The most of present mobile wireless systems are based on the cellular radio concept. These cellular systems achieve high capacity by allowing the mobile station (MS) to reuse a communication channel in different geographic service area. Channel reuse leads to co-channel interference among users sharing the same channel. Co-channel interference causes outage of the wireless channel and hence limits the capacity of a cellular system. Sectoring is an established technique for reducing the interference level in conventional cellular wireless system. In the paper the outage statistics for forward link of a cellular radio system is presented in sectored environment. Simulation approach is used for the evaluation and outage statistics computation. Large scale fading severely affects the capacity and performance of wireless system. Hence effects such as shadowing and path loss are included in the simulation. Results are presented in form of graphs which show variation in outage probability with different signal to co-channel interference ratio (SIR) thresholds. Different values of path loss exponent and effects of sectoring are considered in simulation. Presented results may be applied in design of higher layer protocols and performance evaluation of wireless and mobile computing systems.
{"title":"Forward Link Outage Statistics of a Cellular Radio System in Sectored Environment","authors":"S. S. Pawar, Anjana Jain","doi":"10.1109/ICETET.2008.204","DOIUrl":"https://doi.org/10.1109/ICETET.2008.204","url":null,"abstract":"The most of present mobile wireless systems are based on the cellular radio concept. These cellular systems achieve high capacity by allowing the mobile station (MS) to reuse a communication channel in different geographic service area. Channel reuse leads to co-channel interference among users sharing the same channel. Co-channel interference causes outage of the wireless channel and hence limits the capacity of a cellular system. Sectoring is an established technique for reducing the interference level in conventional cellular wireless system. In the paper the outage statistics for forward link of a cellular radio system is presented in sectored environment. Simulation approach is used for the evaluation and outage statistics computation. Large scale fading severely affects the capacity and performance of wireless system. Hence effects such as shadowing and path loss are included in the simulation. Results are presented in form of graphs which show variation in outage probability with different signal to co-channel interference ratio (SIR) thresholds. Different values of path loss exponent and effects of sectoring are considered in simulation. Presented results may be applied in design of higher layer protocols and performance evaluation of wireless and mobile computing systems.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Audio watermarking method presented in this paper embeds the watermark data in the wavelet domain and performs the blind detection of the watermark. To embed the watermark the additive watermark embedding approach is used in which scaling parameter is computed based on the SNR (signal to noise ratio). The technique is implemented in DWT domain. 32 times 32 binary image is used as the watermark data. The SNR based adaptive watermarking scheme[6] and the proposed scheme for blind detection are implemented their results are presented here. The techniques are tested against different signal manipulation processing such as filtering, resampling, compression, cropping and requantization. The host audio signal used foe the experimentation is the Indian musical signal. It is observed that the technique is resilient against various signal manipulation attacks.
{"title":"SNR Based Audio Watermarking Scheme for Blind Detection","authors":"M. Patil, S. Apte","doi":"10.1109/ICETET.2008.174","DOIUrl":"https://doi.org/10.1109/ICETET.2008.174","url":null,"abstract":"Audio watermarking method presented in this paper embeds the watermark data in the wavelet domain and performs the blind detection of the watermark. To embed the watermark the additive watermark embedding approach is used in which scaling parameter is computed based on the SNR (signal to noise ratio). The technique is implemented in DWT domain. 32 times 32 binary image is used as the watermark data. The SNR based adaptive watermarking scheme[6] and the proposed scheme for blind detection are implemented their results are presented here. The techniques are tested against different signal manipulation processing such as filtering, resampling, compression, cropping and requantization. The host audio signal used foe the experimentation is the Indian musical signal. It is observed that the technique is resilient against various signal manipulation attacks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128591967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adaptive modulation enables a WiMAX system to optimize the throughput based on propagation conditions. IEEE 802.16 (WiMAX) system support BPSK, QPSK, 16-QAM and 64-QAM and the access scheme is OFDM. This paper presents the performance of different variants of transmission control protocols with different modulation schemes when density of mobile nodes changes.
{"title":"Simulation Based Comparison of Different Modulation Schemes for Mobile WiMAX Using TCP and its Variants","authors":"L. Malviya, M. A. Gaiwak, P. D. Vyavhare","doi":"10.1109/ICETET.2008.191","DOIUrl":"https://doi.org/10.1109/ICETET.2008.191","url":null,"abstract":"Adaptive modulation enables a WiMAX system to optimize the throughput based on propagation conditions. IEEE 802.16 (WiMAX) system support BPSK, QPSK, 16-QAM and 64-QAM and the access scheme is OFDM. This paper presents the performance of different variants of transmission control protocols with different modulation schemes when density of mobile nodes changes.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. Ad hoc networks are peer to peer, autonomous networks comprised of wireless mobile devices. The ease and speed of deployment of these networks makes them ideal for battlefield communications, disaster recovery and other such applications where fixed infrastructure is not readily available. limited bandwidth, energy constraints and unpredictable network topologies pose difficult problems for the design of applications for these networks. The last couple of years have seen renewed research in this field. Specifically in unicast and multicast routing and security issues. In this paper, we address how secure the multicast routing problem for ad hoc networks.
