首页 > 最新文献

2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)最新文献

英文 中文
A four element rectangular dielectric resonator antenna array for wireless applications 一种用于无线应用的四元矩形介电谐振器天线阵列
I. Khan, R. Kumari, S. Behera
Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.
介绍了一种用于无线应用的四元矩形介质谐振器天线阵列的设计。RDRA阵列采用矩形共形贴片(RCP)连接微带线激励,是一种有效的馈源机制,具有较高的能量耦合效率。仿真结果表明,该天线的阻抗带宽在4 GHz ~ 7.1 GHz之间,覆盖了多个无线频段。通过改变RCP和最终设计的地平面进行了参数化研究。该天线在谐振频率处具有可观的增益和较好的辐射方向图。
{"title":"A four element rectangular dielectric resonator antenna array for wireless applications","authors":"I. Khan, R. Kumari, S. Behera","doi":"10.1109/ICE-CCN.2013.6528584","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528584","url":null,"abstract":"Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of μ-law companding & SQRT techniques for M-QAM OFDM systems M-QAM OFDM系统中μ律扩展和SQRT技术的性能分析
T. Deepa, R. Kumar
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.
正交频分复用(OFDM)是高数据速率通信系统中一种有效的传输技术。OFDM系统的主要问题是峰值平均功率比(PAPR),它降低了系统的效率,增加了系统的复杂性。本文提出了基于对数的压缩(即mu律)和平方根压缩(SQRT)作为OFDM中简单有效的PAPR降低技术。本文分析了正交频分复用(OFDM)信号扩展中的mu律和SQRT调制技术。仿真结果表明,与采用mu-law扩宽变换的OFDM系统相比,SQRT OFDM系统在降低PAPR和提高BER性能方面是一种有效的技术。通过对mu律和SQRT扩宽技术的比较,得出了最适合OFDM系统中减小PAPR的扩宽技术。仿真结果还表明,采用不同的调制技术在固定的子载波上调制信号,传输数据中的误差会迅速增加,而采用固定的调制技术时,随着子载波数量的增加,传输时的PAPR会增加,传输数据中的误码率(BER)保持不变且变化很小。
{"title":"Performance analysis of μ-law companding & SQRT techniques for M-QAM OFDM systems","authors":"T. Deepa, R. Kumar","doi":"10.1109/ICE-CCN.2013.6528513","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528513","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive IP traceback mechanism for detecting low rate DDoS attacks 自适应IP溯源机制,用于检测低速率DDoS攻击
M. Baskar, T. Gnanasekaran, S. Saravanan
Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.
分布式拒绝服务(DDoS)攻击被认为是对网络的重大威胁。由于网络路由机制的内存较少的特性,跟踪这些攻击的来源是非常繁重的。古老的数据包标记技术由于其高内存消耗和较差的可测量性而不再被应用。在本文中,我们倾向于使用熵变来观察区分传统攻击和DDoS攻击流量的攻击。然而,它将仅用于观察攻击期间的流量是难以置信的高速率。还有许多攻击期间,攻击的强度也很微薄,但这些攻击的结果可能仍然很严重。因此,有必要观察这种攻击,以较低的信息率来衡量。我们倾向于提出一种能够检测DDoS攻击的自适应攻击检测系统(AADS),无论攻击强度如何。
{"title":"Adaptive IP traceback mechanism for detecting low rate DDoS attacks","authors":"M. Baskar, T. Gnanasekaran, S. Saravanan","doi":"10.1109/ICE-CCN.2013.6528526","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528526","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improving security in two-way relay networks by optimal relay and jammer selection 通过优化中继和干扰机的选择,提高双向中继网络的安全性
S. Suganya, P. Shanmugapriya, T. R. Priyadharshini
The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.
在存在一个或多个窃听者的情况下,物理层安全通信方法的可行性。在之前的方案中,可以使用单向协作网络来实现从源到目的的信息传递。目前该技术的实现没有窃听器,由于有时攻击者可以对文件进行黑客攻击,使得该技术变得无效。未来的工作将在采用两阶段合作协议的双向合作网络中进行,目标是设计保密容量最大化或传输功率最小化的系统。信息可以分成两半,然后传输到中间节点,然后将文件合并到目的地。通过对中继节点和干扰节点的选择,实现两阶段协作协议,使窃听者存在时的保密能力最大化。
{"title":"Improving security in two-way relay networks by optimal relay and jammer selection","authors":"S. Suganya, P. Shanmugapriya, T. R. Priyadharshini","doi":"10.1109/ICE-CCN.2013.6528508","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528508","url":null,"abstract":"The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of different neuron behavior by designing spiking neuron model 通过设计脉冲神经元模型对不同神经元行为进行分类
A. Kumar, S. Kansal, M. Hanmandlu
We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.
