首页 > 最新文献

2008 First International Conference on Emerging Trends in Engineering and Technology最新文献

英文 中文
Forward Link Outage Statistics of a Cellular Radio System in Sectored Environment 扇区环境下蜂窝无线电系统转发链路中断统计
S. S. Pawar, Anjana Jain
The most of present mobile wireless systems are based on the cellular radio concept. These cellular systems achieve high capacity by allowing the mobile station (MS) to reuse a communication channel in different geographic service area. Channel reuse leads to co-channel interference among users sharing the same channel. Co-channel interference causes outage of the wireless channel and hence limits the capacity of a cellular system. Sectoring is an established technique for reducing the interference level in conventional cellular wireless system. In the paper the outage statistics for forward link of a cellular radio system is presented in sectored environment. Simulation approach is used for the evaluation and outage statistics computation. Large scale fading severely affects the capacity and performance of wireless system. Hence effects such as shadowing and path loss are included in the simulation. Results are presented in form of graphs which show variation in outage probability with different signal to co-channel interference ratio (SIR) thresholds. Different values of path loss exponent and effects of sectoring are considered in simulation. Presented results may be applied in design of higher layer protocols and performance evaluation of wireless and mobile computing systems.
目前大多数移动无线系统都是基于蜂窝无线电的概念。这些蜂窝系统通过允许移动站(MS)在不同的地理服务区域重用通信信道来实现高容量。信道重用会导致共享同一信道的用户之间产生同信道干扰。同信道干扰导致无线信道中断,从而限制蜂窝系统的容量。在传统的蜂窝无线系统中,分割是一种成熟的降低干扰水平的技术。本文给出了在扇区环境下蜂窝无线电系统前向链路的中断统计。采用仿真方法进行评估和停机统计计算。大规模衰落严重影响了无线系统的容量和性能。因此,诸如阴影和路径损失等影响都包含在模拟中。结果以图表的形式显示了中断概率随不同信号同信道干扰比(SIR)阈值的变化。仿真中考虑了路径损耗指数的不同取值和分割线的影响。研究结果可应用于无线和移动计算系统的高层协议设计和性能评估。
{"title":"Forward Link Outage Statistics of a Cellular Radio System in Sectored Environment","authors":"S. S. Pawar, Anjana Jain","doi":"10.1109/ICETET.2008.204","DOIUrl":"https://doi.org/10.1109/ICETET.2008.204","url":null,"abstract":"The most of present mobile wireless systems are based on the cellular radio concept. These cellular systems achieve high capacity by allowing the mobile station (MS) to reuse a communication channel in different geographic service area. Channel reuse leads to co-channel interference among users sharing the same channel. Co-channel interference causes outage of the wireless channel and hence limits the capacity of a cellular system. Sectoring is an established technique for reducing the interference level in conventional cellular wireless system. In the paper the outage statistics for forward link of a cellular radio system is presented in sectored environment. Simulation approach is used for the evaluation and outage statistics computation. Large scale fading severely affects the capacity and performance of wireless system. Hence effects such as shadowing and path loss are included in the simulation. Results are presented in form of graphs which show variation in outage probability with different signal to co-channel interference ratio (SIR) thresholds. Different values of path loss exponent and effects of sectoring are considered in simulation. Presented results may be applied in design of higher layer protocols and performance evaluation of wireless and mobile computing systems.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SNR Based Audio Watermarking Scheme for Blind Detection 基于信噪比的盲检测音频水印方案
M. Patil, S. Apte
Audio watermarking method presented in this paper embeds the watermark data in the wavelet domain and performs the blind detection of the watermark. To embed the watermark the additive watermark embedding approach is used in which scaling parameter is computed based on the SNR (signal to noise ratio). The technique is implemented in DWT domain. 32 times 32 binary image is used as the watermark data. The SNR based adaptive watermarking scheme[6] and the proposed scheme for blind detection are implemented their results are presented here. The techniques are tested against different signal manipulation processing such as filtering, resampling, compression, cropping and requantization. The host audio signal used foe the experimentation is the Indian musical signal. It is observed that the technique is resilient against various signal manipulation attacks.
