首页 > 最新文献

2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)最新文献

英文 中文
Detection and analysis of network & application layer attacks using Maya Honeypot 基于Maya蜜罐的网络与应用层攻击检测与分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508125
Seema Sharma
This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.
本文讨论了欺骗作为一种网络安全策略的使用,以及基于Java的蜜罐“Maya”的开发。对于网络欺骗,入侵者故意提供具有一个或多个漏洞的主机。蜜罐就是这样一种网络欺骗工具,它给攻击者提供了错觉。蜜罐的基本目的是得到妥协,以收集有关入侵者和他们的攻击方法的信息。它也可以用来引诱攻击者,使他偏离实际的网络。“Maya”蜜罐是基于Java的欺骗工具,具有模拟服务(FTP等),基于规则和异常的入侵检测引擎和基于web的管理和监控工具。
{"title":"Detection and analysis of network & application layer attacks using Maya Honeypot","authors":"Seema Sharma","doi":"10.1109/CONFLUENCE.2016.7508125","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508125","url":null,"abstract":"This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An analysis of vision based techniques for quality assessment and enhancement of camera captured document images 基于视觉的相机捕获文档图像质量评估和增强技术分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508157
Pooja Sharma, Shanu Sharma
Now a days with the advancement of technology, there has been a tremendous rise in the volume of captured and distributed content. Image acquisition can be done with the help of scanners, cameras, smart phones, tablets etc. Document retrieval and recognition systems require high quality document images but most of the time, the images acquired suffer from various degradations like blur, uneven illumination, low resolution etc. To reduce the processing time and get good results, we require methods to evaluate and improve the quality of such images. This paper reviews the quality assessment methods and enhancement techniques for document images as well as represents a survey of the work that has been performed in the field of document image quality assessment and enhancement.
如今,随着科技的进步,捕获和分发的内容数量有了巨大的增长。图像采集可以在扫描仪、相机、智能手机、平板电脑等的帮助下完成。文档检索和识别系统需要高质量的文档图像,但大多数情况下,所获得的图像存在各种退化问题,如模糊、光照不均匀、分辨率低等。为了减少处理时间并获得良好的效果,我们需要评估和提高图像质量的方法。本文综述了文献图像质量评价方法和增强技术,并对文献图像质量评价和增强领域的工作进行了综述。
{"title":"An analysis of vision based techniques for quality assessment and enhancement of camera captured document images","authors":"Pooja Sharma, Shanu Sharma","doi":"10.1109/CONFLUENCE.2016.7508157","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508157","url":null,"abstract":"Now a days with the advancement of technology, there has been a tremendous rise in the volume of captured and distributed content. Image acquisition can be done with the help of scanners, cameras, smart phones, tablets etc. Document retrieval and recognition systems require high quality document images but most of the time, the images acquired suffer from various degradations like blur, uneven illumination, low resolution etc. To reduce the processing time and get good results, we require methods to evaluate and improve the quality of such images. This paper reviews the quality assessment methods and enhancement techniques for document images as well as represents a survey of the work that has been performed in the field of document image quality assessment and enhancement.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122917222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical analysis of data acquisition techniques: PAPI vs. CAPI 数据采集技术的实证分析:PAPI与CAPI
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508137
Mantek Singh Bhatia, Arunima Jaiswal
Data acquisition refers to the act of collecting data on a large scale. This paper presents a qualitative and quantitative analysis of two data acquisition techniques, namely, Pen and Paper Interviewing (PAPI) and Computer-Assisted Personal Interviewing (CAPI). It cites two case studies to clearly define the difference between the two techniques. They have been compared on four factors, namely, cost, time consumed during the whole process, productivity of each interviewer and quality assessment of each techniques (average number of errors occurred per interview). It emphasizes on providing absolute numbers to clearly show the difference between the two techniques.
