy efficient secure multipath AODV (EESM-AODV) routing protocol for MANET based on AODV protocol is modified and converted to work on multiple path. Differing types of routing protocols planned over the years with minimal management overhead and network resources. AODV is well-liked routing protocol among others. It is a loop free, no centralized authority, single path, On-demand routing protocol and its performance is superior than different routing protocols in MANET. However, single path plan is that the most vital drawbacks of AODV. Also, it is a heap of routing overhead at the time of route repair and route discovery method. The mobile nodes in MANET also have restricted resources like battery power, restricted information measure that solely single path protocols cannot handle efficiently. so routing is also a really vital issue inside the look of a MANET. Multipath routing permits the multiple methods between one source and single destination node and during this paper conjointly offer security by filtering route discovery process in AODV routing protocol. The proposed approach contains an adaptive technique in which the our proposed scheme is more energy efficient. The filtering forwarding scheme slows down the spread of excessive RREQs originated by a node per unit time and with success prevents Denial of service attacks. This paper planned multipath extensions of AODV routing protocol and a security improvement against We compared results of AODV routing protocols in attacked condition and after applied our algorithm and enhance the results exploitation multipath scheme for AODV. We used ns-2 to simulate. Simulation results show that the energy consumption of network is less after applying our proposed algorithm and our Network gets more stable and that proposed technique has better packet delivery ratio and improved throughput.
在移动自组织网络(MANET)中,能量消耗是影响整个网络性能的最重要因素之一。在ad hoc网络中,多路径路由优于单路径路由,因为多路径路由允许在单个源节点和单个目的节点之间建立多条路径。本文在对多路径AODV路由协议进行改进和转换的基础上,提出了一种面向MANET的节能安全多路径AODV路由协议(EESM-AODV)。多年来以最小的管理开销和网络资源规划了不同类型的路由协议。在其他路由协议中,AODV是一种很受欢迎的路由协议。它是一种无环路、无中心权限、单路径、按需路由协议,其性能优于MANET中其他路由协议。然而,单路径计划是AODV最重要的缺点。同时,它也是路由修复和路由发现时的一堆路由开销。MANET中的移动节点也有有限的资源,如电池电量,有限的信息度量,单路径协议无法有效处理。所以路由也是一个非常重要的问题在一个MANET的外观。在AODV路由协议中,多路径路由允许在一个源节点和单个目的节点之间存在多种路由方式,并通过过滤路由发现过程来共同提供安全性。所提出的方法包含一种自适应技术,其中我们提出的方案更节能。过滤转发方案可以减缓单位时间内节点发起的过量rreq的传播速度,并成功防止拒绝服务攻击。本文对AODV路由协议的多路径扩展和安全性改进进行了规划,比较了AODV路由协议在攻击条件下和应用我们的算法后的结果,并对AODV多路径开发方案的结果进行了改进。我们用ns-2来模拟。仿真结果表明,采用该算法后,网络能耗降低,网络稳定性提高,数据包传输率提高,吞吐量提高。
{"title":"Improved energy efficient secure multipath AODV routing protocol for MANET","authors":"Hrishabha Raj Jain, S. Sharma","doi":"10.1109/ICAETR.2014.7012847","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012847","url":null,"abstract":"In mobile ad hoc network (MANET), energy consumption is one among the foremost vital restrictions that deteriorate the performance of the whole network. Multi-path routing is better than the single path routing in ad hoc networks, because multi path routing allows the establishment of multiple path between a single source and single destination node. This paper presents a new approach of energy efficient secure multipath AODV (EESM-AODV) routing protocol for MANET based on AODV protocol is modified and converted to work on multiple path. Differing types of routing protocols planned over the years with minimal management overhead and network resources. AODV is well-liked routing protocol among others. It is a loop free, no centralized authority, single path, On-demand routing protocol and its performance is superior than different routing protocols in MANET. However, single path plan is that the most vital drawbacks of AODV. Also, it is a heap of routing overhead at the time of route repair and route discovery method. The mobile nodes in MANET also have restricted resources like battery power, restricted information measure that solely single path protocols cannot handle efficiently. so routing is also a really vital issue inside the look of a MANET. Multipath routing permits the multiple methods between one source and single destination node and during this paper conjointly offer security by filtering route discovery process in AODV routing protocol. The proposed approach contains an adaptive technique in which the our proposed scheme is more energy efficient. The filtering forwarding scheme slows down the spread of excessive RREQs originated by a node per unit time and with success prevents Denial of service attacks. This paper planned multipath extensions of AODV routing protocol and a security improvement against We compared results of AODV routing protocols in attacked condition and after applied our algorithm and enhance the results exploitation multipath scheme for AODV. We used ns-2 to simulate. Simulation results show that the energy consumption of network is less after applying our proposed algorithm and our Network gets more stable and that proposed technique has better packet delivery ratio and improved throughput.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Character segmentation in Malayalam Handwritten documents 马拉雅拉姆语手写文件的字符分割
C. Shanjana, A. James
This paper propose a method to segment individual characters from a Malayalam Handwritten document. All the existing systems for Malayalam handwritten character recognition segments isolated characters from a document and deals only with a subset of characters. The proposed method takes the words from the original handwritten document for segmentation. So, here the method has to deal with touching characters, breaks in the characters, different handwriting styles, fonts etc. Character segmentation is done by using the combination of Vertical Projection method and connected component analysis method. Then the unique features for identifying each characters are extracted and given to a classifier. The classifier identifies each character and corresponding Malayalam character is given as output.
本文提出了一种马来雅拉姆语手写文档中单个字符的分割方法。所有现有的马拉雅拉姆语手写字符识别系统都将字符从文档中分离出来,只处理字符的子集。该方法从原始手写文档中提取单词进行分割。这个方法需要处理触摸字符,字符的断行,不同的书写风格,字体等。采用垂直投影法和连通分量分析法相结合的方法进行字符分割。然后提取用于识别每个字符的唯一特征,并将其提供给分类器。分类器识别每个字符并给出相应的马拉雅拉姆字符作为输出。
{"title":"Character segmentation in Malayalam Handwritten documents","authors":"C. Shanjana, A. James","doi":"10.1109/ICAETR.2014.7012835","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012835","url":null,"abstract":"This paper propose a method to segment individual characters from a Malayalam Handwritten document. All the existing systems for Malayalam handwritten character recognition segments isolated characters from a document and deals only with a subset of characters. The proposed method takes the words from the original handwritten document for segmentation. So, here the method has to deal with touching characters, breaks in the characters, different handwriting styles, fonts etc. Character segmentation is done by using the combination of Vertical Projection method and connected component analysis method. Then the unique features for identifying each characters are extracted and given to a classifier. The classifier identifies each character and corresponding Malayalam character is given as output.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132947412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1