Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435673
S. Beagum, N. Hundewale, M. Sathik
Recently we introduced an improved nearest neighborhood-based restoration (NNR) technique which when integrated in the second stage of the Adaptive Median Filter improved its performance in removing fixed valued impulse noise by giving an average increase of 7% in Peak Signal to Noise Ratio (PSNR) and 21% decrease in Mean Absolute Error (MAE). In our successive paper, we proposed a new adaptive center weighted median filter (NN-ACWM) that combined the adaptive median filtering technique with center weighted median for impulse detection and used the improved NNR technique for restoration. In this paper, we have integrated our improved nearest neighborhood-based restoration technique in the second stage of the Adaptive Center Weighted Median Filter (CW-ACWM) and have shown that this integration improves its performance in noise suppression by giving an average increase of 3% in PSNR and 13% decrease in MAE. We have also analyzed and compared the performance of the improved adaptive median filter (NN-AMF), NN-ACWM and the improved adaptive center weighted median filter (NN-CW-ACWM) in terms of PSNR, MAE and Mean Structural Similarity (MSSIM) index measures. The PSNR and MAE measures show that NN-ACWM performs better than NN-AMF and NN-CW-ACWM for noise densities <; 50 whereas NN-AMF performs better for noise densities > 50. The PSNR measures also show that NN-ACWM and NN-AMF outperforms several existing high density impulse noise removal algorithms including the Progressive Switching Median Filter, Decision Based Algorithm and Modified Decision Based Unsymmetric Trimmed Median Filter in removing fixed-valued impulse noise.
{"title":"Improved adaptive median filters using nearest 4-neighbors for restoration of images corrupted with fixed-valued impulse noise","authors":"S. Beagum, N. Hundewale, M. Sathik","doi":"10.1109/ICCIC.2015.7435673","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435673","url":null,"abstract":"Recently we introduced an improved nearest neighborhood-based restoration (NNR) technique which when integrated in the second stage of the Adaptive Median Filter improved its performance in removing fixed valued impulse noise by giving an average increase of 7% in Peak Signal to Noise Ratio (PSNR) and 21% decrease in Mean Absolute Error (MAE). In our successive paper, we proposed a new adaptive center weighted median filter (NN-ACWM) that combined the adaptive median filtering technique with center weighted median for impulse detection and used the improved NNR technique for restoration. In this paper, we have integrated our improved nearest neighborhood-based restoration technique in the second stage of the Adaptive Center Weighted Median Filter (CW-ACWM) and have shown that this integration improves its performance in noise suppression by giving an average increase of 3% in PSNR and 13% decrease in MAE. We have also analyzed and compared the performance of the improved adaptive median filter (NN-AMF), NN-ACWM and the improved adaptive center weighted median filter (NN-CW-ACWM) in terms of PSNR, MAE and Mean Structural Similarity (MSSIM) index measures. The PSNR and MAE measures show that NN-ACWM performs better than NN-AMF and NN-CW-ACWM for noise densities <; 50 whereas NN-AMF performs better for noise densities > 50. The PSNR measures also show that NN-ACWM and NN-AMF outperforms several existing high density impulse noise removal algorithms including the Progressive Switching Median Filter, Decision Based Algorithm and Modified Decision Based Unsymmetric Trimmed Median Filter in removing fixed-valued impulse noise.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122477028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435662
A. N. Nagamani, B. Abhishek, V. K. Agrawal
Reversible logic has wide applications in the field of quantum computing, low-power design, nanotechnology, optical information processing, bioinformatics etc. Due to the reversible nature of the circuit, it is conventionally easy to test the reversible circuit compared to irreversible circuit but with its own complexity. Various fault models are defined in the literature for reversible circuit. In this paper, we propose a deterministic ATPG algorithm to generate complete test-set for intra-level single and multiple bridging faults in a reversible circuit designed with family of Toffoli, Peres and Fredkin gates. The analysis of results shows that the proposed algorithm has 100% fault coverage and reduction of test set of average of 40% compared to existing approaches in literature.
