首页 > 最新文献

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

英文 中文
Dynamic resource provisioning in Cloud Computing environment using priority based virtual machine's 云计算环境下基于优先级的虚拟机动态资源配置
S. Girase, M. Sohani, Suraj Patil
Today, Cloud Computing become one of the most promising an emerging technology which will has a significant impact on IT Infrastructure. Still, Cloud Computing is infancy. In the current cloud computing environment there is numerous of application, consist of millions of module, these application serve from large quantity of users and user request becomes dynamic. So there must be provision that all resources are dynamically made available to satisfy the needs of requesting a user in a situation where the resource contention fierce is occurs. In this paper, we propose scheduling heuristic to allocate resource and schedule request for cloud system. An aim of proposed scheduling heuristic is to schedule request on Virtual Machine (VM) based on agreed Service Level Agreements (SLA) and creating new VM on physical resources based on availabilities of resources which considered priority based VM allocation, Load Balancing and Preemption Mechanism. And the experimental results of proposed heuristic helps to optimize performance and at the same time reduce the possibilities of SLA violations.
今天,云计算成为最有前途的新兴技术之一,它将对IT基础设施产生重大影响。尽管如此,云计算仍处于起步阶段。在当前的云计算环境中,应用程序数量众多,由数以百万计的模块组成,这些应用程序服务于大量的用户,用户的请求变得动态。因此,必须提供动态地提供所有资源,以满足在发生资源激烈争用的情况下请求用户的需求。本文提出了一种调度启发式算法,用于云系统的资源分配和请求调度。启发式调度的目的是基于服务水平协议(SLA)对虚拟机(VM)上的请求进行调度,并根据资源的可用性在物理资源上创建新的VM,考虑了基于优先级的VM分配、负载均衡和抢占机制。实验结果表明,提出的启发式算法在优化性能的同时减少了SLA违规的可能性。
{"title":"Dynamic resource provisioning in Cloud Computing environment using priority based virtual machine's","authors":"S. Girase, M. Sohani, Suraj Patil","doi":"10.1109/ICACCCT.2014.7019415","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019415","url":null,"abstract":"Today, Cloud Computing become one of the most promising an emerging technology which will has a significant impact on IT Infrastructure. Still, Cloud Computing is infancy. In the current cloud computing environment there is numerous of application, consist of millions of module, these application serve from large quantity of users and user request becomes dynamic. So there must be provision that all resources are dynamically made available to satisfy the needs of requesting a user in a situation where the resource contention fierce is occurs. In this paper, we propose scheduling heuristic to allocate resource and schedule request for cloud system. An aim of proposed scheduling heuristic is to schedule request on Virtual Machine (VM) based on agreed Service Level Agreements (SLA) and creating new VM on physical resources based on availabilities of resources which considered priority based VM allocation, Load Balancing and Preemption Mechanism. And the experimental results of proposed heuristic helps to optimize performance and at the same time reduce the possibilities of SLA violations.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A comprehensive survey of handwritten character segmentation 手写体字符分割的综合研究
Mayur Vyas, K. Verma
Handwritten character segmentation is the process of dividing a character into multiple segments so that it can be passed to the recognition system and on the basis of these segments the recognition system can recognize that particular character. In this process user provides the input through any touch devices like PDA, Mobiles or by the Tablets and the segmentation tool takes the input and break the character into segments. There are various techniques available which performs the segmentation of the handwritten input. The aim of this paper is to do survey of various techniques and find out the best among them.