我们提出了一个简单的双方程模型,该模型产生了生物神经元的丰富行为,包括强直脉冲、强直脉冲、混合模式放电、强直脉冲频率自适应、谐振器、积分器等。我们的模型能够产生真实生物神经元的19种不同的动态。我们已经说明了单个神经元响应简单直流电脉冲时的尖峰行为的丰富性和复杂性。
{"title":"Classification of different neuron behavior by designing spiking neuron model","authors":"A. Kumar, S. Kansal, M. Hanmandlu","doi":"10.1109/ICE-CCN.2013.6528592","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528592","url":null,"abstract":"We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131583703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey of various techniques for determining influential users in social networks 各种技术的调查,以确定有影响力的用户在社会网络
Sarabjot Singh, N. Mishra, S. Sharma
Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.
在博客或博客网络中,有一些用户对网络上的其他用户造成很大的影响。本文将这类用户称为影响用户(IU)。用户是指使其他用户对其发布的文档和内容执行某些操作的用户。不同的组织通过博客网站使用IU进行病毒式营销。该组织希望通过利用一小部分潜在用户来销售新产品以获得利润。在本文中,我们将重点关注有助于确定IUs的各种方法,其中一些方法基于社交网络的拓扑结构,有些方法基于超链接,然后我们讨论了基于用户在社交网络中执行的活动,利用其扩散历史来寻找有影响力用户的新方法。
{"title":"Survey of various techniques for determining influential users in social networks","authors":"Sarabjot Singh, N. Mishra, S. Sharma","doi":"10.1109/ICE-CCN.2013.6528531","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528531","url":null,"abstract":"Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132467295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
High speed architecture for Variable Block Size Motion Estimation in H.264 H.264中可变块大小运动估计的高速结构
P. Jayakrishnan, R. Niyas, K. H. Maillikarjun
By the arrival of latest video standards viz. MPEG-4 part 10 and H.264/H.26L, the usages of Advanced Video Coding (AVC) especially in the part of Variable Block Size (VBS) Motion Estimation (ME) are rising. A new architecture is developed for variable block size motion estimation using full search algorithm in this paper. There are two calculations carried out in this paper block size, which is variable, and another is the Sum of Absolute Differences (SAD), which are presented by recycling the outputs of reduced sub-block calculations. Mechanism that is incorporated by every processing element is shuffling mechanism. HDL verification is done through ModelSim simulator to verify the functionality. The design is implemented using TSMC 90nm CMOS technology. The frequency of the motion estimation block is 323.20 MHz, which can treat up to 41 Motion Vectors (MV).
由于最新视频标准的到来,即MPEG-4 part 10和H.264/H。26L中,高级视频编码(AVC)特别是可变块大小(VBS)运动估计(ME)部分的应用越来越多。本文提出了一种基于全搜索算法的可变块大小运动估计新架构。本文进行了两种块大小的计算,一种是可变的,另一种是绝对差和(Sum of Absolute difference, SAD),它是通过回收减少子块计算的输出来表示的。每个处理要素所结合的机制是洗牌机制。HDL验证通过ModelSim模拟器来验证功能。该设计采用台积电90nm CMOS技术实现。运动估计块的频率为323.20 MHz,最多可处理41个运动矢量(MV)。
{"title":"High speed architecture for Variable Block Size Motion Estimation in H.264","authors":"P. Jayakrishnan, R. Niyas, K. H. Maillikarjun","doi":"10.1109/ICE-CCN.2013.6528478","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528478","url":null,"abstract":"By the arrival of latest video standards viz. MPEG-4 part 10 and H.264/H.26L, the usages of Advanced Video Coding (AVC) especially in the part of Variable Block Size (VBS) Motion Estimation (ME) are rising. A new architecture is developed for variable block size motion estimation using full search algorithm in this paper. There are two calculations carried out in this paper block size, which is variable, and another is the Sum of Absolute Differences (SAD), which are presented by recycling the outputs of reduced sub-block calculations. Mechanism that is incorporated by every processing element is shuffling mechanism. HDL verification is done through ModelSim simulator to verify the functionality. The design is implemented using TSMC 90nm CMOS technology. The frequency of the motion estimation block is 323.20 MHz, which can treat up to 41 Motion Vectors (MV).","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121846841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of FFT processor using conventional and Vedic algorithm 基于传统算法和吠陀算法的FFT处理器性能评价
A. Prakash, S. Kirubaveni