{"title":"Deterministic approach for bridging fault detection in Peres-Fredkin and Toffoli based reversible circuits","authors":"A. N. Nagamani, B. Abhishek, V. K. Agrawal","doi":"10.1109/ICCIC.2015.7435662","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435662","url":null,"abstract":"Reversible logic has wide applications in the field of quantum computing, low-power design, nanotechnology, optical information processing, bioinformatics etc. Due to the reversible nature of the circuit, it is conventionally easy to test the reversible circuit compared to irreversible circuit but with its own complexity. Various fault models are defined in the literature for reversible circuit. In this paper, we propose a deterministic ATPG algorithm to generate complete test-set for intra-level single and multiple bridging faults in a reversible circuit designed with family of Toffoli, Peres and Fredkin gates. The analysis of results shows that the proposed algorithm has 100% fault coverage and reduction of test set of average of 40% compared to existing approaches in literature.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435695
S. V. B. Bala Sai, I. Mamatha, Shikha Tripathi, Sudarshan TSB
This work proposes an architecture for fast computation of 1-D Discrete Wavelet Transform (DWT). Existing MAC loop based filter (MLBF) is modified and a poly-phase structure for 1-D DWT is proposed. Proposed structure improves the throughput by 1.5x while using almost double the hardware as that of the existing structure. 1-D DWT using existing MLBF structure and proposed structure are simulated using ModelSim and synthesized using Xilinx ISE 14.2 on Virtex-6 XC6VCX240T-2FF784 target device. It is observed that the proposed architecture can be operated at a maximum frequency of 163.59MHz. The simulation results obtained from ModelSim is compared with MatLab R2010a output and found to be accurate.
本文提出了一种快速计算一维离散小波变换(DWT)的结构。对现有的基于MAC环的滤波器(MLBF)进行了改进,提出了一种用于一维小波变换的多相结构。所提出的结构将吞吐量提高了1.5倍,同时使用的硬件几乎是现有结构的两倍。在Virtex-6 XC6VCX240T-2FF784目标设备上,使用ModelSim对现有MLBF结构和所提出结构进行一维DWT仿真,并使用Xilinx ISE 14.2进行合成。观察到所提出的架构可以在163.59MHz的最大频率下工作。将ModelSim软件的仿真结果与MatLab R2010a输出进行了比较,发现仿真结果是准确的。
{"title":"Modified MLBF based architecture for 1-D DWT","authors":"S. V. B. Bala Sai, I. Mamatha, Shikha Tripathi, Sudarshan TSB","doi":"10.1109/ICCIC.2015.7435695","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435695","url":null,"abstract":"This work proposes an architecture for fast computation of 1-D Discrete Wavelet Transform (DWT). Existing MAC loop based filter (MLBF) is modified and a poly-phase structure for 1-D DWT is proposed. Proposed structure improves the throughput by 1.5x while using almost double the hardware as that of the existing structure. 1-D DWT using existing MLBF structure and proposed structure are simulated using ModelSim and synthesized using Xilinx ISE 14.2 on Virtex-6 XC6VCX240T-2FF784 target device. It is observed that the proposed architecture can be operated at a maximum frequency of 163.59MHz. The simulation results obtained from ModelSim is compared with MatLab R2010a output and found to be accurate.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435680
Ashwani Kharola
This paper presents a fuzzy logic control strategy for control and stabilization of TWIPR. The TWIPR considered in the study comprises of a robot chassis mounted on two movable wheels. The research objective is to stabilize the system within desired time, overshoot and steady state error. The Matlab Simulink model of the system was built using mathematical equations derived from Newton's second law of motion. Gbell MF's has been used for designing of fuzzy logic controllers (FLC's) for TWIPR. The simulation results proved the validity of the proposed technique.