手写字符分割是将一个字符分割成多个字符段的过程,以便将其传递给识别系统,识别系统在这些字符段的基础上识别该特定字符。在这个过程中,用户通过任何触摸设备(如PDA,手机或平板电脑)提供输入,分割工具接受输入并将字符分成段。有多种技术可用于对手写输入进行分割。本文的目的是对各种技术进行综述,并从中找出最好的技术。
{"title":"A comprehensive survey of handwritten character segmentation","authors":"Mayur Vyas, K. Verma","doi":"10.1109/ICACCCT.2014.7019344","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019344","url":null,"abstract":"Handwritten character segmentation is the process of dividing a character into multiple segments so that it can be passed to the recognition system and on the basis of these segments the recognition system can recognize that particular character. In this process user provides the input through any touch devices like PDA, Mobiles or by the Tablets and the segmentation tool takes the input and break the character into segments. There are various techniques available which performs the segmentation of the handwritten input. The aim of this paper is to do survey of various techniques and find out the best among them.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security testing of orchestrated business processes in SOA SOA中编排业务流程的安全性测试
C. Hariharan, C. Babu
Service Oriented Architecture (SOA) has been widely used during the past decade due to its ability to seamlessly integrate various applications developed using different technologies. Web services based on open standards are the most commonly used technology to realize an SOA. Business processes are executed by appropriate orchestration of various services from different departments that belong to a single organization or from multiple organizations. Security is an important quality attribute that has to be built into any application that is developed using SOA. XML is the underlying technology for Web Service Description Language (WSDL), SOAP protocol and Business Process Execution Language (BPEL). It is highly probable that an attacker could inject malicious information into these XML files to modify the flow of the business process. Further, SOAP was not designed with security in mind, it is possible to tamper the SOAP messages while they are in transit. There exist a number of such potential vulnerabilities which lead to possible security breach in the individual services. In an orchestrated business process, there are possibilities of more vulnerabilities. One of the existing tools namely WS-Attacker is only capable of testing the security of individual web services alone. In spite of the widespread usage of SOA, currently there is limited automatic tool support for testing the security provided by an entire SOA application involving service orchestration. In this context, this paper focuses on designing and implementing a plug-in for WS-Attacker to analyze a few security vulnerabilities present in SOA business processes.
面向服务的体系结构(SOA)由于能够无缝集成使用不同技术开发的各种应用程序,在过去十年中得到了广泛的应用。基于开放标准的Web服务是实现SOA最常用的技术。业务流程是通过适当编排来自不同部门的各种服务来执行的,这些部门属于一个组织或来自多个组织。安全性是一个重要的质量属性,必须将其内置到使用SOA开发的任何应用程序中。XML是Web服务描述语言(WSDL)、SOAP协议和业务流程执行语言(BPEL)的底层技术。攻击者极有可能将恶意信息注入这些XML文件以修改业务流程流。此外,SOAP在设计时并没有考虑到安全性,因此有可能在传输过程中篡改SOAP消息。存在许多这样的潜在漏洞,这些漏洞可能导致单个服务中的安全漏洞。在编排好的业务流程中,存在更多漏洞的可能性。现有的工具之一即ws - attack仅能够单独测试单个web服务的安全性。尽管SOA得到了广泛的使用,但目前用于测试涉及服务编排的整个SOA应用程序所提供的安全性的自动工具支持有限。在这种情况下,本文着重于为ws - attack设计和实现一个插件,以分析SOA业务流程中存在的一些安全漏洞。
{"title":"Security testing of orchestrated business processes in SOA","authors":"C. Hariharan, C. Babu","doi":"10.1109/ICACCCT.2014.7019337","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019337","url":null,"abstract":"Service Oriented Architecture (SOA) has been widely used during the past decade due to its ability to seamlessly integrate various applications developed using different technologies. Web services based on open standards are the most commonly used technology to realize an SOA. Business processes are executed by appropriate orchestration of various services from different departments that belong to a single organization or from multiple organizations. Security is an important quality attribute that has to be built into any application that is developed using SOA. XML is the underlying technology for Web Service Description Language (WSDL), SOAP protocol and Business Process Execution Language (BPEL). It is highly probable that an attacker could inject malicious information into these XML files to modify the flow of the business process. Further, SOAP was not designed with security in mind, it is possible to tamper the SOAP messages while they are in transit. There exist a number of such potential vulnerabilities which lead to possible security breach in the individual services. In an orchestrated business process, there are possibilities of more vulnerabilities. One of the existing tools namely WS-Attacker is only capable of testing the security of individual web services alone. In spite of the widespread usage of SOA, currently there is limited automatic tool support for testing the security provided by an entire SOA application involving service orchestration. In this context, this paper focuses on designing and implementing a plug-in for WS-Attacker to analyze a few security vulnerabilities present in SOA business processes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical pixel block selection 统计像素块选择
Prashant Manuja, Ravi Saharan
Secret information sharing has been the need of hour. The author exploited the opportunity to enhance the amount of information passed through images and above that asserting its security level on a bigger scale. This enhancement of security can be attributed to the development of a new methodology of random pixel block selection. The information to be passed is embedded by altering the pixel values of R, G and B individually or collectively depending upon the amount of information that has to be embedded. The proposed paper presents a steganography technique by pushing its information holding capacity to an all new level whereas at the same time not compromising with its robustness and reliability. Since change in the pixel value is minute and as per a predetermined rule as proposed by the author, the difference between original and stego image is imperceptible to normal human eye. An additional authentication scheme is also added for stego image.
