首页 > 最新文献

2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)最新文献

英文 中文
Analysis and clustering of PingER network data PingER网络数据的分析与聚类
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508127
Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell
The PingER project was started by the SLAC National Accelerator Laboratory, Stanford, California for the purpose of monitoring end to end network performance. For the last eighteen years PingER has generated an enormous amount of data that has been stored in space separated files. However due to the difficulties faced in retrieving data efficiently, it has been proposed that all the data be put into the form of RDF triples. Interpreting and analyzing such large volumes of data becomes a primary concern. By making using of clustering algorithms new and interesting patterns can be observed in the data sets. Outlier analysis can be performed giving insight to the exceptions occurring in the dataset and analyzing the probable causes of such. Patterns could be observed based on the country to which the data belongs and comparisons can be drawn between the patterns between the different countries.
PingER项目由位于加州斯坦福的SLAC国家加速器实验室启动,目的是监控端到端网络性能。在过去的18年里,PingER产生了大量的数据,这些数据存储在空间分隔的文件中。然而,由于在有效检索数据时面临的困难,有人提出将所有数据都以RDF三元组的形式存储。解释和分析如此大量的数据成为首要问题。通过使用聚类算法,可以在数据集中观察到新的有趣的模式。可以执行离群值分析,以深入了解数据集中发生的异常,并分析此类异常的可能原因。可以根据数据所属的国家观察到模式,并可以对不同国家之间的模式进行比较。
{"title":"Analysis and clustering of PingER network data","authors":"Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508127","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508127","url":null,"abstract":"The PingER project was started by the SLAC National Accelerator Laboratory, Stanford, California for the purpose of monitoring end to end network performance. For the last eighteen years PingER has generated an enormous amount of data that has been stored in space separated files. However due to the difficulties faced in retrieving data efficiently, it has been proposed that all the data be put into the form of RDF triples. Interpreting and analyzing such large volumes of data becomes a primary concern. By making using of clustering algorithms new and interesting patterns can be observed in the data sets. Outlier analysis can be performed giving insight to the exceptions occurring in the dataset and analyzing the probable causes of such. Patterns could be observed based on the country to which the data belongs and comparisons can be drawn between the patterns between the different countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126108374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A constrained re-growing concept for object separation in sea images 海洋图像中目标分离的约束再生概念
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508156
P. Sengar, Surabhi Singh, Naman Garg
In this paper, we present a technique to separate touching objects. This technique is divided into two stages; first separation of objects is achieved by successive threshold slicing, in this process most objects are reduced in size. Then, in order to regain the approximate size and shape the separated objects are re-grown to their original forms under the guidelines of a set of rules. Pixels having the potential for re-growth are identified. The pixel is re-grown only if its re-growth does-not disturb the established separation. We therefore allow separated objects to approximately regain their shape and size by constrained re-growing while maintaining the established separation. In this paper, we apply this algorithm to Synthetic Aperture Radar (SAR) images of sea ice floes.
在本文中,我们提出了一种分离触摸物体的技术。这项技术分为两个阶段;首先通过连续阈值切片实现对象的分离,在此过程中大多数对象的尺寸被减小。然后,为了重新获得大致的大小和形状,在一套规则的指导下,将分离的物体重新生长到它们的原始形式。具有再生潜力的像素被识别出来。只有当它的重新生长不干扰已建立的分离时,像素才会重新生长。因此,我们允许分离的对象通过约束的再生长近似地恢复其形状和大小,同时保持已建立的分离。本文将该算法应用于海浮冰合成孔径雷达(SAR)图像。
{"title":"A constrained re-growing concept for object separation in sea images","authors":"P. Sengar, Surabhi Singh, Naman Garg","doi":"10.1109/CONFLUENCE.2016.7508156","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508156","url":null,"abstract":"In this paper, we present a technique to separate touching objects. This technique is divided into two stages; first separation of objects is achieved by successive threshold slicing, in this process most objects are reduced in size. Then, in order to regain the approximate size and shape the separated objects are re-grown to their original forms under the guidelines of a set of rules. Pixels having the potential for re-growth are identified. The pixel is re-grown only if its re-growth does-not disturb the established separation. We therefore allow separated objects to approximately regain their shape and size by constrained re-growing while maintaining the established separation. In this paper, we apply this algorithm to Synthetic Aperture Radar (SAR) images of sea ice floes.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"56 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on various methods used in automatic video surveillance 对自动视频监控中使用的各种方法进行了研究
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508154
Surbhi Kapoor, Pushpendra Kumar Pateriya
Video surveillance is the most important issue in today's world as crime is increasing at an alarming rate. Moving object detection is first step in video surveillance. Analyzing video scenes is a challenging task for humans. So, efficient algorithms are deployed to do so. Detection and tracking of objects in videos is critical for wide solicitation fields such as crime detection, fight detection, person identification etc. Many methods exist to analyze the object behavior which includes background subtraction, foreground detection, cross scene abnormal detection etc. This work presents a review on available techniques for analyzing the behavior along with comparative study among various methods.