本文提出的音频水印方法是将水印数据嵌入小波域,并对水印进行盲检测。为了嵌入水印,采用了基于信噪比计算缩放参数的加性水印嵌入方法。该技术在DWT域中实现。采用32 × 32的二值图像作为水印数据。本文实现了基于信噪比的自适应水印方案[6]和提出的盲检测方案,并给出了结果。这些技术在滤波、重采样、压缩、裁剪和需求化等不同的信号处理中进行了测试。实验中使用的主机音频信号为印度音乐信号。观察到该技术对各种信号操纵攻击具有弹性。
{"title":"SNR Based Audio Watermarking Scheme for Blind Detection","authors":"M. Patil, S. Apte","doi":"10.1109/ICETET.2008.174","DOIUrl":"https://doi.org/10.1109/ICETET.2008.174","url":null,"abstract":"Audio watermarking method presented in this paper embeds the watermark data in the wavelet domain and performs the blind detection of the watermark. To embed the watermark the additive watermark embedding approach is used in which scaling parameter is computed based on the SNR (signal to noise ratio). The technique is implemented in DWT domain. 32 times 32 binary image is used as the watermark data. The SNR based adaptive watermarking scheme[6] and the proposed scheme for blind detection are implemented their results are presented here. The techniques are tested against different signal manipulation processing such as filtering, resampling, compression, cropping and requantization. The host audio signal used foe the experimentation is the Indian musical signal. It is observed that the technique is resilient against various signal manipulation attacks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128591967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation Based Comparison of Different Modulation Schemes for Mobile WiMAX Using TCP and its Variants 基于仿真的基于TCP及其变体的移动WiMAX调制方案比较
L. Malviya, M. A. Gaiwak, P. D. Vyavhare
Adaptive modulation enables a WiMAX system to optimize the throughput based on propagation conditions. IEEE 802.16 (WiMAX) system support BPSK, QPSK, 16-QAM and 64-QAM and the access scheme is OFDM. This paper presents the performance of different variants of transmission control protocols with different modulation schemes when density of mobile nodes changes.
自适应调制使WiMAX系统能够基于传播条件优化吞吐量。IEEE 802.16 (WiMAX)系统支持BPSK、QPSK、16-QAM和64-QAM,接入方式为OFDM。本文研究了不同调制方式下不同传输控制协议变体在移动节点密度变化时的性能。
{"title":"Simulation Based Comparison of Different Modulation Schemes for Mobile WiMAX Using TCP and its Variants","authors":"L. Malviya, M. A. Gaiwak, P. D. Vyavhare","doi":"10.1109/ICETET.2008.191","DOIUrl":"https://doi.org/10.1109/ICETET.2008.191","url":null,"abstract":"Adaptive modulation enables a WiMAX system to optimize the throughput based on propagation conditions. IEEE 802.16 (WiMAX) system support BPSK, QPSK, 16-QAM and 64-QAM and the access scheme is OFDM. This paper presents the performance of different variants of transmission control protocols with different modulation schemes when density of mobile nodes changes.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security in Multicast Routing in Ad Hoc Network Ad Hoc网络中组播路由的安全性
P. Annadurai, V. Palanisamy
In recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. Ad hoc networks are peer to peer, autonomous networks comprised of wireless mobile devices. The ease and speed of deployment of these networks makes them ideal for battlefield communications, disaster recovery and other such applications where fixed infrastructure is not readily available. limited bandwidth, energy constraints and unpredictable network topologies pose difficult problems for the design of applications for these networks. The last couple of years have seen renewed research in this field. Specifically in unicast and multicast routing and security issues. In this paper, we address how secure the multicast routing problem for ad hoc networks.
近年来,安全通信已成为一个重要的研究课题。无线和有线网络的新服务是提供机密性、认证、授权和数据完整性。安全一直是一个敏感的问题。事实上,这种服务对于保护基本应用程序,特别是电子商务和银行交易免受各种攻击是必要的。自组织网络是由无线移动设备组成的点对点自治网络。这些网络部署的简单性和速度使其成为战场通信、灾难恢复和其他固定基础设施不容易获得的应用的理想选择。有限的带宽、能量约束和不可预测的网络拓扑给这些网络的应用设计带来了难题。在过去的几年里,这个领域有了新的研究。特别是在单播和多播路由和安全问题。在本文中,我们讨论如何安全组播路由问题的自组织网络。
{"title":"Security in Multicast Routing in Ad Hoc Network","authors":"P. Annadurai, V. Palanisamy","doi":"10.1109/ICETET.2008.250","DOIUrl":"https://doi.org/10.1109/ICETET.2008.250","url":null,"abstract":"In recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. Ad hoc networks are peer to peer, autonomous networks comprised of wireless mobile devices. The ease and speed of deployment of these networks makes them ideal for battlefield communications, disaster recovery and other such applications where fixed infrastructure is not readily available. limited bandwidth, energy constraints and unpredictable network topologies pose difficult problems for the design of applications for these networks. The last couple of years have seen renewed research in this field. Specifically in unicast and multicast routing and security issues. In this paper, we address how secure the multicast routing problem for ad hoc networks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Application of Genetic Algorithms in Structural Representation of Proteins 遗传算法在蛋白质结构表示中的应用
P. Chaudhari, P. Thute
One of the most promising and rapidly growing areas of GA application is data analysis and prediction in molecular biology. GAs have been used for predicting protein structure. Recently there has been considerable effort towards developing methods such as GAs and neural networks for automatically predicting protein structures. This GA prediction project illustrates one way in which GAs can be used on this task.
