首页 > 最新文献

2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)最新文献

英文 中文
Improving security in two-way relay networks by optimal relay and jammer selection 通过优化中继和干扰机的选择,提高双向中继网络的安全性
S. Suganya, P. Shanmugapriya, T. R. Priyadharshini
The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.
在存在一个或多个窃听者的情况下,物理层安全通信方法的可行性。在之前的方案中,可以使用单向协作网络来实现从源到目的的信息传递。目前该技术的实现没有窃听器,由于有时攻击者可以对文件进行黑客攻击,使得该技术变得无效。未来的工作将在采用两阶段合作协议的双向合作网络中进行,目标是设计保密容量最大化或传输功率最小化的系统。信息可以分成两半,然后传输到中间节点,然后将文件合并到目的地。通过对中继节点和干扰节点的选择,实现两阶段协作协议,使窃听者存在时的保密能力最大化。
{"title":"Improving security in two-way relay networks by optimal relay and jammer selection","authors":"S. Suganya, P. Shanmugapriya, T. R. Priyadharshini","doi":"10.1109/ICE-CCN.2013.6528508","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528508","url":null,"abstract":"The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of μ-law companding & SQRT techniques for M-QAM OFDM systems M-QAM OFDM系统中μ律扩展和SQRT技术的性能分析
T. Deepa, R. Kumar
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.
正交频分复用(OFDM)是高数据速率通信系统中一种有效的传输技术。OFDM系统的主要问题是峰值平均功率比(PAPR),它降低了系统的效率,增加了系统的复杂性。本文提出了基于对数的压缩(即mu律)和平方根压缩(SQRT)作为OFDM中简单有效的PAPR降低技术。本文分析了正交频分复用(OFDM)信号扩展中的mu律和SQRT调制技术。仿真结果表明,与采用mu-law扩宽变换的OFDM系统相比,SQRT OFDM系统在降低PAPR和提高BER性能方面是一种有效的技术。通过对mu律和SQRT扩宽技术的比较,得出了最适合OFDM系统中减小PAPR的扩宽技术。仿真结果还表明,采用不同的调制技术在固定的子载波上调制信号,传输数据中的误差会迅速增加,而采用固定的调制技术时,随着子载波数量的增加,传输时的PAPR会增加,传输数据中的误码率(BER)保持不变且变化很小。
{"title":"Performance analysis of μ-law companding & SQRT techniques for M-QAM OFDM systems","authors":"T. Deepa, R. Kumar","doi":"10.1109/ICE-CCN.2013.6528513","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528513","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, logarithmic based companding (i.e, mu law) and Square rooting companding (SQRT) have been suggested as simple and effective PAPR reduction techniques for OFDM. This paper analyzes mu law and SQRT companding OFDM signal on M ary QAM modulation technique. Simulation results show that the SQRT OFDM system is an effective technique in reducing PAPR and improved BER performance than OFDM system with mu-law companding transform. Comparison among mu law and SQRT companding techniques is made for the best suited companding technique for PAPR reduction in OFDM system. The Simulation result also shows that by modulating a signal at a fixed subcarriers for different modulation technique, the error in the transmitted data increases rapidly whereas in case of fixed modulation techniques, increasing the number of subcarriers the PAPR increases at the transmit, the bit error rate (BER) in the transmitted data is constant and varies by a small fraction.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive IP traceback mechanism for detecting low rate DDoS attacks 自适应IP溯源机制,用于检测低速率DDoS攻击
M. Baskar, T. Gnanasekaran, S. Saravanan
Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.
分布式拒绝服务(DDoS)攻击被认为是对网络的重大威胁。由于网络路由机制的内存较少的特性,跟踪这些攻击的来源是非常繁重的。古老的数据包标记技术由于其高内存消耗和较差的可测量性而不再被应用。在本文中,我们倾向于使用熵变来观察区分传统攻击和DDoS攻击流量的攻击。然而,它将仅用于观察攻击期间的流量是难以置信的高速率。还有许多攻击期间,攻击的强度也很微薄,但这些攻击的结果可能仍然很严重。因此,有必要观察这种攻击,以较低的信息率来衡量。我们倾向于提出一种能够检测DDoS攻击的自适应攻击检测系统(AADS),无论攻击强度如何。
{"title":"Adaptive IP traceback mechanism for detecting low rate DDoS attacks","authors":"M. Baskar, T. Gnanasekaran, S. Saravanan","doi":"10.1109/ICE-CCN.2013.6528526","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528526","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks is measured to be a vital threat to the net. Because of memory less feature of the net routing mechanism, it's extraordinarily onerous to trace back to the supply of those attacks. Ancient packet marking techniques are not any longer applied because of its high memory consumption and poor measurability. During this paper, we have a tendency to build use of entropy variation to observe the attack that differentiates between traditional and DDoS attack traffic. However it will solely be applied to observe the attack during which rate of the traffic flow is incredibly high. There are also many attacks during which the strength of the attack is also meager, however the results of those attacks might be still severe. So it's essential to observe such attacks that square measure in lower order in terms of information rate. We have a tendency to propose an Adaptive Attack Detection System (AADS) that is capable of detection DDoS attacks regardless of the attack strength.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Classification of different neuron behavior by designing spiking neuron model 通过设计脉冲神经元模型对不同神经元行为进行分类
A. Kumar, S. Kansal, M. Hanmandlu
We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.
