Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124788
Hemant Hingave, R. Ingle
Log is the main source of system operation status, user behavior, system's actions etc. Log analysis system needs not only the massive and stable data processing ability but also the adaptation to a variety of scenarios under the requirement of efficiency and performance, which can't be achieved from available standalone analysis tools or even single computing framework. Hence we propose a log analyzer with the combination of Hadoop and Map-Reduce paradigm. The joint of Hadoop and MapReduce programming tools makes it possible to provide batch analysis in minimum response time and in-memory computing capacity in order to process log in a high available, efficient and stable way.
{"title":"An approach for MapReduce based log analysis using Hadoop","authors":"Hemant Hingave, R. Ingle","doi":"10.1109/ECS.2015.7124788","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124788","url":null,"abstract":"Log is the main source of system operation status, user behavior, system's actions etc. Log analysis system needs not only the massive and stable data processing ability but also the adaptation to a variety of scenarios under the requirement of efficiency and performance, which can't be achieved from available standalone analysis tools or even single computing framework. Hence we propose a log analyzer with the combination of Hadoop and Map-Reduce paradigm. The joint of Hadoop and MapReduce programming tools makes it possible to provide batch analysis in minimum response time and in-memory computing capacity in order to process log in a high available, efficient and stable way.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124928
S. Reddy, Ashish Panchal, Shailendra, B. Patil
Mobile communication in today's world means a lot to the human kind, many deals are made and others are broken, within seconds. That is because of our sophisticated methods of transporting the data at very high speeds and to very long distances. That is also because we kept on improving the method of serving the connections as the no of connections kept on increasing. Methods like TDMA, CDMA, and FDMA, etc. are few basic techniques in communication. Also the architecture of wireless communication shows the areas where connections are provided are divided into CELLS, which are the basic blocks for wireless communication. With the intervention of the wireless system for making calls, the wired communication, to which CELL has no relation has almost been neglected. This also forced the communication giants to upgrade to wireless service along with the existing wired networks.
{"title":"Wired network services in mobile phones","authors":"S. Reddy, Ashish Panchal, Shailendra, B. Patil","doi":"10.1109/ECS.2015.7124928","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124928","url":null,"abstract":"Mobile communication in today's world means a lot to the human kind, many deals are made and others are broken, within seconds. That is because of our sophisticated methods of transporting the data at very high speeds and to very long distances. That is also because we kept on improving the method of serving the connections as the no of connections kept on increasing. Methods like TDMA, CDMA, and FDMA, etc. are few basic techniques in communication. Also the architecture of wireless communication shows the areas where connections are provided are divided into CELLS, which are the basic blocks for wireless communication. With the intervention of the wireless system for making calls, the wired communication, to which CELL has no relation has almost been neglected. This also forced the communication giants to upgrade to wireless service along with the existing wired networks.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124800
Zhang Ming-yong
This paper tries to identify the effect of blended learning teaching mode on English writing teaching and learning in institutions of higher vocational education by conducting an experiment with the Academic English Writing course with blended learning mode. Through a SPSS statistic analysis of the pretest and posttest results of the experiment and a questionnaire, the author finally finds out that blended learning plays a positive role in the improvement of students English writing skill, it is accepted by students in institutions of higher vocational education in China, and that it can help to enhance students ability to study autonomously.
{"title":"An empirical research into the effect of blended learning on English writing learning in institutions of higher vocational education","authors":"Zhang Ming-yong","doi":"10.1109/ECS.2015.7124800","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124800","url":null,"abstract":"This paper tries to identify the effect of blended learning teaching mode on English writing teaching and learning in institutions of higher vocational education by conducting an experiment with the Academic English Writing course with blended learning mode. Through a SPSS statistic analysis of the pretest and posttest results of the experiment and a questionnaire, the author finally finds out that blended learning plays a positive role in the improvement of students English writing skill, it is accepted by students in institutions of higher vocational education in China, and that it can help to enhance students ability to study autonomously.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"34 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124797
Priyanka, M. Dave
Peer-to-Peer (P2P) botnets have emerged as a serious threat against the network security. They are used to carry out various illicit activities like click fraud, DDOS attacks and for information exfiltration. These botnets use distributed concept for command dissemination. These botnets are resilient to dynamic churn and to take-down attempts. Earlier P2P botnet detection techniques have some shortcomings such as they have less accuracy, unable to detect stealthy botnets and advanced botnets using fast-flux networks. In this paper, we list recent P2P botnet detection techniques that overcome the weaknesses of previous techniques with higher detection accuracy. We also discuss various such techniques, their advantages, accuracy and the weaknesses they too are having. However, two or more techniques can be used together to have more accurate and robust P2P botnet detection.