遗传算法在分子生物学中的数据分析和预测是最有前途和发展最快的应用领域之一。GAs已被用于预测蛋白质结构。最近,在开发自动预测蛋白质结构的方法(如GAs和神经网络)方面已经付出了相当大的努力。这个遗传算法预测项目说明了在此任务中使用遗传算法的一种方法。
{"title":"Application of Genetic Algorithms in Structural Representation of Proteins","authors":"P. Chaudhari, P. Thute","doi":"10.1109/ICETET.2008.212","DOIUrl":"https://doi.org/10.1109/ICETET.2008.212","url":null,"abstract":"One of the most promising and rapidly growing areas of GA application is data analysis and prediction in molecular biology. GAs have been used for predicting protein structure. Recently there has been considerable effort towards developing methods such as GAs and neural networks for automatically predicting protein structures. This GA prediction project illustrates one way in which GAs can be used on this task.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Image Watermarking Under Pixel Wise Masking Framework 像素屏蔽框架下的鲁棒图像水印
V. Mankar, T. Das, Subhojit Saha, S. Sarkar
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
本文利用离散小波变换与人类视觉系统(HVS)的相似性,提出了一种静态图像的鲁棒水印方法。该方案利用逐像素掩蔽使二值水印对HVS不可见。使用子带自适应阈值方案将水印嵌入到感知上重要的空间选择细节系数中。基于小波系数的统计分析计算阈值。水印被多次嵌入以获得更好的鲁棒性。本文提出了一种新的非遗忘检测方法。实验结果支持了对不同类型的故意和非故意图像损伤(有损压缩、缩放、裁剪、滤波等)的鲁棒性性能的改进。报告的结果还显示了隐藏数据的可视化和统计不可见性的改进。将该方法与基于频率的水印技术进行了比较,突出了其性能。这种算法架构更有效地利用了数据传输通道中已分配的带宽。
{"title":"Robust Image Watermarking Under Pixel Wise Masking Framework","authors":"V. Mankar, T. Das, Subhojit Saha, S. Sarkar","doi":"10.1109/ICETET.2008.51","DOIUrl":"https://doi.org/10.1109/ICETET.2008.51","url":null,"abstract":"The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124210618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Embedding Driver for a Peripheral Interface on FPGA FPGA外设接口的嵌入驱动
S. Bhandari, S. Pujari, S. Subbaraman
The paper covers a simple RTL implementation of a command processor with its associated macroinstructions implemented on FPGA device to drive an external peripherals having processor like bus interface. Soft processor is used inside FPGA device to handle the tasks of software driver for peripheral controller. The paper discusses an approach to mimic a simple soft processor to handle the task at core layer of driver for basic communication with peripherals connected to FPGA. The present architecture envisages a three-tier implementation of peripheral hardware software co-design interface. The Top level is an application processor connected to FPGA for handling high-level application layers. The application processor could be a generic processor or a DSP. The next second level is a soft processor embedded in FPGA for handling middle layer software. Command processor or pre-processor handles the third bottom core layer task/command specific processing.