{"title":"The control of two-wheeled inverted pendulum robot (TWIPR) using fuzzy logic","authors":"Ashwani Kharola","doi":"10.1109/ICCIC.2015.7435680","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435680","url":null,"abstract":"This paper presents a fuzzy logic control strategy for control and stabilization of TWIPR. The TWIPR considered in the study comprises of a robot chassis mounted on two movable wheels. The research objective is to stabilize the system within desired time, overshoot and steady state error. The Matlab Simulink model of the system was built using mathematical equations derived from Newton's second law of motion. Gbell MF's has been used for designing of fuzzy logic controllers (FLC's) for TWIPR. The simulation results proved the validity of the proposed technique.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124722564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435792
M. Suresh, Deepthi Mohan
Nowadays the technology is improving in a fast pace and the service sector is getting widely boomed. Consumers who are giving prior importance to quality consider several factors for choosing the service. Among them the service rendered by academic libraries also matter a lot because of the growth of digital libraries. The objective of this paper is to find factors which are more important for assuring the service quality in University Library. A case study has been conducted in a university library located in India. The SERVQUAL tools along with other parameters are considered for measuring the services. The focus is also given to emerging digital libraries. The questionnaire is developed to know the perceptions of students in University. The present study allows the librarians to benchmark their library with the current values of the dimensions of service quality. After detailed assessment and critical evaluation on all aspects of the case university library, the paper puts forward valuable and applicable suggestions to improve the current service quality status of the university library.
{"title":"Service quality and its impact on user satisfaction in Indian University Library","authors":"M. Suresh, Deepthi Mohan","doi":"10.1109/ICCIC.2015.7435792","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435792","url":null,"abstract":"Nowadays the technology is improving in a fast pace and the service sector is getting widely boomed. Consumers who are giving prior importance to quality consider several factors for choosing the service. Among them the service rendered by academic libraries also matter a lot because of the growth of digital libraries. The objective of this paper is to find factors which are more important for assuring the service quality in University Library. A case study has been conducted in a university library located in India. The SERVQUAL tools along with other parameters are considered for measuring the services. The focus is also given to emerging digital libraries. The questionnaire is developed to know the perceptions of students in University. The present study allows the librarians to benchmark their library with the current values of the dimensions of service quality. After detailed assessment and critical evaluation on all aspects of the case university library, the paper puts forward valuable and applicable suggestions to improve the current service quality status of the university library.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435772
R. Anbunathan, A. Basu
Test generation automation using Data Driven Architecture (DDA) is a challenging task. It involves an external database to feed test inputs to a test case sequentially. Same test case is executed repeatedly in a loop, to handle different test inputs. In this paper, a method is proposed to generate DDA based tests for Android mobiles. A tool called Virtual Test Engineer (VTE), which generates tests from Sequence diagram, is extended to incorporate DDA based test generation. Sqlite database is used to store test inputs. Test driver is generated automatically from Sequence diagram in the form of XML file. An Android application package (APK) is generated automatically to handle this XML file and Sqlite database file and subsequently execute the test cases. The effectiveness of this method is discussed from experimental results. Comparison has been made of the proposed method with others and the proposed method has been found to be more effective.
{"title":"Data driven architecture based automated test generation for Android mobile","authors":"R. Anbunathan, A. Basu","doi":"10.1109/ICCIC.2015.7435772","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435772","url":null,"abstract":"Test generation automation using Data Driven Architecture (DDA) is a challenging task. It involves an external database to feed test inputs to a test case sequentially. Same test case is executed repeatedly in a loop, to handle different test inputs. In this paper, a method is proposed to generate DDA based tests for Android mobiles. A tool called Virtual Test Engineer (VTE), which generates tests from Sequence diagram, is extended to incorporate DDA based test generation. Sqlite database is used to store test inputs. Test driver is generated automatically from Sequence diagram in the form of XML file. An Android application package (APK) is generated automatically to handle this XML file and Sqlite database file and subsequently execute the test cases. The effectiveness of this method is discussed from experimental results. Comparison has been made of the proposed method with others and the proposed method has been found to be more effective.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435727
L. Raju, R. S. Milton, Antony Amalraj Morais
The objective of this paper is to implement a Multi Agent System (MAS) in Java Agent Development Environment (JADE) for the automation and optimization in advanced distributed energy management of a micro-grid. We consider two grid connected micro-grids each contains wind turbine, solar Photo Voltaic (PV) systems and load. The power generated by solar and wind along with the load variations in the two micro-grids are calculated initially and then Multi Agent System is used for distributed energy management of micro-grid, which considers the intermittent nature of solar power, randomness of load, dynamic pricing of grid and variation of critical loads and automatically choose the best possible action every hour to optimize ther micro-grid. The advantages of MAS approach is leveraged through JADE to increase the operational efficiency and thereby maximizes the power production of micro-grid and minimizes the operational cost. Thus MAS in micro-grid obviously leads to economic and environmental optimization of the micro-grid due to its inherent features. Simulated operation of the micro-grids are studied by performing simulations under different agent objectives.