数据采集是指大规模收集数据的行为。本文对纸笔访谈(PAPI)和计算机辅助个人访谈(CAPI)两种数据采集技术进行了定性和定量分析。它引用了两个案例研究来清楚地定义这两种技术之间的区别。在成本、整个过程中所消耗的时间、每个采访者的生产率和每种技术的质量评估(每次访谈平均发生的错误数)四个因素上进行了比较。它强调提供绝对数字,以清楚地显示两种技术之间的差异。
{"title":"Empirical analysis of data acquisition techniques: PAPI vs. CAPI","authors":"Mantek Singh Bhatia, Arunima Jaiswal","doi":"10.1109/CONFLUENCE.2016.7508137","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508137","url":null,"abstract":"Data acquisition refers to the act of collecting data on a large scale. This paper presents a qualitative and quantitative analysis of two data acquisition techniques, namely, Pen and Paper Interviewing (PAPI) and Computer-Assisted Personal Interviewing (CAPI). It cites two case studies to clearly define the difference between the two techniques. They have been compared on four factors, namely, cost, time consumed during the whole process, productivity of each interviewer and quality assessment of each techniques (average number of errors occurred per interview). It emphasizes on providing absolute numbers to clearly show the difference between the two techniques.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data and knowledge classification in intelligence informational systems by the evolutionary method 基于进化方法的智能信息系统数据和知识分类
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508038
V. Bova, V. Kureichik, D. Zaruba
This article discusses the promising direction in the field of intelligence informational system such as knowledge bases development. These knowledge bases use ontology systemization as a tool for classification of domain objects. The developed model is able to select essential features of classifiable objects. To solve problems of classification and structuring of data and knowledge, we suggest a new evolutionary approach based on the arranging of knowledge objects with respect to the basic element inside of a multidimensional space of features. The basic element is denoted by the genetic algorithm (GA). This algorithm allows to obtain the effective solution of classification with the use of different types of basic element representation inside of multidimensional space and various classes ordering in sequence of ontology objects. The genetic algorithm is an iterative probabilistic heuristic search algorithm with simultaneous use of a variety of populations from alternative solution space.
本文讨论了知识库开发等智能信息系统的发展方向。这些知识库使用本体系统化作为领域对象分类的工具。所建立的模型能够选择可分类对象的基本特征。为了解决数据和知识的分类和结构化问题,我们提出了一种基于多维特征空间中基本元素对知识对象进行排列的进化方法。基本元由遗传算法表示。该算法利用多维空间内部不同类型的基本元素表示和本体对象的不同类顺序排序,获得有效的分类解决方案。遗传算法是一种迭代概率启发式搜索算法,它同时使用来自备选解空间的各种种群。
{"title":"Data and knowledge classification in intelligence informational systems by the evolutionary method","authors":"V. Bova, V. Kureichik, D. Zaruba","doi":"10.1109/CONFLUENCE.2016.7508038","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508038","url":null,"abstract":"This article discusses the promising direction in the field of intelligence informational system such as knowledge bases development. These knowledge bases use ontology systemization as a tool for classification of domain objects. The developed model is able to select essential features of classifiable objects. To solve problems of classification and structuring of data and knowledge, we suggest a new evolutionary approach based on the arranging of knowledge objects with respect to the basic element inside of a multidimensional space of features. The basic element is denoted by the genetic algorithm (GA). This algorithm allows to obtain the effective solution of classification with the use of different types of basic element representation inside of multidimensional space and various classes ordering in sequence of ontology objects. The genetic algorithm is an iterative probabilistic heuristic search algorithm with simultaneous use of a variety of populations from alternative solution space.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predictive modelling approach to data mining for forecasting electricity consumption 电力消耗预测数据挖掘的预测建模方法
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508138
N. Kaur, A. Kaur
This paper presents an approach of data mining technique to predict electricity demand of a geographical region based on the meteorological conditions. The value prediction predictive data mining technique is implemented with the Artificial Neural Networks. The values of the factors such as temperature, humidity and public holiday on which electricity consumption depends and the daily consumption values constitute the data. Data mining operations are performed on this historical data to form a prediction model which is capable of predicting daily consumption provided the meteorological parameters. The steps of knowledge discovery of data process are implemented. The data is preprocessed and fed to neural network for training it. The trained neural network is used to predict the electricity demand for the given meteorological conditions.