本文介绍了一个命令处理器的简单RTL实现及其在FPGA器件上实现的相关宏指令,以驱动具有处理器类总线接口的外部外设。软处理器用于FPGA器件内部处理外设控制器的软件驱动任务。本文讨论了一种模拟一个简单的软处理器来处理与FPGA连接的外设基本通信的驱动核心层任务的方法。目前的架构设想了外围硬件软件协同设计接口的三层实现。顶层是连接到FPGA的应用处理器,用于处理高级应用层。应用处理器可以是通用处理器或DSP。下一层是嵌入在FPGA中的软处理器,用于处理中间层软件。命令处理器或预处理器处理第三底层核心层任务/命令特定处理。
{"title":"Embedding Driver for a Peripheral Interface on FPGA","authors":"S. Bhandari, S. Pujari, S. Subbaraman","doi":"10.1109/ICETET.2008.205","DOIUrl":"https://doi.org/10.1109/ICETET.2008.205","url":null,"abstract":"The paper covers a simple RTL implementation of a command processor with its associated macroinstructions implemented on FPGA device to drive an external peripherals having processor like bus interface. Soft processor is used inside FPGA device to handle the tasks of software driver for peripheral controller. The paper discusses an approach to mimic a simple soft processor to handle the task at core layer of driver for basic communication with peripherals connected to FPGA. The present architecture envisages a three-tier implementation of peripheral hardware software co-design interface. The Top level is an application processor connected to FPGA for handling high-level application layers. The application processor could be a generic processor or a DSP. The next second level is a soft processor embedded in FPGA for handling middle layer software. Command processor or pre-processor handles the third bottom core layer task/command specific processing.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Genetic Algorithm Based Robust Power System Stabilizer Design Using Taguchi Principle 基于田口原理的遗传算法鲁棒电力系统稳定器设计
S. R. Karnik, A. Raju, M. S. Raviprakasha
Power system stabilizer (PSS) is used to damp out local mode oscillations of synchronous generators. PSS are usually designed to provide a proper phase lead which is load dependent. Thus, PSS parameters have to be adjusted at each operating condition. A novel robust PSS design based on Taguchi principle is presented in this paper that can properly function over a wide range of operating conditions and extend the machine loadability. In this approach, signal to noise ratio concept of Taguchi robust design is used to represent the optimization objective and the PSS parameters are searched by genetic algorithm (GA). The simulation results illustrate the effectiveness of the proposed stabilizer as it is applied to the single machine-infinite bus power system under wide range of loading conditions.
电力系统稳定器用于抑制同步发电机的局部模态振荡。PSS通常设计为提供与负载相关的适当的相引线。因此,PSS参数必须在每个操作条件下进行调整。本文提出了一种基于田口原理的新型鲁棒PSS设计,该设计能够在广泛的工作条件下正常工作,并扩展了机器的负载性。该方法采用田口稳健设计的信噪比概念来表示优化目标,并采用遗传算法对PSS参数进行搜索。仿真结果表明,该稳定器适用于单机-无限母线电力系统在大范围负载条件下的稳定性。
{"title":"Genetic Algorithm Based Robust Power System Stabilizer Design Using Taguchi Principle","authors":"S. R. Karnik, A. Raju, M. S. Raviprakasha","doi":"10.1109/ICETET.2008.63","DOIUrl":"https://doi.org/10.1109/ICETET.2008.63","url":null,"abstract":"Power system stabilizer (PSS) is used to damp out local mode oscillations of synchronous generators. PSS are usually designed to provide a proper phase lead which is load dependent. Thus, PSS parameters have to be adjusted at each operating condition. A novel robust PSS design based on Taguchi principle is presented in this paper that can properly function over a wide range of operating conditions and extend the machine loadability. In this approach, signal to noise ratio concept of Taguchi robust design is used to represent the optimization objective and the PSS parameters are searched by genetic algorithm (GA). The simulation results illustrate the effectiveness of the proposed stabilizer as it is applied to the single machine-infinite bus power system under wide range of loading conditions.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Intelligent on Demand Multicast Routing Protocol for MANETs 一种面向manet的按需智能组播路由协议
E. Baburaj, V. Vasudevan
Multicast routing protocols in mobile ad-hoc networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and multiparty conferencing which made the analytical design and development of the MANETs in a very efficient manner. For MANETs there are several multicast routing protocols are available, but they perform well under specific scenarios only. The topology of a MANET changes adequately due to the random mobility of network nodes, unlike the wired network which is static. Due to the lack of redundancy in multipath and multicast structures, the multicast routing protocols are vulnerable to the component failure in ad-hoc networks. Due to this fact, route selection becomes a tragedy in MANETs. So it is the dire need to optimize the route selection. GA is an optimizing tool and its key factors that determine the performance of GA is by the well designed architecture of chromosomes and operators in the intelligent algorithm. In this paper we attempt to propose a new genetic algorithm based on demand multicast routing protocol (GA-ODMRP), which improves the performance in the routing messages. GA-ODMRP is well suited for mobile ad hoc networks where the topology changes frequently and power is constrained. We evaluate GA-ODMRP performance under various realistic scenarios.