{"title":"Security in Multicast Routing in Ad Hoc Network","authors":"P. Annadurai, V. Palanisamy","doi":"10.1109/ICETET.2008.250","DOIUrl":"https://doi.org/10.1109/ICETET.2008.250","url":null,"abstract":"In recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. Ad hoc networks are peer to peer, autonomous networks comprised of wireless mobile devices. The ease and speed of deployment of these networks makes them ideal for battlefield communications, disaster recovery and other such applications where fixed infrastructure is not readily available. limited bandwidth, energy constraints and unpredictable network topologies pose difficult problems for the design of applications for these networks. The last couple of years have seen renewed research in this field. Specifically in unicast and multicast routing and security issues. In this paper, we address how secure the multicast routing problem for ad hoc networks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most promising and rapidly growing areas of GA application is data analysis and prediction in molecular biology. GAs have been used for predicting protein structure. Recently there has been considerable effort towards developing methods such as GAs and neural networks for automatically predicting protein structures. This GA prediction project illustrates one way in which GAs can be used on this task.
{"title":"Application of Genetic Algorithms in Structural Representation of Proteins","authors":"P. Chaudhari, P. Thute","doi":"10.1109/ICETET.2008.212","DOIUrl":"https://doi.org/10.1109/ICETET.2008.212","url":null,"abstract":"One of the most promising and rapidly growing areas of GA application is data analysis and prediction in molecular biology. GAs have been used for predicting protein structure. Recently there has been considerable effort towards developing methods such as GAs and neural networks for automatically predicting protein structures. This GA prediction project illustrates one way in which GAs can be used on this task.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
{"title":"Robust Image Watermarking Under Pixel Wise Masking Framework","authors":"V. Mankar, T. Das, Subhojit Saha, S. Sarkar","doi":"10.1109/ICETET.2008.51","DOIUrl":"https://doi.org/10.1109/ICETET.2008.51","url":null,"abstract":"The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124210618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper covers a simple RTL implementation of a command processor with its associated macroinstructions implemented on FPGA device to drive an external peripherals having processor like bus interface. Soft processor is used inside FPGA device to handle the tasks of software driver for peripheral controller. The paper discusses an approach to mimic a simple soft processor to handle the task at core layer of driver for basic communication with peripherals connected to FPGA. The present architecture envisages a three-tier implementation of peripheral hardware software co-design interface. The Top level is an application processor connected to FPGA for handling high-level application layers. The application processor could be a generic processor or a DSP. The next second level is a soft processor embedded in FPGA for handling middle layer software. Command processor or pre-processor handles the third bottom core layer task/command specific processing.
{"title":"Embedding Driver for a Peripheral Interface on FPGA","authors":"S. Bhandari, S. Pujari, S. Subbaraman","doi":"10.1109/ICETET.2008.205","DOIUrl":"https://doi.org/10.1109/ICETET.2008.205","url":null,"abstract":"The paper covers a simple RTL implementation of a command processor with its associated macroinstructions implemented on FPGA device to drive an external peripherals having processor like bus interface. Soft processor is used inside FPGA device to handle the tasks of software driver for peripheral controller. The paper discusses an approach to mimic a simple soft processor to handle the task at core layer of driver for basic communication with peripherals connected to FPGA. The present architecture envisages a three-tier implementation of peripheral hardware software co-design interface. The Top level is an application processor connected to FPGA for handling high-level application layers. The application processor could be a generic processor or a DSP. The next second level is a soft processor embedded in FPGA for handling middle layer software. Command processor or pre-processor handles the third bottom core layer task/command specific processing.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Power system stabilizer (PSS) is used to damp out local mode oscillations of synchronous generators. PSS are usually designed to provide a proper phase lead which is load dependent. Thus, PSS parameters have to be adjusted at each operating condition. A novel robust PSS design based on Taguchi principle is presented in this paper that can properly function over a wide range of operating conditions and extend the machine loadability. In this approach, signal to noise ratio concept of Taguchi robust design is used to represent the optimization objective and the PSS parameters are searched by genetic algorithm (GA). The simulation results illustrate the effectiveness of the proposed stabilizer as it is applied to the single machine-infinite bus power system under wide range of loading conditions.