提出了一种基于气象条件的数据挖掘技术预测地理区域电力需求的方法。利用人工神经网络实现了数值预测预测数据挖掘技术。用电量所依赖的温度、湿度、公众假期等因素的数值与每日用电量的数值构成数据。对这些历史数据进行数据挖掘,形成一个预测模型,在提供气象参数的情况下,可以预测出每天的用电量。实现了数据处理的知识发现步骤。数据经过预处理后输入神经网络进行训练。利用训练好的神经网络对给定气象条件下的电力需求进行预测。
{"title":"Predictive modelling approach to data mining for forecasting electricity consumption","authors":"N. Kaur, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508138","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508138","url":null,"abstract":"This paper presents an approach of data mining technique to predict electricity demand of a geographical region based on the meteorological conditions. The value prediction predictive data mining technique is implemented with the Artificial Neural Networks. The values of the factors such as temperature, humidity and public holiday on which electricity consumption depends and the daily consumption values constitute the data. Data mining operations are performed on this historical data to form a prediction model which is capable of predicting daily consumption provided the meteorological parameters. The steps of knowledge discovery of data process are implemented. The data is preprocessed and fed to neural network for training it. The trained neural network is used to predict the electricity demand for the given meteorological conditions.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Interconnectivity of a Master and a Slave white space device under the control of a TVWSDB 在TVWSDB控制下的主白色空间设备和从白色空间设备的互连性
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508184
Tanvi Sachdev, B. Gandhi, Jitendra Kumar Singh Jadon
A device intended to use the white space radio spectrum is a “white-spaces device” (WSD). Such devices are designed to detect the presence of existing but unused areas of airwaves and utilize it for internet connectivity. The advantages associated with the utilization of white space spectrum make it extremely attractive for wireless applications. This paper applies to Master white space device and Slave white space device, which are a part of TV white space device which are managed and controlled by a white space database operating in the TV band of 470 MHz to 790 MHz. These devices are intended to possess primary, dedicated or external antennas, where TVWS devices using external antennas are intended only for fixed use. A master WSD directly communicates with a TVWSDB and on the other hand a slave WSD is able to communicate when under the control of a master WSD. This paper presents the functionality of both Master and Slave WSD with their hand in hand working and it also explain some essential parameters required for their operation.
打算使用白色空间无线电频谱的设备称为“白色空间设备”(WSD)。这种设备的设计目的是检测现有但未使用的无线电波区域的存在,并将其用于互联网连接。利用白色空间频谱的优势使其对无线应用极具吸引力。本文应用于电视空白空间设备的主空白空间设备和从空白空间设备,它们由运行在470mhz ~ 790mhz电视频段的空白空间数据库进行管理和控制。这些设备旨在拥有主天线、专用天线或外部天线,而使用外部天线的TVWS设备仅用于固定用途。主WSD直接与TVWSDB通信,另一方面,从WSD在主WSD的控制下能够通信。本文介绍了主WSD和从WSD的功能及其协同工作,并解释了它们运行所需的一些基本参数。
{"title":"Interconnectivity of a Master and a Slave white space device under the control of a TVWSDB","authors":"Tanvi Sachdev, B. Gandhi, Jitendra Kumar Singh Jadon","doi":"10.1109/CONFLUENCE.2016.7508184","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508184","url":null,"abstract":"A device intended to use the white space radio spectrum is a “white-spaces device” (WSD). Such devices are designed to detect the presence of existing but unused areas of airwaves and utilize it for internet connectivity. The advantages associated with the utilization of white space spectrum make it extremely attractive for wireless applications. This paper applies to Master white space device and Slave white space device, which are a part of TV white space device which are managed and controlled by a white space database operating in the TV band of 470 MHz to 790 MHz. These devices are intended to possess primary, dedicated or external antennas, where TVWS devices using external antennas are intended only for fixed use. A master WSD directly communicates with a TVWSDB and on the other hand a slave WSD is able to communicate when under the control of a master WSD. This paper presents the functionality of both Master and Slave WSD with their hand in hand working and it also explain some essential parameters required for their operation.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127122294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of mobile cloud computing 移动云计算综述
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508113
H. Atre, Karan Razdan, R. Sagar
Most people today are extremely reliant on their mobile devices. From the basic task of making calls to keeping track of your fitness, the smart phone is a versatile device that can cater to a number of our needs. The mobile devices owe their popularity and success to the huge number of applications that can be installed on them and the various tasks that can be performed using the said applications. Like every good thing, mobile devices have a few short comings too. The major limitations in a mobile device have always been the amount of memory available, the processing power and the battery life. We are going to investigate the various trends in the mobile device market and how mobile cloud computing fits into the whole picture.