我们提出了一个简单的双方程模型,该模型产生了生物神经元的丰富行为,包括强直脉冲、强直脉冲、混合模式放电、强直脉冲频率自适应、谐振器、积分器等。我们的模型能够产生真实生物神经元的19种不同的动态。我们已经说明了单个神经元响应简单直流电脉冲时的尖峰行为的丰富性和复杂性。
{"title":"Classification of different neuron behavior by designing spiking neuron model","authors":"A. Kumar, S. Kansal, M. Hanmandlu","doi":"10.1109/ICE-CCN.2013.6528592","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528592","url":null,"abstract":"We have presented a simple two equation model which produces the rich behavior of biological neurons, including tonic spiking, tonic bursting, mixed mode firing, spike frequency adaptation, resonator, integrator etc. Our model is capable of producing 19 different kinds of dynamics of real biological neuron. We have illustrated the richness and complexity of spiking behavior of individual neuron in response to simple pulses of dc current.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131583703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A four element rectangular dielectric resonator antenna array for wireless applications 一种用于无线应用的四元矩形介电谐振器天线阵列
I. Khan, R. Kumari, S. Behera
Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.
介绍了一种用于无线应用的四元矩形介质谐振器天线阵列的设计。RDRA阵列采用矩形共形贴片(RCP)连接微带线激励,是一种有效的馈源机制,具有较高的能量耦合效率。仿真结果表明,该天线的阻抗带宽在4 GHz ~ 7.1 GHz之间,覆盖了多个无线频段。通过改变RCP和最终设计的地平面进行了参数化研究。该天线在谐振频率处具有可观的增益和较好的辐射方向图。
{"title":"A four element rectangular dielectric resonator antenna array for wireless applications","authors":"I. Khan, R. Kumari, S. Behera","doi":"10.1109/ICE-CCN.2013.6528584","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528584","url":null,"abstract":"Design of four element rectangular shaped dielectric resonator antenna (RDRA) array is presented for wireless applications. The RDRA array is excited by rectangular conformal patch (RCP) connected to microstrip line which is an effective feed mechanism and more efficient in energy coupling. Simulation result shows that the proposed antenna achieves an impedance bandwidth from 4 GHz to 7.1 GHz covering wireless bands. Parametric studies have been carried out by varying the RCP and the ground plane of the final design. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Survey of various techniques for determining influential users in social networks 各种技术的调查,以确定有影响力的用户在社会网络
Sarabjot Singh, N. Mishra, S. Sharma
Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.
在博客或博客网络中,有一些用户对网络上的其他用户造成很大的影响。本文将这类用户称为影响用户(IU)。用户是指使其他用户对其发布的文档和内容执行某些操作的用户。不同的组织通过博客网站使用IU进行病毒式营销。该组织希望通过利用一小部分潜在用户来销售新产品以获得利润。在本文中,我们将重点关注有助于确定IUs的各种方法,其中一些方法基于社交网络的拓扑结构,有些方法基于超链接,然后我们讨论了基于用户在社交网络中执行的活动,利用其扩散历史来寻找有影响力用户的新方法。
{"title":"Survey of various techniques for determining influential users in social networks","authors":"Sarabjot Singh, N. Mishra, S. Sharma","doi":"10.1109/ICE-CCN.2013.6528531","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528531","url":null,"abstract":"Into the bloggers or a blog network, there are some users who cause a great influence over other users of the network. In this paper we refer these kinds of users as Influential Users (IU). IUs are those users that cause the other users to do some actions on the documents and contents published by him or her. The IU is being used by different organizations for viral marketing by using blogging sites. The organization wants to market a new product by using a small group of potential users to get profit. In this paper, we focus on the various approaches that helps in determination of IUs, some of them are based on the topology of the social network and some are based on hyperlink and later we discuss the new approach to finding the influential user which is based on the activities that the users performs in social networks, utilizing their diffusion history.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132467295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Data mining approaches for aircraft accidents prediction: An empirical study on Turkey airline 飞机事故预测的数据挖掘方法:土耳其航空公司的实证研究
A. Christopher, S. Appavu
Data mining approaches have been successfully applied in different fields. Risk and safety have always been important considerations in aviation. There is a large amount of knowledge and data accumulation in aviation industry. These data can be store in the form of pilot reports, maintenance reports, accident reports or delay reports. This paper applied the decision tree model on accident reports of the Federal Aviation Administration (FAA) Accident / incident Data System database, contains 468 accident data records for all categories of aviation between the years of 1970 to 2011. The decision tree classifier is use to predict the warning level of the component as the class attribute. We have explored the use of the decision tree technique on aviation components data. Decision Tree induction algorithm is applied to generate the model and the generated model is used to predict the warning of accidents in the airline database. This work may be useful for Aviation Company to make better prediction.