{"title":"A review of recent Peer-to-Peer botnet detection techniques","authors":"Priyanka, M. Dave","doi":"10.1109/ECS.2015.7124797","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124797","url":null,"abstract":"Peer-to-Peer (P2P) botnets have emerged as a serious threat against the network security. They are used to carry out various illicit activities like click fraud, DDOS attacks and for information exfiltration. These botnets use distributed concept for command dissemination. These botnets are resilient to dynamic churn and to take-down attempts. Earlier P2P botnet detection techniques have some shortcomings such as they have less accuracy, unable to detect stealthy botnets and advanced botnets using fast-flux networks. In this paper, we list recent P2P botnet detection techniques that overcome the weaknesses of previous techniques with higher detection accuracy. We also discuss various such techniques, their advantages, accuracy and the weaknesses they too are having. However, two or more techniques can be used together to have more accurate and robust P2P botnet detection.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7125025
R. Nithya, N. Mahendran
Wireless sensor networks consist of spatially distributed sensor nodes, which can sense the environment by collecting, processing and transmitting the data to sink node. A critical issue in wireless sensor networks since most sensors is equipped with non-rechargeable batteries. The lifetime of a sensor network can be extended by jointly applying different techniques of scheduling and routing schemes also brings great challenges to the design of efficient distributed routing protocols for multi-hop wireless sensor networks. In scheduling algorithms, the nodes are arranged to sleep when they are not in use. The main purpose of scheduling algorithms is to minimize resource starvation and to ensure fairness amongst the parties utilizing the resources. The routing can be applied to wireless sensor networks for reducing energy consumption caused by retransmissions and dynamically detouring critical sensor nodes with less energy. To achieve network lifetime maximization of wireless sensor network through joint routing schemes and scheduling algorithms. This paper surveys the latest progresses in scheduling and routing schemes.
{"title":"A SURVEY: Duty cycle based routing and scheduling in wireless sensor networks","authors":"R. Nithya, N. Mahendran","doi":"10.1109/ECS.2015.7125025","DOIUrl":"https://doi.org/10.1109/ECS.2015.7125025","url":null,"abstract":"Wireless sensor networks consist of spatially distributed sensor nodes, which can sense the environment by collecting, processing and transmitting the data to sink node. A critical issue in wireless sensor networks since most sensors is equipped with non-rechargeable batteries. The lifetime of a sensor network can be extended by jointly applying different techniques of scheduling and routing schemes also brings great challenges to the design of efficient distributed routing protocols for multi-hop wireless sensor networks. In scheduling algorithms, the nodes are arranged to sleep when they are not in use. The main purpose of scheduling algorithms is to minimize resource starvation and to ensure fairness amongst the parties utilizing the resources. The routing can be applied to wireless sensor networks for reducing energy consumption caused by retransmissions and dynamically detouring critical sensor nodes with less energy. To achieve network lifetime maximization of wireless sensor network through joint routing schemes and scheduling algorithms. This paper surveys the latest progresses in scheduling and routing schemes.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114331046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124942
Mr. P. Vijayakumar, Dr.S. Malarvizhi, M. Hariprasath
A Cognitive Radio is a Software Defined Radio (SDR). The Cognitive radio network is capable to sense and analyze its surrounding environment as well as reconfigure its operation in accordance with this radio environment. In this way, based on the available Channel State Information (CSI), the cognitive radio network may dynamically access the spectrum. MIMO based cognitive radio system enabled dynamically simultaneous usage of a radio spectrum for this beam forming signal processing technique is used. Beam forming is a technique in which the directionality of transmission and reception of radio signals can be controlled. Modern wireless technology depends on beam forming technology in order to provide higher data rates, improved coverage and also used to share the spectrum with the other users. Hardware complexity is one of the main issue in MIMO based wireless system which require N number of RF chains for N antenna systems. Antenna sub array formation (ASF) scheme is an optimization technique which can be used to reduce the RF chain required such a way the capacity can be improved. This will reduce the cost of the hardware much and we can realize low cost hardware system. Usually the two process of sub array formation and beam forming are done as separate process but in this paper the joint beam forming and sub array formation is done such a way the secondary user capacity will be improved and to avoid two computational complex process. Antenna sub array formation (ASF) scheme is employed to maximize the Signal to Interference Ratio (SINR) by using all antenna elements. In Antenna sub array formation the Radio Frequency chain is allocated to sub array of elements.