Recently digital signal processing has received high attention due to the advancement in multimedia and wireless communication. Accordingly Orthogonal Frequency Division Multiple Access (OFDM) technique based on Time Division Duplex (TDD) is an attractive technology for high data rate wireless access in multichannel communication. The modulation and demodulation of OFDM are done by Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT) respectively. In this paper we propose a Vedic algorithm for the implementation of multiplier that is to be used in radix 25 512-point FFT processor. The multipliers based on Vedic mathematics are one of the fastest and low power multiplier. It enables parallel generation of partial product and eliminates unwanted multiplication steps. Thus Vedic multipliers ensure substantial reduction of propagation delay in FFT processor. The FFT processor employing Vedic multiplier reduces hardware complexity in area and power in FPGA implementation. The proposed processor has been designed in Xilinx and implemented using Spartan 3E FPGA kit with a supply voltage of 1.2 V. The delay and power obtained using the Vedic multiplier are 173.60ns and 11×10-2 W respectively.
近年来,随着多媒体和无线通信技术的发展,数字信号处理受到了人们的高度重视。因此,基于时分双工(TDD)的正交频分多址(OFDM)技术是实现多信道通信中高数据速率无线接入的一种有吸引力的技术。OFDM的调制和解调分别由快速傅立叶变换(FFT)和反快速傅立叶变换(IFFT)完成。本文提出了一种用于基数为25的512点FFT处理器的乘法器的Vedic算法。基于吠陀数学的乘法器是最快和低功率的乘法器之一。它可以并行生成部分乘积,并消除不必要的乘法步骤。因此,韦达乘法器确保了FFT处理器中传播延迟的大幅减少。采用Vedic乘法器的FFT处理器在FPGA实现中降低了硬件的面积和功耗复杂度。该处理器由赛灵思公司设计,采用电源电压为1.2 V的Spartan 3E FPGA套件实现。使用韦达乘法器获得的延迟和功率分别为173.60ns和11×10-2 W。
{"title":"Performance evaluation of FFT processor using conventional and Vedic algorithm","authors":"A. Prakash, S. Kirubaveni","doi":"10.1109/ICE-CCN.2013.6528470","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528470","url":null,"abstract":"Recently digital signal processing has received high attention due to the advancement in multimedia and wireless communication. Accordingly Orthogonal Frequency Division Multiple Access (OFDM) technique based on Time Division Duplex (TDD) is an attractive technology for high data rate wireless access in multichannel communication. The modulation and demodulation of OFDM are done by Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT) respectively. In this paper we propose a Vedic algorithm for the implementation of multiplier that is to be used in radix 25 512-point FFT processor. The multipliers based on Vedic mathematics are one of the fastest and low power multiplier. It enables parallel generation of partial product and eliminates unwanted multiplication steps. Thus Vedic multipliers ensure substantial reduction of propagation delay in FFT processor. The FFT processor employing Vedic multiplier reduces hardware complexity in area and power in FPGA implementation. The proposed processor has been designed in Xilinx and implemented using Spartan 3E FPGA kit with a supply voltage of 1.2 V. The delay and power obtained using the Vedic multiplier are 173.60ns and 11×10-2 W respectively.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient anonymous web browsing preventing traffic analysis attacks 高效匿名浏览,防止流量分析攻击
A. Priyanka, K. Balasubramanian
Anonymous web browsing is an emerging research topic that allows anyone to surf the web privately and securely. However, research on low latency anonymity application including web browsing has received greater attention in order to preserve anonymity but it is quite impractical due to the enormous delay and extra bandwidth demand caused by the current dummy packet padding strategy against traffic analysis attacks. To overcome this problem, we propose a new packet padding strategy to replace the current dominant dummy packet padding strategy for anonymous web browsing systems. The proposed method uses prefetched pages as the cover traffic rather than the dummy packets. With the proposed model, we compared our proposal and the previous scheme in terms of the metric Anonymization Effectiveness (AE) theoretically. Moreover, we defined a metric to measure the efficiency of different padding strategies and established a mathematical model for the traffic analysis attack. Finally, the experimental results have shown that the proposed method is efficient in reducing the delay and bandwidth waste compared to that of dummy packet padding method which confirmed the potentials of the proposed strategy.