秘密信息共享已成为当今时代的需要。作者利用这个机会增加了通过图像传递的信息量,并在此基础上更大规模地主张其安全级别。这种安全性的增强可归因于随机像素块选择的新方法的发展。根据需要嵌入的信息量,通过单独或集体改变R、G和B的像素值来嵌入要传递的信息。本文提出了一种隐写技术,它将信息保存能力提升到一个全新的水平,同时又不影响其鲁棒性和可靠性。由于像素值的变化是微小的,并且按照作者提出的预先确定的规律,原始图像和隐写图像之间的差异是正常人眼难以察觉的。还为隐写映像添加了一个额外的身份验证方案。
{"title":"Statistical pixel block selection","authors":"Prashant Manuja, Ravi Saharan","doi":"10.1109/ICACCCT.2014.7019315","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019315","url":null,"abstract":"Secret information sharing has been the need of hour. The author exploited the opportunity to enhance the amount of information passed through images and above that asserting its security level on a bigger scale. This enhancement of security can be attributed to the development of a new methodology of random pixel block selection. The information to be passed is embedded by altering the pixel values of R, G and B individually or collectively depending upon the amount of information that has to be embedded. The proposed paper presents a steganography technique by pushing its information holding capacity to an all new level whereas at the same time not compromising with its robustness and reliability. Since change in the pixel value is minute and as per a predetermined rule as proposed by the author, the difference between original and stego image is imperceptible to normal human eye. An additional authentication scheme is also added for stego image.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Firewall engine based on Graphics Processing Unit 防火墙引擎基于图形处理单元
A. Sahoo, Amardeep Das, Mayank Tiwary
Firewalls are very important elements in network security. Working of firewall rules for enterprise network has become complex, error-prone and time-consuming. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. The main issue is the slow filtering action during heavy load. To reduce the time consumption there is a very urgent need of optimized firewall engine, which runs on GPU's. We mainly focus on the creating parallel algorithms for desktop firewall which reduces the time consumption and at the same time it can allow for strong threat detection, intrusion detection of incoming packets. In our paper we have created parallel optimized algorithms for intrusion detection, threat detection, packet filtering and network address translation which runs on NVIDIA's GPU card and it is based on CUDA programming. For our experimental analysis, we have created test packets and for virus scanning we have used the virus-signatures from Clam-AV.
防火墙是网络安全的重要组成部分。企业网络防火墙规则的工作变得复杂、容易出错和耗时。为了正确实现安全策略,必须仔细编写和组织防火墙过滤规则。主要问题是在高负载时过滤速度慢。为了减少时间消耗,迫切需要优化运行在GPU上的防火墙引擎。本文主要研究了桌面防火墙并行算法的创建,在减少时间消耗的同时,可以对传入的数据包进行强威胁检测、入侵检测。在本文中,我们基于CUDA编程,在NVIDIA的GPU卡上创建了入侵检测、威胁检测、包过滤和网络地址转换的并行优化算法。为了进行实验分析,我们创建了测试包,并使用了来自Clam-AV的病毒签名进行病毒扫描。
{"title":"Firewall engine based on Graphics Processing Unit","authors":"A. Sahoo, Amardeep Das, Mayank Tiwary","doi":"10.1109/ICACCCT.2014.7019193","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019193","url":null,"abstract":"Firewalls are very important elements in network security. Working of firewall rules for enterprise network has become complex, error-prone and time-consuming. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. The main issue is the slow filtering action during heavy load. To reduce the time consumption there is a very urgent need of optimized firewall engine, which runs on GPU's. We mainly focus on the creating parallel algorithms for desktop firewall which reduces the time consumption and at the same time it can allow for strong threat detection, intrusion detection of incoming packets. In our paper we have created parallel optimized algorithms for intrusion detection, threat detection, packet filtering and network address translation which runs on NVIDIA's GPU card and it is based on CUDA programming. For our experimental analysis, we have created test packets and for virus scanning we have used the virus-signatures from Clam-AV.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Android application for stock market prediction by fuzzy logic Android应用程序,通过模糊逻辑实现股市预测
Chinmayee Sadhu, R. Rane, Nandini Waghmare, A. Patki
Presently, firms in financial services sector like banking and insurance make profits by investing their clients' money in stock markets, the strategies for which are heavily infrastructure dependent and unknown outside the organization. This paper discusses the development of an android application which can be made available directly to the common investors from unorganized sector. The application uses rule based fuzzy logic [1, 2, 3, 4] for analyzing the direction of stock market movement. We report emulation on BlueStacks App Player [5].