数据挖掘方法已经成功地应用于不同的领域。风险和安全一直是航空领域的重要考虑因素。航空行业有大量的知识和数据积累。这些数据可以以飞行员报告、维修报告、事故报告或延误报告的形式存储。本文将决策树模型应用于美国联邦航空管理局(FAA)事故/事件数据系统数据库的事故报告,该数据库包含1970年至2011年间所有航空类别的468起事故数据记录。使用决策树分类器作为类属性来预测组件的警告级别。我们探索了决策树技术在航空部件数据上的应用。采用决策树归纳算法生成模型,并将生成的模型用于航空公司数据库中的事故预警预测。本研究可为航空公司更好地进行预测提供参考。
{"title":"Data mining approaches for aircraft accidents prediction: An empirical study on Turkey airline","authors":"A. Christopher, S. Appavu","doi":"10.1109/ICE-CCN.2013.6528602","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528602","url":null,"abstract":"Data mining approaches have been successfully applied in different fields. Risk and safety have always been important considerations in aviation. There is a large amount of knowledge and data accumulation in aviation industry. These data can be store in the form of pilot reports, maintenance reports, accident reports or delay reports. This paper applied the decision tree model on accident reports of the Federal Aviation Administration (FAA) Accident / incident Data System database, contains 468 accident data records for all categories of aviation between the years of 1970 to 2011. The decision tree classifier is use to predict the warning level of the component as the class attribute. We have explored the use of the decision tree technique on aviation components data. Decision Tree induction algorithm is applied to generate the model and the generated model is used to predict the warning of accidents in the airline database. This work may be useful for Aviation Company to make better prediction.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124804497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Audio retrieval using timbral feature 利用音质特征进行音频检索
R. Kumar, D. Chandy
The increase in availability of music information demands for the development of tools for audio retrieval. Audio information retrieval implicates the retrieval of similar audio files based on the feature. Feature extraction is one of the important tasks where the entire retrieval system relies on. In this work, audio information retrieval has been performed on GTZAN datasets using Delta Mel-Frequency Cepstral Coefficients (MFCC) feature which is a kind of timbre feature. The results obtained for the various stages of feature extraction and retrieval performance plot has been presented. The average precision and recall values obtained are 78.67% and 58.02%, respectively.
音乐信息可用性的增加要求开发音频检索工具。音频信息检索涉及基于特征的相似音频文件的检索。特征提取是整个检索系统所依赖的重要任务之一。在这项工作中,利用Delta Mel-Frequency Cepstral Coefficients (MFCC) feature(一种音色特征)对GTZAN数据集进行音频信息检索。给出了各阶段特征提取和检索性能图的结果。平均查准率和查全率分别为78.67%和58.02%。
{"title":"Audio retrieval using timbral feature","authors":"R. Kumar, D. Chandy","doi":"10.1109/ICE-CCN.2013.6528497","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528497","url":null,"abstract":"The increase in availability of music information demands for the development of tools for audio retrieval. Audio information retrieval implicates the retrieval of similar audio files based on the feature. Feature extraction is one of the important tasks where the entire retrieval system relies on. In this work, audio information retrieval has been performed on GTZAN datasets using Delta Mel-Frequency Cepstral Coefficients (MFCC) feature which is a kind of timbre feature. The results obtained for the various stages of feature extraction and retrieval performance plot has been presented. The average precision and recall values obtained are 78.67% and 58.02%, respectively.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
RETP: Reliable Event Transmission Protocol in a wireless sensor network RETP:无线传感器网络中的可靠事件传输协议
K. Priya, S. Terence
One of the main objective of wireless sensor network is to forward the events to the destination in a fast and reliable manner. There are several methods are existing for packet forwarding. Some researchers use single node to forward event packet and some researchers use all nodes (nodes in event region) to forward event packet. In this paper we proposing a technique named as Reliable Event Transmission Protocol (RETP) in a wireless sensor network for real time event detection and reliable packet forwarding in wireless sensor networks. In RETP, we introduce the concept cluster heads to forward the event when event occurred. Here number for event forwarding nodes is restricted by n/2(for even number of nodes) or n-1/2(for odd number of nodes). So it helps to energy conversion, computation cost in the network as well as it ensures the reliability in event forwarding. The literature survey has been done on various techniques in event detection.