视频监控是当今世界最重要的问题,因为犯罪正在以惊人的速度增长。运动目标检测是视频监控的第一步。分析视频场景对人类来说是一项具有挑战性的任务。因此,需要部署高效的算法来做到这一点。视频中物体的检测与跟踪对于犯罪侦查、打斗侦查、人物识别等广泛的领域具有重要意义。分析目标行为的方法有很多,包括背景减法、前景检测、跨场景异常检测等。本文综述了现有的行为分析技术,并对各种方法进行了比较研究。
{"title":"A study on various methods used in automatic video surveillance","authors":"Surbhi Kapoor, Pushpendra Kumar Pateriya","doi":"10.1109/CONFLUENCE.2016.7508154","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508154","url":null,"abstract":"Video surveillance is the most important issue in today's world as crime is increasing at an alarming rate. Moving object detection is first step in video surveillance. Analyzing video scenes is a challenging task for humans. So, efficient algorithms are deployed to do so. Detection and tracking of objects in videos is critical for wide solicitation fields such as crime detection, fight detection, person identification etc. Many methods exist to analyze the object behavior which includes background subtraction, foreground detection, cross scene abnormal detection etc. This work presents a review on available techniques for analyzing the behavior along with comparative study among various methods.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A trust based secure routing scheme for MANETS 基于信任的MANETS安全路由方案
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508183
V. Bhargavi, M. Seetha, S. Viswanadharaju
A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.
MANET是一种可以在较少的基础设施和连接的帮助下轻松建立的无线移动网络。在这种网络中,每个节点都是独立的,因此可以充当路由器,也可以执行路由的工作。MANET中的所有节点本质上都是动态的,因为节点可以不时地改变其位置,并且任何节点都可以在需要时自由地加入和离开网络,因此我们可以说拓扑是动态变化的。最近几天,MANET的安全性一直是研究界的主要焦点。有许多针对MANET的不同攻击,但解决这些问题的方法在文献中没有得到太多关注。有几种方法可以处理有线网络中的安全问题,但同样的方法不能用于无线网络。针对MANET提出了许多路由协议,但大多数协议在存在恶意节点时表现出较差的性能。本文研究了一种新的混合安全路由协议S-DSR,该协议在网络节点间建立了一条安全的通信路径,从而提高了数据包的传输率和吞吐量等。该协议有助于根据来自相邻节点的信任信息找到安全文件传输的最佳路径。提议的协议已在NS-2上实现。与AODV、AOMDV等协议相比,该协议实现了更高的包投递率和更小的时延。
{"title":"A trust based secure routing scheme for MANETS","authors":"V. Bhargavi, M. Seetha, S. Viswanadharaju","doi":"10.1109/CONFLUENCE.2016.7508183","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508183","url":null,"abstract":"A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Group based analysis of AODV related protocols in MANET 基于分组的MANET中AODV相关协议分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508180
Mamata Rath
With an objective of study and analysis of power efficient routing protocols in Mobile Adhoc Network(MANET), this paper presents a report on performance of Adhoc On Demand Distant Vector (AODV) oriented MANET routing protocols which are founded on power aware techniques and also support quality of service parameters and resource reservation strategies. The comparison is based on the type and extent of delay management techniques, Quality of service conditions and resource reservation methods used by these important protocols while minimizing the end to end delay during transmission. Secondly the paper also presents a complete analysis on the mechanism of routing , advantages and scope for further improvement for research in these protocols which will provide sufficient information and scope for further research in this magnificent area of MANET.