{"title":"Advanced automation in energy management of micro-grid using multi agent system","authors":"L. Raju, R. S. Milton, Antony Amalraj Morais","doi":"10.1109/ICCIC.2015.7435727","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435727","url":null,"abstract":"The objective of this paper is to implement a Multi Agent System (MAS) in Java Agent Development Environment (JADE) for the automation and optimization in advanced distributed energy management of a micro-grid. We consider two grid connected micro-grids each contains wind turbine, solar Photo Voltaic (PV) systems and load. The power generated by solar and wind along with the load variations in the two micro-grids are calculated initially and then Multi Agent System is used for distributed energy management of micro-grid, which considers the intermittent nature of solar power, randomness of load, dynamic pricing of grid and variation of critical loads and automatically choose the best possible action every hour to optimize ther micro-grid. The advantages of MAS approach is leveraged through JADE to increase the operational efficiency and thereby maximizes the power production of micro-grid and minimizes the operational cost. Thus MAS in micro-grid obviously leads to economic and environmental optimization of the micro-grid due to its inherent features. Simulated operation of the micro-grids are studied by performing simulations under different agent objectives.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134376378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435821
P. Nikkam, N. Hegde, B. Reddy
Content Based Image Retrieval is a process to get a desired image from a substantial database. We propose a template for shape based hierarchical feature matching approach for content based image retrieval system. It utilizes a combination of global feature for shape based templates. In this work a new learning method is put forth which is based on the hierarchal decomposition of the data. The proposed method establishes learning algorithm where the feature extraction process is executed to detect edge, orientations and shape of the dataset images. Thus extracted shape based features are used for matching the template to improve the retrieval accuracy. The proposed model is tested for the Wang dataset. The classification of dataset is taken care by the support vector machine algorithm with the accuracy of 99.09 % The retrieval results of proposed model is illustrated in terms of precision and recall, the improved efficiency of retrieval is compared to other existing models.
{"title":"Decomposition-based shape template matching for CBIR system","authors":"P. Nikkam, N. Hegde, B. Reddy","doi":"10.1109/ICCIC.2015.7435821","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435821","url":null,"abstract":"Content Based Image Retrieval is a process to get a desired image from a substantial database. We propose a template for shape based hierarchical feature matching approach for content based image retrieval system. It utilizes a combination of global feature for shape based templates. In this work a new learning method is put forth which is based on the hierarchal decomposition of the data. The proposed method establishes learning algorithm where the feature extraction process is executed to detect edge, orientations and shape of the dataset images. Thus extracted shape based features are used for matching the template to improve the retrieval accuracy. The proposed model is tested for the Wang dataset. The classification of dataset is taken care by the support vector machine algorithm with the accuracy of 99.09 % The retrieval results of proposed model is illustrated in terms of precision and recall, the improved efficiency of retrieval is compared to other existing models.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435716
Prem Prakash Anaand, Chhagan Charan
Fast growth of wireless communication demands more spectrum but it is a limited resource. Survey conducted by Federal Communications Commission (FCC) shows that spectrum allocated to the primary user (PU) is underutilization. Cognitive Radio (CR) is proposed to improve the utilization of underutilized spectrum. In CR, spectrum sensing is a key technology for opportunistic spectrum access. To reduce interference to the PU, it is necessary to sense the spectrum accurately at very low signal to noise ratio (SNR) region. The main drawback of Energy detection (ED) is that it can't discriminate between PU and secondary user (SU) at low SNR region. To overcome described problem, Akaike's Information Criteria (AIC) method is discussed in this paper. It is based on the Information Theoretic Criteria (ITC). In this paper, the comparison is shown between the ED and AIC method in noise uncertainty. Here, AIC method is considered in frequency domain to avoid the requirement of any prior information related to the PU. Simulation results show that the AIC method is better than the ED for spectrum sensing at low SNR region.