无线传感器网络的主要目标之一是快速、可靠地将事件转发到目的地。报文转发有几种方法。有的研究者采用单节点转发事件报文,有的研究者采用全节点(事件区域内的节点)转发事件报文。本文提出了一种无线传感器网络可靠事件传输协议(RETP),用于无线传感器网络的实时事件检测和可靠的数据包转发。在RETP中,我们引入了集群头的概念,以便在事件发生时转发事件。这里事件转发节点的数量受n/2(偶数节点)或n-1/2(奇数节点)的限制。这样既有利于降低网络的能量转换和计算成本,又保证了事件转发的可靠性。对事件检测中的各种技术进行了文献综述。
{"title":"RETP: Reliable Event Transmission Protocol in a wireless sensor network","authors":"K. Priya, S. Terence","doi":"10.1109/ICE-CCN.2013.6528489","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528489","url":null,"abstract":"One of the main objective of wireless sensor network is to forward the events to the destination in a fast and reliable manner. There are several methods are existing for packet forwarding. Some researchers use single node to forward event packet and some researchers use all nodes (nodes in event region) to forward event packet. In this paper we proposing a technique named as Reliable Event Transmission Protocol (RETP) in a wireless sensor network for real time event detection and reliable packet forwarding in wireless sensor networks. In RETP, we introduce the concept cluster heads to forward the event when event occurred. Here number for event forwarding nodes is restricted by n/2(for even number of nodes) or n-1/2(for odd number of nodes). So it helps to energy conversion, computation cost in the network as well as it ensures the reliability in event forwarding. The literature survey has been done on various techniques in event detection.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
License plate Character Segmentation using horizontal and vertical projection with dynamic thresholding 基于水平和垂直投影的动态阈值分割车牌字符
J. Jagannathan, A. Sherajdheen, R. Deepak, N. Krishnan
Intelligent Traffic Systems (ITS) is an integral component of modern day road transportation networks. Identification of vehicles is one of the most important challenges to be addressed in the design of any intelligent traffic system. License plate being a unique identity for any registered vehicle, License Plate Recognition (LPR) systems have been used as the means to resolve the issue of identification of vehicles. Intelligent systems involving LPR has been widely applied in several applications such as intelligent traffic rule enforcement, prevention of car theft, intelligent traffic emergency/accident handling, monitoring of vehicle traffic and flow control, intelligent parking, automated toll payment, intelligent surveillance and security enforcement etc. A typical LPR process consists of three stages viz; License Plate Extraction, Character Segmentation and Character Recognition. This paper address the Character Segmentation problem. The character segmentation method using horizontal and vertical projection and with dynaic thresholding is proposed in this paper. From the experimental studies made, it is learned that the proposed technique works reasonably well in real world scenarios.
智能交通系统(ITS)是现代道路交通网络的重要组成部分。车辆识别是任何智能交通系统设计中需要解决的最重要的挑战之一。车牌是任何已登记车辆的唯一身份,车牌识别系统已被用作解决车辆身份识别问题的手段。涉及LPR的智能系统已广泛应用于智能交通规则执行、汽车盗窃预防、智能交通突发/事故处理、车辆交通监控和流量控制、智能停车、自动收费、智能监控和安全执法等领域。典型的LPR过程包括三个阶段:车牌提取,字符分割和字符识别。本文研究了字符分割问题。提出了一种基于水平投影和垂直投影以及动态阈值分割的字符分割方法。从实验研究中得知,所提出的技术在现实世界的场景中工作得相当好。
{"title":"License plate Character Segmentation using horizontal and vertical projection with dynamic thresholding","authors":"J. Jagannathan, A. Sherajdheen, R. Deepak, N. Krishnan","doi":"10.1109/ICE-CCN.2013.6528594","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528594","url":null,"abstract":"Intelligent Traffic Systems (ITS) is an integral component of modern day road transportation networks. Identification of vehicles is one of the most important challenges to be addressed in the design of any intelligent traffic system. License plate being a unique identity for any registered vehicle, License Plate Recognition (LPR) systems have been used as the means to resolve the issue of identification of vehicles. Intelligent systems involving LPR has been widely applied in several applications such as intelligent traffic rule enforcement, prevention of car theft, intelligent traffic emergency/accident handling, monitoring of vehicle traffic and flow control, intelligent parking, automated toll payment, intelligent surveillance and security enforcement etc. A typical LPR process consists of three stages viz; License Plate Extraction, Character Segmentation and Character Recognition. This paper address the Character Segmentation problem. The character segmentation method using horizontal and vertical projection and with dynaic thresholding is proposed in this paper. From the experimental studies made, it is learned that the proposed technique works reasonably well in real world scenarios.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116936977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1