摘要以研究和分析移动自组网(MANET)中节能路由协议为目的,研究了基于功率感知技术、支持服务质量参数和资源预留策略的面向AODV的移动自组网(MANET)路由协议的性能。这些重要协议采用的延迟管理技术的类型和程度、服务质量条件和资源预留方法进行了比较,同时最大限度地减少了传输过程中的端到端延迟。其次,本文还对这些协议的路由机制、优势和进一步改进的研究范围进行了完整的分析,为在MANET这一宏伟领域的进一步研究提供了足够的信息和空间。
{"title":"Group based analysis of AODV related protocols in MANET","authors":"Mamata Rath","doi":"10.1109/CONFLUENCE.2016.7508180","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508180","url":null,"abstract":"With an objective of study and analysis of power efficient routing protocols in Mobile Adhoc Network(MANET), this paper presents a report on performance of Adhoc On Demand Distant Vector (AODV) oriented MANET routing protocols which are founded on power aware techniques and also support quality of service parameters and resource reservation strategies. The comparison is based on the type and extent of delay management techniques, Quality of service conditions and resource reservation methods used by these important protocols while minimizing the end to end delay during transmission. Secondly the paper also presents a complete analysis on the mechanism of routing , advantages and scope for further improvement for research in these protocols which will provide sufficient information and scope for further research in this magnificent area of MANET.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correlation analysis on real-time tab-delimited network monitoring data 实时标签分隔网络监测数据的相关性分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508126
Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell
The PingER End-End performance monitoring of the Internet, is led by the SLAC National Accelerator Laboratory. It was created to answer the growing need to monitor the network both to analyze current performance and to designate resources to optimize execution between research centers, and the universities and institutes co-operating on present and future operations. The monitoring support reflects the broad geographical area of the collaborations and requires a comprehensive number of research and resources. The data architecture retrieval and methodology of the interpretation have emerged over numerous years. Analyzing this data is the main challenge due to its high volume. By using correlation analysis, we can make crucial conclusions about how the network data affects the performance of the hosts and how it depends from countries to countries.
互联网的ping - End-End性能监测,由SLAC国家加速器实验室领导。它的创建是为了满足日益增长的监控网络的需求,以分析当前的性能,并指定资源以优化研究中心之间的执行,以及在当前和未来运营中合作的大学和研究所。监测支助反映了合作的广泛地理区域,需要大量的研究和资源。数据架构、检索和解释的方法已经出现了许多年。由于数据量大,分析这些数据是主要的挑战。通过使用相关分析,我们可以得出关于网络数据如何影响主机性能以及它如何依赖于各国的重要结论。
{"title":"Correlation analysis on real-time tab-delimited network monitoring data","authors":"Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508126","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508126","url":null,"abstract":"The PingER End-End performance monitoring of the Internet, is led by the SLAC National Accelerator Laboratory. It was created to answer the growing need to monitor the network both to analyze current performance and to designate resources to optimize execution between research centers, and the universities and institutes co-operating on present and future operations. The monitoring support reflects the broad geographical area of the collaborations and requires a comprehensive number of research and resources. The data architecture retrieval and methodology of the interpretation have emerged over numerous years. Analyzing this data is the main challenge due to its high volume. By using correlation analysis, we can make crucial conclusions about how the network data affects the performance of the hosts and how it depends from countries to countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wormhole attacks in MANET MANET中的虫洞攻击
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508120
Nitika Gupta, Shailendra Narayan Singh
A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.