现在大多数人都非常依赖他们的移动设备。从打电话的基本任务到跟踪你的健康状况,智能手机是一个多功能的设备,可以满足我们的许多需求。移动设备的流行和成功归功于可以安装在它们上面的大量应用程序以及可以使用这些应用程序执行的各种任务。就像所有的好东西一样,移动设备也有一些缺点。移动设备的主要限制一直是可用内存的数量、处理能力和电池寿命。我们将调查移动设备市场的各种趋势,以及移动云计算如何融入整个市场。
{"title":"A review of mobile cloud computing","authors":"H. Atre, Karan Razdan, R. Sagar","doi":"10.1109/CONFLUENCE.2016.7508113","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508113","url":null,"abstract":"Most people today are extremely reliant on their mobile devices. From the basic task of making calls to keeping track of your fitness, the smart phone is a versatile device that can cater to a number of our needs. The mobile devices owe their popularity and success to the huge number of applications that can be installed on them and the various tasks that can be performed using the said applications. Like every good thing, mobile devices have a few short comings too. The major limitations in a mobile device have always been the amount of memory available, the processing power and the battery life. We are going to investigate the various trends in the mobile device market and how mobile cloud computing fits into the whole picture.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A literature survey - various audio watermarking techniques and their challenges 文献综述-各种音频水印技术及其挑战
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508162
Jaya Bajpai, A. Kaur
Embedding a digital data into the host signal under perceptual constraints is called audio watermarking. Existing Literature in this field gives vast algorithms providing solutions to the audio watermarking constraints. A survey on different domains such as spatial domain, frequency domain and the hybrid domain of digital audio watermarking has been carried out in this paper. The algorithms that are implemented have been studied and reviewed, the challenges posed in this algorithms and their drawbacks have been presented in the paper. The best possible solution to them have been engrossed as future work in this survey.
在感知约束下将数字数据嵌入到主机信号中称为音频水印。该领域的现有文献给出了大量的算法来解决音频水印约束问题。本文对数字音频水印的空间域、频率域和混合域进行了研究。本文对实现的算法进行了研究和回顾,并提出了这些算法所面临的挑战和它们的缺点。这些问题的最佳解决方案已成为本调查今后的工作重点。
{"title":"A literature survey - various audio watermarking techniques and their challenges","authors":"Jaya Bajpai, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508162","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508162","url":null,"abstract":"Embedding a digital data into the host signal under perceptual constraints is called audio watermarking. Existing Literature in this field gives vast algorithms providing solutions to the audio watermarking constraints. A survey on different domains such as spatial domain, frequency domain and the hybrid domain of digital audio watermarking has been carried out in this paper. The algorithms that are implemented have been studied and reviewed, the challenges posed in this algorithms and their drawbacks have been presented in the paper. The best possible solution to them have been engrossed as future work in this survey.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133929858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance analysis of OFDMA, MIMO and SC-FDMA technology in 4G LTE networks 4G LTE网络中OFDMA、MIMO和SC-FDMA技术的性能分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508181
Navita, Amandeep
Long Term Evolution (LTE) has become a powerful technology for 4th Generation networks. New generation always demand a better quality of service mainly in terms of high data rate, better signal quality, large coverage area and services at low cost etc. LTE comes to support the 4G environment by adopting the three important multiple access techniques. The three multiple access techniques are Orthogonal Frequency Division Multiple Access (OFDMA), Multiple Inputs Multiple Outputs (MIMO) and Single Carrier Frequency Division Multiple Access (SC-FDMA) techniques. Each technique has its associated features that make LTE popular among its users. OFDMA and MIMO technology are used for downlink and SC-FDMA for uplink channel. In this paper, we are going to analyze the performance of OFDMA, MIMO and SC-FDMA in LTE at physical layer by considering different modulation schemes such as BPSK, QPSK, 16 QAM by using BER and SNR as parameters.