{"title":"Low cost reception scheme for MIMO cognitive radio","authors":"Mr. P. Vijayakumar, Dr.S. Malarvizhi, M. Hariprasath","doi":"10.1109/ECS.2015.7124942","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124942","url":null,"abstract":"A Cognitive Radio is a Software Defined Radio (SDR). The Cognitive radio network is capable to sense and analyze its surrounding environment as well as reconfigure its operation in accordance with this radio environment. In this way, based on the available Channel State Information (CSI), the cognitive radio network may dynamically access the spectrum. MIMO based cognitive radio system enabled dynamically simultaneous usage of a radio spectrum for this beam forming signal processing technique is used. Beam forming is a technique in which the directionality of transmission and reception of radio signals can be controlled. Modern wireless technology depends on beam forming technology in order to provide higher data rates, improved coverage and also used to share the spectrum with the other users. Hardware complexity is one of the main issue in MIMO based wireless system which require N number of RF chains for N antenna systems. Antenna sub array formation (ASF) scheme is an optimization technique which can be used to reduce the RF chain required such a way the capacity can be improved. This will reduce the cost of the hardware much and we can realize low cost hardware system. Usually the two process of sub array formation and beam forming are done as separate process but in this paper the joint beam forming and sub array formation is done such a way the secondary user capacity will be improved and to avoid two computational complex process. Antenna sub array formation (ASF) scheme is employed to maximize the Signal to Interference Ratio (SINR) by using all antenna elements. In Antenna sub array formation the Radio Frequency chain is allocated to sub array of elements.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124902
Y. Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat
Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.
{"title":"Fog computing — Network based cloud computing","authors":"Y. Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat","doi":"10.1109/ECS.2015.7124902","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124902","url":null,"abstract":"Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7124763
Chandan Kumar Sahu, Pramitee Behera
This paper focus on a smart irrigation system which is cost effective and a middle class farmer use it in farm field. Today we are living in 21st century where automation is playing important role in human life. Automation allows us to control appliances automatic control. It not only provide comfort but also reduce energy, efficiency and time saving. Today industries are use automation and control machine which is high in cost and not suitable for using in a farm field. So here we also design a smart irrigation technology in low cost which is usable by Indian farmers. The objectives of this paper were to control the water motor automatically and select the direction of the flow of water in pipe with the help of soil moisture sensor. Finally send the information (operation of the motor and direction of water) of the farm field to the mobile message and g-mail account of the user.
{"title":"A low cost smart irrigation control system","authors":"Chandan Kumar Sahu, Pramitee Behera","doi":"10.1109/ECS.2015.7124763","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124763","url":null,"abstract":"This paper focus on a smart irrigation system which is cost effective and a middle class farmer use it in farm field. Today we are living in 21st century where automation is playing important role in human life. Automation allows us to control appliances automatic control. It not only provide comfort but also reduce energy, efficiency and time saving. Today industries are use automation and control machine which is high in cost and not suitable for using in a farm field. So here we also design a smart irrigation technology in low cost which is usable by Indian farmers. The objectives of this paper were to control the water motor automatically and select the direction of the flow of water in pipe with the help of soil moisture sensor. Finally send the information (operation of the motor and direction of water) of the farm field to the mobile message and g-mail account of the user.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123000544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7125059
S. Kalita, P. Sahu
Unlike broadcast communication and other wireless communication, jamming resistant communication is also most crucial for the safety of a signal in underwater. So in this paper an uncoordinated direct sequence spread spectrum technique which can handle an unlimited amount of receivers have been used for anti-jamming multi-channel Underwater Communication (UWC). For performance analysis of the proposed system, a circuit simulation model was made to calculate Bit Error Rate (BER) by considering multipath fading, jamming signal, Doppler spread and Additive White Gaussian Noise (AWGN) etc. and are compared with the analytical results, experimental results and previous works. From the results it is seen that BER vs. JSR shows less BER than that of the previous work and that the values of BER within the SNR range of 5dB-19dB will be 1×10-1~2×10-5 for BPSK which is also found to be less than that of the previous work.