匿名网页浏览是一个新兴的研究课题,它允许任何人私下安全地浏览网页。然而,为了保持匿名性,包括网页浏览在内的低延迟匿名应用的研究受到了越来越多的关注,但由于目前针对流量分析攻击的虚拟包填充策略造成了巨大的延迟和额外的带宽需求,因此这种方法非常不切实际。为了克服这一问题,我们提出了一种新的数据包填充策略来取代目前匿名网络浏览系统中占主导地位的虚拟数据包填充策略。该方法使用预取页面作为覆盖流量,而不是虚拟数据包。利用所提出的模型,我们从理论上比较了我们的方案和之前的方案在度量匿名化有效性(AE)方面的差异。此外,我们定义了一个度量标准来衡量不同填充策略的效率,并建立了流量分析攻击的数学模型。最后,实验结果表明,与虚拟分组填充方法相比,该方法在减少延迟和带宽浪费方面是有效的,验证了该策略的潜力。
{"title":"Efficient anonymous web browsing preventing traffic analysis attacks","authors":"A. Priyanka, K. Balasubramanian","doi":"10.1109/ICE-CCN.2013.6528536","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528536","url":null,"abstract":"Anonymous web browsing is an emerging research topic that allows anyone to surf the web privately and securely. However, research on low latency anonymity application including web browsing has received greater attention in order to preserve anonymity but it is quite impractical due to the enormous delay and extra bandwidth demand caused by the current dummy packet padding strategy against traffic analysis attacks. To overcome this problem, we propose a new packet padding strategy to replace the current dominant dummy packet padding strategy for anonymous web browsing systems. The proposed method uses prefetched pages as the cover traffic rather than the dummy packets. With the proposed model, we compared our proposal and the previous scheme in terms of the metric Anonymization Effectiveness (AE) theoretically. Moreover, we defined a metric to measure the efficiency of different padding strategies and established a mathematical model for the traffic analysis attack. Finally, the experimental results have shown that the proposed method is efficient in reducing the delay and bandwidth waste compared to that of dummy packet padding method which confirmed the potentials of the proposed strategy.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120946676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A qualitative analysis on the specification mining techniques 规范采矿技术的定性分析
Annie Ratna Priya, M. Mythily
Formal Specifications plays a vital role in several dimensions of software engineering such as testing, optimizing, refactoring, documenting, debugging and repair. Formal Specifications are generally descriptions for legal program behavior. In Conventional approaches, specifications are constructed manually and later automatic mining techniques emerges with mining rules focusing on temporal logic and language specifications. Addition of metrics in mining leads to improvement in performance and thereby providing a step towards the support for real world applications. This paper focuses on giving a detailed overview of specification mining techniques, thereby stating the need for specifications utility in industrial perspective. This paper also serves as a guide to gain additional knowledge and the impact of metrics over specification miners.
形式化规范在软件工程的几个方面起着至关重要的作用,如测试、优化、重构、文档、调试和修复。正式规范通常是对合法程序行为的描述。在传统方法中,规范是手动构建的,后来出现了自动挖掘技术,其挖掘规则侧重于时间逻辑和语言规范。在挖掘中添加度量可以提高性能,从而向支持真实世界的应用程序迈出了一步。本文着重对规范挖掘技术进行了详细的概述,从而说明了规范在工业应用中的必要性。本文还可以作为获得额外知识和度量标准对规范挖掘的影响的指南。
{"title":"A qualitative analysis on the specification mining techniques","authors":"Annie Ratna Priya, M. Mythily","doi":"10.1109/ICE-CCN.2013.6528492","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528492","url":null,"abstract":"Formal Specifications plays a vital role in several dimensions of software engineering such as testing, optimizing, refactoring, documenting, debugging and repair. Formal Specifications are generally descriptions for legal program behavior. In Conventional approaches, specifications are constructed manually and later automatic mining techniques emerges with mining rules focusing on temporal logic and language specifications. Addition of metrics in mining leads to improvement in performance and thereby providing a step towards the support for real world applications. This paper focuses on giving a detailed overview of specification mining techniques, thereby stating the need for specifications utility in industrial perspective. This paper also serves as a guide to gain additional knowledge and the impact of metrics over specification miners.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1