移动自组织网络(manet)中的组播路由协议是为无线组通信而出现的,包括多点数据分发和多方会议等应用,这使得移动自组织网络的分析设计和开发非常高效。对于manet,有几种组播路由协议可用,但它们仅在特定场景下表现良好。与静态的有线网络不同,由于网络节点的随机移动,MANET的拓扑结构会发生充分的变化。由于多径和组播结构缺乏冗余,组播路由协议在ad-hoc网络中容易受到组件失效的影响。因此,路由选择成为manet中的一个悲剧。因此,优化路线选择是迫切需要的。遗传算法是一种优化工具,决定遗传算法性能的关键因素是遗传算法中染色体和算子的结构设计。本文提出了一种基于需求组播路由协议(GA-ODMRP)的遗传算法,提高了路由消息的性能。GA-ODMRP非常适合拓扑变化频繁且功率受限的移动自组织网络。我们评估了GA-ODMRP在各种现实场景下的性能。
{"title":"An Intelligent on Demand Multicast Routing Protocol for MANETs","authors":"E. Baburaj, V. Vasudevan","doi":"10.1109/ICETET.2008.102","DOIUrl":"https://doi.org/10.1109/ICETET.2008.102","url":null,"abstract":"Multicast routing protocols in mobile ad-hoc networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and multiparty conferencing which made the analytical design and development of the MANETs in a very efficient manner. For MANETs there are several multicast routing protocols are available, but they perform well under specific scenarios only. The topology of a MANET changes adequately due to the random mobility of network nodes, unlike the wired network which is static. Due to the lack of redundancy in multipath and multicast structures, the multicast routing protocols are vulnerable to the component failure in ad-hoc networks. Due to this fact, route selection becomes a tragedy in MANETs. So it is the dire need to optimize the route selection. GA is an optimizing tool and its key factors that determine the performance of GA is by the well designed architecture of chromosomes and operators in the intelligent algorithm. In this paper we attempt to propose a new genetic algorithm based on demand multicast routing protocol (GA-ODMRP), which improves the performance in the routing messages. GA-ODMRP is well suited for mobile ad hoc networks where the topology changes frequently and power is constrained. We evaluate GA-ODMRP performance under various realistic scenarios.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experimental Study of Artificial Sand Concrete 人工砂混凝土试验研究
M. R. Chitlange, P. S. Pajgade, P. Nagarnaik
Conventionally concrete is a mix of cement, sand and aggregate. There is a large variation in the strength of concrete due to variation in the strength of aggregates used. There is scarcity of natural sand due to heavy demand in growing construction activities which forces to find the suitable substitute. The cheapest and the easiest way of getting substitute for natural sand is by crushing natural stone to get artificial sand of desired size and grade which would be free from all impurities. This paper presents the feasibility of the usage of artificial sand obtained by crushing basalt over natural sand considering technical, environmental and commercial factors. For the purpose of experimentation concrete mixes are designed for M20, M30 and M40 grades by 100% replacement of natural sand to artificial sand. Compressive and flexural tests are conducted to study the strength of concrete using artificial sand and the results are compared with that of natural sand concrete.
一般来说,混凝土是水泥、沙子和骨料的混合物。由于所用集料强度的变化,混凝土的强度有很大的变化。由于不断增长的建筑活动对天然砂的大量需求,迫使人们寻找合适的替代品,因此天然砂供不应求。获得天然砂替代品的最便宜和最简单的方法是将天然石粉碎,得到所需尺寸和等级的人造砂,这种砂将不含任何杂质。综合考虑技术、环境和经济等因素,论述了采用破碎玄武岩人工砂代替天然砂的可行性。为进行试验,设计了M20、M30和M40级混凝土配合比,100%用天然砂代替人工砂。对人工砂混凝土进行了抗压和抗弯试验,并与天然砂混凝土进行了对比。
{"title":"Experimental Study of Artificial Sand Concrete","authors":"M. R. Chitlange, P. S. Pajgade, P. Nagarnaik","doi":"10.1109/ICETET.2008.164","DOIUrl":"https://doi.org/10.1109/ICETET.2008.164","url":null,"abstract":"Conventionally concrete is a mix of cement, sand and aggregate. There is a large variation in the strength of concrete due to variation in the strength of aggregates used. There is scarcity of natural sand due to heavy demand in growing construction activities which forces to find the suitable substitute. The cheapest and the easiest way of getting substitute for natural sand is by crushing natural stone to get artificial sand of desired size and grade which would be free from all impurities. This paper presents the feasibility of the usage of artificial sand obtained by crushing basalt over natural sand considering technical, environmental and commercial factors. For the purpose of experimentation concrete mixes are designed for M20, M30 and M40 grades by 100% replacement of natural sand to artificial sand. Compressive and flexural tests are conducted to study the strength of concrete using artificial sand and the results are compared with that of natural sand concrete.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2008 First International Conference on Emerging Trends in Engineering and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1