{"title":"An anti-jamming underwater communication transceiver model using uncoordinated direct sequence spread spectrum technique","authors":"S. Kalita, P. Sahu","doi":"10.1109/ECS.2015.7125059","DOIUrl":"https://doi.org/10.1109/ECS.2015.7125059","url":null,"abstract":"Unlike broadcast communication and other wireless communication, jamming resistant communication is also most crucial for the safety of a signal in underwater. So in this paper an uncoordinated direct sequence spread spectrum technique which can handle an unlimited amount of receivers have been used for anti-jamming multi-channel Underwater Communication (UWC). For performance analysis of the proposed system, a circuit simulation model was made to calculate Bit Error Rate (BER) by considering multipath fading, jamming signal, Doppler spread and Additive White Gaussian Noise (AWGN) etc. and are compared with the analytical results, experimental results and previous works. From the results it is seen that BER vs. JSR shows less BER than that of the previous work and that the values of BER within the SNR range of 5dB-19dB will be 1×10-1~2×10-5 for BPSK which is also found to be less than that of the previous work.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-18DOI: 10.1109/ECS.2015.7125040
K. David Solomon Raj, I. Mohan Krishna
The targets parameter to be measured for tracking are its relative position in range, azimuth angle, elevation angle and velocity. These parameters can be measured by tracking radar systems. Upon keeping the tracking of these measured parameters the tracker predict their future values. Fire control and missile guidance can be assisted through target tracking only. In fact missile guidance cannot be achieved without tracking the target properly. To predict target parameters (future samples) between scans, track while scan radar system sample each target once per scan interval by using sophisticated smoothing and prediction filters among which alpha-beta-gamma (αβγ) and Kalman filters are commonly used. The principle of recursive tracking and prediction filters are proposed in this paper for two maneuvering targets (lazy and aggressive maneuvering), by implementing the second and third order one dimensional fixed gain polynomial filter trackers. Finally the equations for an n-dimensional multi state Kalman filter are implemented and analyzed. In order to evaluate the performance of tracking filters the target considered in this paper is a Novator K100 Indian/Russian air-to-air missile designed to fly at Mach 4. In this paper the main objective of developing these filter tracking algorithmsis to reduce the measurement noise and tracking filter must be capable of tracking maneuvering targets with small residual (tracking errors).
{"title":"Kalman filter based target tracking for track while scan data processing","authors":"K. David Solomon Raj, I. Mohan Krishna","doi":"10.1109/ECS.2015.7125040","DOIUrl":"https://doi.org/10.1109/ECS.2015.7125040","url":null,"abstract":"The targets parameter to be measured for tracking are its relative position in range, azimuth angle, elevation angle and velocity. These parameters can be measured by tracking radar systems. Upon keeping the tracking of these measured parameters the tracker predict their future values. Fire control and missile guidance can be assisted through target tracking only. In fact missile guidance cannot be achieved without tracking the target properly. To predict target parameters (future samples) between scans, track while scan radar system sample each target once per scan interval by using sophisticated smoothing and prediction filters among which alpha-beta-gamma (αβγ) and Kalman filters are commonly used. The principle of recursive tracking and prediction filters are proposed in this paper for two maneuvering targets (lazy and aggressive maneuvering), by implementing the second and third order one dimensional fixed gain polynomial filter trackers. Finally the equations for an n-dimensional multi state Kalman filter are implemented and analyzed. In order to evaluate the performance of tracking filters the target considered in this paper is a Novator K100 Indian/Russian air-to-air missile designed to fly at Mach 4. In this paper the main objective of developing these filter tracking algorithmsis to reduce the measurement noise and tracking filter must be capable of tracking maneuvering targets with small residual (tracking errors).","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}