无线通信的快速发展需要更多的频谱资源,但频谱资源是有限的。美国联邦通信委员会(FCC)调查显示,分配给主要用户(PU)的频谱利用率不足。为了提高未充分利用频谱的利用率,提出了认知无线电(CR)技术。在CR中,频谱感知是机会频谱接入的关键技术。为了减少对PU的干扰,有必要在极低信噪比(SNR)区域准确地检测频谱。能量检测(ED)的主要缺点是在低信噪比区域无法区分PU和辅助用户(SU)。为了克服上述问题,本文讨论了赤池信息准则(AIC)方法。它基于信息理论准则(Information theory Criteria, ITC)。在噪声不确定度方面,本文给出了ED和AIC方法的比较。在这里,AIC方法是在频域考虑的,以避免需要任何与PU相关的先验信息。仿真结果表明,AIC方法在低信噪比区域的频谱感知效果优于ED方法。
{"title":"Performance analysis of energy and AIC detection for spectrum sensing in cognitive radio networks","authors":"Prem Prakash Anaand, Chhagan Charan","doi":"10.1109/ICCIC.2015.7435716","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435716","url":null,"abstract":"Fast growth of wireless communication demands more spectrum but it is a limited resource. Survey conducted by Federal Communications Commission (FCC) shows that spectrum allocated to the primary user (PU) is underutilization. Cognitive Radio (CR) is proposed to improve the utilization of underutilized spectrum. In CR, spectrum sensing is a key technology for opportunistic spectrum access. To reduce interference to the PU, it is necessary to sense the spectrum accurately at very low signal to noise ratio (SNR) region. The main drawback of Energy detection (ED) is that it can't discriminate between PU and secondary user (SU) at low SNR region. To overcome described problem, Akaike's Information Criteria (AIC) method is discussed in this paper. It is based on the Information Theoretic Criteria (ITC). In this paper, the comparison is shown between the ED and AIC method in noise uncertainty. Here, AIC method is considered in frequency domain to avoid the requirement of any prior information related to the PU. Simulation results show that the AIC method is better than the ED for spectrum sensing at low SNR region.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ICCIC.2015.7435734
S. Vasantha, A. Damodaram
As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data at faster rate has proven its importance in communication media. The major issue with mobile adhoc network is security, there are two major such type of security issues which affects the MANET while transmitting data are Black hole and Gray hole attacks. This paper proposes Bulwark-AODV which prevents single or cooperative Black hole attacks by identifying malicious route replies at source and intermediate nodes and finds a shortest valid path. It also works in case of single adjacent node to the source and when there are multiple Black holes in the network. It detects Gray holes by snooping the ACKs of data packets. Forgery of ACK if any is identified by the source through checking the return time of ACK. Simulation results indicates better performance even though special cases are considered.
{"title":"Bulwark AODV against Black hole and Gray hole attacks in MANET","authors":"S. Vasantha, A. Damodaram","doi":"10.1109/ICCIC.2015.7435734","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435734","url":null,"abstract":"As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data at faster rate has proven its importance in communication media. The major issue with mobile adhoc network is security, there are two major such type of security issues which affects the MANET while transmitting data are Black hole and Gray hole attacks. This paper proposes Bulwark-AODV which prevents single or cooperative Black hole attacks by identifying malicious route replies at source and intermediate nodes and finds a shortest valid path. It also works in case of single adjacent node to the source and when there are multiple Black holes in the network. It detects Gray holes by snooping the ACKs of data packets. Forgery of ACK if any is identified by the source through checking the return time of ACK. Simulation results indicates better performance even though special cases are considered.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}