长期演进(LTE)技术已经成为第四代网络的一项强大技术。新一代用户对服务质量的要求越来越高,主要表现在数据速率高、信号质量好、覆盖面积大、服务成本低等方面。LTE通过采用三种重要的多址技术来支持4G环境。三种多址技术分别是正交频分多址(OFDMA)、多输入多输出(MIMO)和单载波频分多址(SC-FDMA)技术。每种技术都有其相关的特性,这些特性使得LTE在其用户中很受欢迎。下行通道采用OFDMA和MIMO技术,上行通道采用SC-FDMA技术。本文将以误码率和信噪比为参数,考虑BPSK、QPSK、16 QAM等不同的调制方案,分析LTE中OFDMA、MIMO和SC-FDMA在物理层的性能。
{"title":"Performance analysis of OFDMA, MIMO and SC-FDMA technology in 4G LTE networks","authors":"Navita, Amandeep","doi":"10.1109/CONFLUENCE.2016.7508181","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508181","url":null,"abstract":"Long Term Evolution (LTE) has become a powerful technology for 4th Generation networks. New generation always demand a better quality of service mainly in terms of high data rate, better signal quality, large coverage area and services at low cost etc. LTE comes to support the 4G environment by adopting the three important multiple access techniques. The three multiple access techniques are Orthogonal Frequency Division Multiple Access (OFDMA), Multiple Inputs Multiple Outputs (MIMO) and Single Carrier Frequency Division Multiple Access (SC-FDMA) techniques. Each technique has its associated features that make LTE popular among its users. OFDMA and MIMO technology are used for downlink and SC-FDMA for uplink channel. In this paper, we are going to analyze the performance of OFDMA, MIMO and SC-FDMA in LTE at physical layer by considering different modulation schemes such as BPSK, QPSK, 16 QAM by using BER and SNR as parameters.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131560942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improved algorithms for construction of connected dominating set in MANETs manet中连通控制集构造的改进算法
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508182
O. Chaturvedi, Parmeet Kaur, Nishtha Ahuja, T. Prakash
The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize the entire network topology into clusters and the CDS is formed out of the nodes acting as the cluster heads (CHs). The paper proposes improvements in some existing algorithms to yield a smaller sized CDS or cause a low message overhead during CDS construction. The simulation results verify the effectiveness of the proposed algorithms as compared to the existing algorithms.
针对移动自组网中连接支配集的构造问题,提出了两种分布式算法。CDS可以用作自组织网络中有效通信的虚拟主干,从而允许为这些网络实现的分布式算法的可扩展性。提出的算法将整个网络拓扑组织成簇,CDS由作为簇头(CHs)的节点组成。本文提出了一些现有算法的改进,以产生更小的CDS或在CDS构建过程中降低消息开销。仿真结果验证了所提算法与现有算法的有效性。
{"title":"Improved algorithms for construction of connected dominating set in MANETs","authors":"O. Chaturvedi, Parmeet Kaur, Nishtha Ahuja, T. Prakash","doi":"10.1109/CONFLUENCE.2016.7508182","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508182","url":null,"abstract":"The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize the entire network topology into clusters and the CDS is formed out of the nodes acting as the cluster heads (CHs). The paper proposes improvements in some existing algorithms to yield a smaller sized CDS or cause a low message overhead during CDS construction. The simulation results verify the effectiveness of the proposed algorithms as compared to the existing algorithms.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1