目前,银行和保险等金融服务部门的公司通过将客户的钱投资于股票市场来获利,这些策略严重依赖于基础设施,并且在组织之外不知道。本文讨论了一个android应用程序的开发,该应用程序可以直接提供给非组织部门的普通投资者。该应用程序使用基于规则的模糊逻辑[1,2,3,4]来分析股票市场的运动方向。我们报告了BlueStacks App Player的仿真[5]。
{"title":"Android application for stock market prediction by fuzzy logic","authors":"Chinmayee Sadhu, R. Rane, Nandini Waghmare, A. Patki","doi":"10.1109/ICACCCT.2014.7019395","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019395","url":null,"abstract":"Presently, firms in financial services sector like banking and insurance make profits by investing their clients' money in stock markets, the strategies for which are heavily infrastructure dependent and unknown outside the organization. This paper discusses the development of an android application which can be made available directly to the common investors from unorganized sector. The application uses rule based fuzzy logic [1, 2, 3, 4] for analyzing the direction of stock market movement. We report emulation on BlueStacks App Player [5].","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced route planning for mobile anchors in localization of WSN 无线传感器网络定位中移动锚点路径规划的改进
I. Renuka, C. Bala Subramanian
Distributed sensors deployed in huge numbers in the observant field forming an ad hoc network is called as Wireless Sensor Networks (WSN). The issue of uncertainty of location of a sensor node is called as localization. For identifying the location of a sensor node, a single mobile anchor has been utilized. The path of the mobile anchor is based on SCAN algorithm. Localization with single mobile anchor does not exhibit much accuracy. The data transfer of the gathered information is low. In our paper we propose a mechanism by customizing two mobile anchors in the same observant field. Our proposed method will achieve efficient data transfer rate and optimal localization of all the anchor nodes.
在观测领域大量部署的分布式传感器组成一个自组织网络,被称为无线传感器网络(WSN)。传感器节点位置的不确定性问题称为定位问题。为了识别传感器节点的位置,使用了单个移动锚。移动锚的路径是基于SCAN算法的。单一移动锚点的定位精度不高。采集到的信息的数据传输速度较低。在我们的论文中,我们提出了一种机制,通过定制两个移动锚在同一观测领域。该方法能够实现高效的数据传输速率和所有锚节点的最优定位。
{"title":"Enhanced route planning for mobile anchors in localization of WSN","authors":"I. Renuka, C. Bala Subramanian","doi":"10.1109/ICACCCT.2014.7019168","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019168","url":null,"abstract":"Distributed sensors deployed in huge numbers in the observant field forming an ad hoc network is called as Wireless Sensor Networks (WSN). The issue of uncertainty of location of a sensor node is called as localization. For identifying the location of a sensor node, a single mobile anchor has been utilized. The path of the mobile anchor is based on SCAN algorithm. Localization with single mobile anchor does not exhibit much accuracy. The data transfer of the gathered information is low. In our paper we propose a mechanism by customizing two mobile anchors in the same observant field. Our proposed method will achieve efficient data transfer rate and optimal localization of all the anchor nodes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LTE physical layer implementation using GPU based high performance computing LTE物理层实现采用基于GPU的高性能计算
S. Bhattacharjee, S. Yadav, S. K. Patra
In recent years Graphics Processing Unit (GPU) has evolved as a high performance data processing technology allowing users to compute large blocks of parallel data using an array of low complexity processors. This paper proposes the implementation of compute intensive portions of 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) physical layer using GPU. LTE employs Orthogonal Frequency Division Multiple Access (OFDMA) in downlink and Single Carrier Frequency Division Multiple Access (SC-FDMA) in uplink. Both these demand computationally complex Inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) processing at the transmitter and the receiver. The computational requirements at the base station increases significantly with the increase in number of users. This paper presents a simulation model utilizing the massively parallel architecture of GPU to reduce computation time of IFFT and FFT operations. Simulation results demonstrate that GPU provides a framework for fast data processing in this application.