移动自组织网络或MANET是那些不具有由无线节点连接的基础设施的无线网络。这些节点通常是可移动的,无连接链路主要用于连接这些节点,这些节点具有自组织、自配置和自排列的能力。它们没有统一的结构。由于它们的移动性和动态性,它们很容易受到恶意用户的各种恶意攻击,因为在这种情况下,每个节点都扮演着发送者、接收者和路由器的角色,所以没有一个节点能够理解数据是由恶意发送者发送的,还是真正的发送者发送的,或者接收节点是真正的节点。因此,通过这种方式,数据可能会丢失,也可能被恶意用户丢弃,并且它也可以将虚假数据发送给接收者。所以在网络层实际上有很多种攻击。由于其移动性,MANETS通常比有线网络更容易受到网络攻击。所以像虫洞攻击这样的攻击在网络中是一个非常大的问题。随着人们对无线网络的需求日益增加。因此,如何防止这类攻击是一个大问题。这样它们就不会进一步影响网络层。因此,在本文中,我们将重点研究这些攻击,以及如何使用硬件而不是软件,通过加密和数字签名方法来解决虫洞攻击。
{"title":"Wormhole attacks in MANET","authors":"Nitika Gupta, Shailendra Narayan Singh","doi":"10.1109/CONFLUENCE.2016.7508120","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508120","url":null,"abstract":"A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance evaluation of spectrum Sensing techniques under Noise 噪声下频谱传感技术的性能评价
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508123
S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy
Noise has always been the most important constraint upon the sensing of Primary User in the frequency spectrum. Evaluation of various spectrum sensing schemes under noise gives us a fair idea about their robustness. Energy detection is fast but other Sensing techniques are better when it comes to the performing under Noise. Simulations are done for the three techniques at different noise levels. Detection result at different SNR levels are plotted. Response of the Eigen detection is the least effected with change in SNR(20 dB) and a change of 13.74% in case of matched filter detection is observed and it has been found that Cyclostationary is less affected by noise as compare to Matched Filter detection. Eigen value detection it remained almost constant.
噪声一直是影响主用户频谱感知的最主要的制约因素。对各种频谱感知方案在噪声条件下的鲁棒性进行了评价。能量检测是快速的,但当涉及到噪声下的表现时,其他传感技术更好。对三种技术在不同噪声水平下进行了仿真。绘制了不同信噪比下的检测结果。本特征检测的响应受信噪比变化的影响最小(20 dB),匹配滤波器检测的响应变化为13.74%,并且与匹配滤波器检测相比,周期平稳受噪声的影响较小。特征值检测几乎保持不变。
{"title":"Performance evaluation of spectrum Sensing techniques under Noise","authors":"S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy","doi":"10.1109/CONFLUENCE.2016.7508123","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508123","url":null,"abstract":"Noise has always been the most important constraint upon the sensing of Primary User in the frequency spectrum. Evaluation of various spectrum sensing schemes under noise gives us a fair idea about their robustness. Energy detection is fast but other Sensing techniques are better when it comes to the performing under Noise. Simulations are done for the three techniques at different noise levels. Detection result at different SNR levels are plotted. Response of the Eigen detection is the least effected with change in SNR(20 dB) and a change of 13.74% in case of matched filter detection is observed and it has been found that Cyclostationary is less affected by noise as compare to Matched Filter detection. Eigen value detection it remained almost constant.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICT and internet of things for creating smart learning environment for students at education institutes in India 信息通信技术和物联网为印度教育机构的学生创造智能学习环境
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508209
Munib ur Rahman, Himanshi, V. Deep, S. Rahman
Educational institutes have gone beyond the traditional way of learning by accepting the latest technologies and modern trends, making learning more innovative. The interactive technologies and Instant communication services have transformed the methods adopted for education into a more interactive, visualizable and accessible means. Education institutes in India, are in a process of adopting innovative techniques for creating a smart learning environment to nurture young talent. But according to National Survey findings, 13 out of every 100 Indians between 5-29 years drop out or refrain from going to school, as they do not consider education “necessary”. In this paper, we will discuss about how academic learning can be made reachable and motivating for the students using ICT and IoT, besides introducing them to their core subjects with interactive ways of Smart learning. Information Communication Technology promises a wide range of applications and devices for learning environments, whereas Internet of things is all about connecting devices, making them smart and self-controllable.