{"title":"Genetic Algorithm Based Robust Power System Stabilizer Design Using Taguchi Principle","authors":"S. R. Karnik, A. Raju, M. S. Raviprakasha","doi":"10.1109/ICETET.2008.63","DOIUrl":"https://doi.org/10.1109/ICETET.2008.63","url":null,"abstract":"Power system stabilizer (PSS) is used to damp out local mode oscillations of synchronous generators. PSS are usually designed to provide a proper phase lead which is load dependent. Thus, PSS parameters have to be adjusted at each operating condition. A novel robust PSS design based on Taguchi principle is presented in this paper that can properly function over a wide range of operating conditions and extend the machine loadability. In this approach, signal to noise ratio concept of Taguchi robust design is used to represent the optimization objective and the PSS parameters are searched by genetic algorithm (GA). The simulation results illustrate the effectiveness of the proposed stabilizer as it is applied to the single machine-infinite bus power system under wide range of loading conditions.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multicast routing protocols in mobile ad-hoc networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and multiparty conferencing which made the analytical design and development of the MANETs in a very efficient manner. For MANETs there are several multicast routing protocols are available, but they perform well under specific scenarios only. The topology of a MANET changes adequately due to the random mobility of network nodes, unlike the wired network which is static. Due to the lack of redundancy in multipath and multicast structures, the multicast routing protocols are vulnerable to the component failure in ad-hoc networks. Due to this fact, route selection becomes a tragedy in MANETs. So it is the dire need to optimize the route selection. GA is an optimizing tool and its key factors that determine the performance of GA is by the well designed architecture of chromosomes and operators in the intelligent algorithm. In this paper we attempt to propose a new genetic algorithm based on demand multicast routing protocol (GA-ODMRP), which improves the performance in the routing messages. GA-ODMRP is well suited for mobile ad hoc networks where the topology changes frequently and power is constrained. We evaluate GA-ODMRP performance under various realistic scenarios.
{"title":"An Intelligent on Demand Multicast Routing Protocol for MANETs","authors":"E. Baburaj, V. Vasudevan","doi":"10.1109/ICETET.2008.102","DOIUrl":"https://doi.org/10.1109/ICETET.2008.102","url":null,"abstract":"Multicast routing protocols in mobile ad-hoc networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and multiparty conferencing which made the analytical design and development of the MANETs in a very efficient manner. For MANETs there are several multicast routing protocols are available, but they perform well under specific scenarios only. The topology of a MANET changes adequately due to the random mobility of network nodes, unlike the wired network which is static. Due to the lack of redundancy in multipath and multicast structures, the multicast routing protocols are vulnerable to the component failure in ad-hoc networks. Due to this fact, route selection becomes a tragedy in MANETs. So it is the dire need to optimize the route selection. GA is an optimizing tool and its key factors that determine the performance of GA is by the well designed architecture of chromosomes and operators in the intelligent algorithm. In this paper we attempt to propose a new genetic algorithm based on demand multicast routing protocol (GA-ODMRP), which improves the performance in the routing messages. GA-ODMRP is well suited for mobile ad hoc networks where the topology changes frequently and power is constrained. We evaluate GA-ODMRP performance under various realistic scenarios.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conventionally concrete is a mix of cement, sand and aggregate. There is a large variation in the strength of concrete due to variation in the strength of aggregates used. There is scarcity of natural sand due to heavy demand in growing construction activities which forces to find the suitable substitute. The cheapest and the easiest way of getting substitute for natural sand is by crushing natural stone to get artificial sand of desired size and grade which would be free from all impurities. This paper presents the feasibility of the usage of artificial sand obtained by crushing basalt over natural sand considering technical, environmental and commercial factors. For the purpose of experimentation concrete mixes are designed for M20, M30 and M40 grades by 100% replacement of natural sand to artificial sand. Compressive and flexural tests are conducted to study the strength of concrete using artificial sand and the results are compared with that of natural sand concrete.
{"title":"Experimental Study of Artificial Sand Concrete","authors":"M. R. Chitlange, P. S. Pajgade, P. Nagarnaik","doi":"10.1109/ICETET.2008.164","DOIUrl":"https://doi.org/10.1109/ICETET.2008.164","url":null,"abstract":"Conventionally concrete is a mix of cement, sand and aggregate. There is a large variation in the strength of concrete due to variation in the strength of aggregates used. There is scarcity of natural sand due to heavy demand in growing construction activities which forces to find the suitable substitute. The cheapest and the easiest way of getting substitute for natural sand is by crushing natural stone to get artificial sand of desired size and grade which would be free from all impurities. This paper presents the feasibility of the usage of artificial sand obtained by crushing basalt over natural sand considering technical, environmental and commercial factors. For the purpose of experimentation concrete mixes are designed for M20, M30 and M40 grades by 100% replacement of natural sand to artificial sand. Compressive and flexural tests are conducted to study the strength of concrete using artificial sand and the results are compared with that of natural sand concrete.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}