近年来,图形处理单元(GPU)已经发展成为一种高性能数据处理技术,允许用户使用一组低复杂度的处理器来计算大量并行数据。本文提出了利用GPU实现第三代合作伙伴计划(3GPP)长期演进(LTE)物理层的计算密集型部分。LTE下行链路采用正交频分多址(OFDMA),上行链路采用单载波频分多址(SC-FDMA)。这两者都需要计算复杂的反快速傅里叶变换(IFFT)和快速傅里叶变换(FFT)处理在发射机和接收机。随着用户数量的增加,基站的计算需求也在显著增加。本文提出了一种利用GPU大规模并行架构的仿真模型,以减少IFFT和FFT运算的计算时间。仿真结果表明,GPU为该应用的快速数据处理提供了一个框架。
{"title":"LTE physical layer implementation using GPU based high performance computing","authors":"S. Bhattacharjee, S. Yadav, S. K. Patra","doi":"10.1109/ICACCCT.2014.7019365","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019365","url":null,"abstract":"In recent years Graphics Processing Unit (GPU) has evolved as a high performance data processing technology allowing users to compute large blocks of parallel data using an array of low complexity processors. This paper proposes the implementation of compute intensive portions of 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) physical layer using GPU. LTE employs Orthogonal Frequency Division Multiple Access (OFDMA) in downlink and Single Carrier Frequency Division Multiple Access (SC-FDMA) in uplink. Both these demand computationally complex Inverse Fast Fourier Transform (IFFT) and Fast Fourier Transform (FFT) processing at the transmitter and the receiver. The computational requirements at the base station increases significantly with the increase in number of users. This paper presents a simulation model utilizing the massively parallel architecture of GPU to reduce computation time of IFFT and FFT operations. Simulation results demonstrate that GPU provides a framework for fast data processing in this application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of hybrid ring coupler for 800MHz–1200 MHz 800mhz - 1200mhz混合环形耦合器的设计与实现
N. Jagatheesh, P. Muthukumaran, S. Prince
A novel wide band hybrid ring coupler is proposed in this paper. The change in length of transmission line is calculated and it is converted in to equivalent impedance. Impedance of the circuit is varied using variable capacitor. The device is to be fabricated and tested for frequency range 800-1200MHz. The circuit shows improved isolation and return loss. The circuit is reduced by using Koch fractal curve method. The results for both conventional and the reduced Koch hybrid coupler are simulated and the results are compared.
提出了一种新型宽带混合环形耦合器。计算传输线长度的变化,并将其转换为等效阻抗。采用可变电容改变电路的阻抗。该装置将在800-1200MHz的频率范围内制造和测试。该电路的隔离性和回波损耗得到了改善。采用科赫分形曲线法对电路进行了简化。对传统和简化的科赫混合式耦合器进行了仿真,并对结果进行了比较。
{"title":"Design and implementation of hybrid ring coupler for 800MHz–1200 MHz","authors":"N. Jagatheesh, P. Muthukumaran, S. Prince","doi":"10.1109/ICACCCT.2014.7019169","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019169","url":null,"abstract":"A novel wide band hybrid ring coupler is proposed in this paper. The change in length of transmission line is calculated and it is converted in to equivalent impedance. Impedance of the circuit is varied using variable capacitor. The device is to be fabricated and tested for frequency range 800-1200MHz. The circuit shows improved isolation and return loss. The circuit is reduced by using Koch fractal curve method. The results for both conventional and the reduced Koch hybrid coupler are simulated and the results are compared.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting software vulnerabilities in android using static analysis 使用静态分析检测android中的软件漏洞
R. Dhaya, M. Poongodi
Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.
现在,像智能手机、平板电脑和个人数字助理等移动设备在我们的日常生活中扮演着最重要的角色。高端移动设备的功能与计算机相同。基于Android的智能手机变得更加脆弱,因为它是一个开源的操作系统。任何人都可以开发新的应用程序并将其发布到android市场。这些类型的申请未经授权公司核实。因此,它可能包括恶意应用程序,它可能是病毒,间谍软件,蠕虫等,这可能会导致系统故障,浪费内存资源,破坏数据,窃取个人信息,也增加了维护成本。由于这些原因,手机安全或移动安全是移动计算中非常重要的一个问题。在现有的系统中,由于更新签名的限制,无法检测到新的病毒。该系统旨在利用基于搜索的机器学习算法(称为N-gram分析)激发基于静态代码分析的恶意软件检测,并检测移动应用程序中未被注意的恶意特征或漏洞。
{"title":"Detecting software vulnerabilities in android using static analysis","authors":"R. Dhaya, M. Poongodi","doi":"10.1109/ICACCCT.2014.7019227","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019227","url":null,"abstract":"Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1