教育机构通过接受最新技术和现代趋势,超越了传统的学习方式,使学习更具创新性。互动技术和即时通讯服务使教育方法变得更具互动性、可视化和可及性。印度的教育机构正在采用创新技术来创造一个聪明的学习环境,以培养年轻人才。但根据全国调查结果,在5-29岁的印度人中,每100人中就有13人辍学或不上学,因为他们认为教育“没有必要”。在本文中,我们将讨论如何利用信息通信技术和物联网为学生提供可访问和激励的学术学习,并通过智能学习的互动方式向他们介绍他们的核心科目。信息通信技术为学习环境提供了广泛的应用和设备,而物联网则是连接设备,使其智能和自我控制。
{"title":"ICT and internet of things for creating smart learning environment for students at education institutes in India","authors":"Munib ur Rahman, Himanshi, V. Deep, S. Rahman","doi":"10.1109/CONFLUENCE.2016.7508209","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508209","url":null,"abstract":"Educational institutes have gone beyond the traditional way of learning by accepting the latest technologies and modern trends, making learning more innovative. The interactive technologies and Instant communication services have transformed the methods adopted for education into a more interactive, visualizable and accessible means. Education institutes in India, are in a process of adopting innovative techniques for creating a smart learning environment to nurture young talent. But according to National Survey findings, 13 out of every 100 Indians between 5-29 years drop out or refrain from going to school, as they do not consider education “necessary”. In this paper, we will discuss about how academic learning can be made reachable and motivating for the students using ICT and IoT, besides introducing them to their core subjects with interactive ways of Smart learning. Information Communication Technology promises a wide range of applications and devices for learning environments, whereas Internet of things is all about connecting devices, making them smart and self-controllable.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Improvement of lifetime duty cycle using genetic algorithm and network coding in wireless sensor networks 利用遗传算法和网络编码改进无线传感器网络的寿命占空比
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508192
Paurush Bhulania, Nikhil Gaur, Keithellakpam Poirei Federick
The process of a sensor network is to control by a big number of parameters, such as the wireless duty cycle, the frequency of neighbor discovery inspirations, and the rate of sample sensors. In this paper we propose a reduced-complexity Genetic Algorithm (GA) for optimization of multi-hop sensor networks in two stages such as randomized and circular bottleneck network node scheduling. The goal of the system is to generate optimal number of sensor clusters with Cluster-Heads (CHs). The GA is used to adaptively create various components such as cluster-members; Performance improvement by using GA namely; packet delivery ratio and average latency have also been investigated. A full theoretical analysis and simulation results have been providing to display the efficacy of the proposed approach improved x-OR using GA showing efficiency better as compare to basic XOR method and producing maximum packet delivery ratio.
传感器网络的过程是由大量参数控制的,如无线占空比、邻居发现启发频率、采样传感器速率等。本文提出了一种降低复杂度的遗传算法(GA),用于多跳传感器网络在随机化和循环瓶颈网络节点调度两个阶段的优化。该系统的目标是生成具有簇头(CHs)的传感器簇的最优数量。遗传算法用于自适应地创建各种组件,如集群成员;利用遗传算法改进性能,即;研究了分组传送率和平均时延。完整的理论分析和仿真结果表明,采用遗传算法改进的x-OR方法比基本的x-OR方法效率更高,并产生最大的分组传输比。
{"title":"Improvement of lifetime duty cycle using genetic algorithm and network coding in wireless sensor networks","authors":"Paurush Bhulania, Nikhil Gaur, Keithellakpam Poirei Federick","doi":"10.1109/CONFLUENCE.2016.7508192","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508192","url":null,"abstract":"The process of a sensor network is to control by a big number of parameters, such as the wireless duty cycle, the frequency of neighbor discovery inspirations, and the rate of sample sensors. In this paper we propose a reduced-complexity Genetic Algorithm (GA) for optimization of multi-hop sensor networks in two stages such as randomized and circular bottleneck network node scheduling. The goal of the system is to generate optimal number of sensor clusters with Cluster-Heads (CHs). The GA is used to adaptively create various components such as cluster-members; Performance improvement by using GA namely; packet delivery ratio and average latency have also been investigated. A full theoretical analysis and simulation results have been providing to display the efficacy of the proposed approach improved x-OR using GA showing efficiency better as compare to basic XOR method and producing maximum packet delivery ratio.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1