Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/25722018
Ewit
Abstract—Many wireless communication systems such as IS-54, enhanced data rates for the GSM evolution (EDGE), worldwide interoperability for microwave access (WiMAX) and long term evolution (LTE) have adopted low-density parity check (LDPC), tail-biting Convolutional, and turbo codes as the forward error correcting codes (FEC) scheme for data and overhead channels. Therefore, many efficient algorithms have been proposed for decoding these codes. However, the different decoding approaches for these two families of codes usually lead to different hardware architectures. Since these codes work side by side in these new wireless systems, it is a good idea to introduce a universal decoder to handle these two families of codes. The present work exploits the parity-check matrix (H) representation of tail biting Convolution and turbo codes, thus enabling decoding via a unified belief propagation (BP) algorithm. Indeed, the BP algorithm provides a highly effective general methodology for devising low-complexity iterative decoding algorithms for all Convolution code classes as well as turbo codes. While a small performance loss is observed when decoding turbo codes with BP instead of MAP, this is offset by the lower complexity of the BP algorithm and the inherent advantage of a unified decoding architecture.
{"title":"A NEW APPROACH FOR ERROR CORRECTION DECODING BASED ON THE BP ALGORITHM IN LTE AND WIMAX SYSTEMS","authors":"Ewit","doi":"10.30534/IJCCN/2018/25722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/25722018","url":null,"abstract":"Abstract—Many wireless communication systems such as IS-54, enhanced data rates for the GSM evolution (EDGE), worldwide interoperability for microwave access (WiMAX) and long term evolution (LTE) have adopted low-density parity check (LDPC), tail-biting Convolutional, and turbo codes as the forward error correcting codes (FEC) scheme for data and overhead channels. Therefore, many efficient algorithms have been proposed for decoding these codes. However, the different decoding approaches for these two families of codes usually lead to different hardware architectures. Since these codes work side by side in these new wireless systems, it is a good idea to introduce a universal decoder to handle these two families of codes. The present work exploits the parity-check matrix (H) representation of tail biting Convolution and turbo codes, thus enabling decoding via a unified belief propagation (BP) algorithm. Indeed, the BP algorithm provides a highly effective general methodology for devising low-complexity iterative decoding algorithms for all Convolution code classes as well as turbo codes. While a small performance loss is observed when decoding turbo codes with BP instead of MAP, this is offset by the lower complexity of the BP algorithm and the inherent advantage of a unified decoding architecture.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"784-785 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/55722018
Ewit
Cloud computing is used to achieve an effective and economical approach for data sharing among group members with the characters of low maintenance and little management cost. Sharing data while providing privacy-preserving is still a challenging issue, especially for an entrusted cloud due to the collusion attack. First, a secured way for key distribution without any secure communication channels is created. Second, can achieve fine-grained access control. Third, we can protect the scheme from collusion attack. Finally, fine efficiency is achieved which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
{"title":"A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD","authors":"Ewit","doi":"10.30534/ijccn/2018/55722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/55722018","url":null,"abstract":"Cloud computing is used to achieve an effective and economical approach for data sharing among group members with the characters of low maintenance and little management cost. Sharing data while providing privacy-preserving is still a challenging issue, especially for an entrusted cloud due to the collusion attack. First, a secured way for key distribution without any secure communication channels is created. Second, can achieve fine-grained access control. Third, we can protect the scheme from collusion attack. Finally, fine efficiency is achieved which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126321228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/10722018
Ewit
This paper presents an intelligent system allowing handicapped aphasiacs to perform basic communication tasks. It has the following features:A 2-sensor data measures the hand gestures of a patient in terms of the bending degrees of his hands,A hand language recognition subsystem recognizes language components from the hand gestures. It employs multiple regression analysis to automatically extract proper hand features so that the recognition model can be fast and correctly constructed by a radial basis function neural network,A coordinate-indexed virtual keyboard allows the users to directly access the letters on the keyboard at a practical speed. The system serves as a viable tool for natural and affordable communication for handicapped aphasiacs through continuous hand language input.
{"title":"Audio/Text Aided System Using Sign Language","authors":"Ewit","doi":"10.30534/IJCCN/2018/10722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/10722018","url":null,"abstract":"This paper presents an intelligent system allowing handicapped aphasiacs to perform basic communication tasks. It has the following features:A 2-sensor data measures the hand gestures of a patient in terms of the bending degrees of his hands,A hand language recognition subsystem recognizes language components from the hand gestures. It employs multiple regression analysis to automatically extract proper hand features so that the recognition model can be fast and correctly constructed by a radial basis function neural network,A coordinate-indexed virtual keyboard allows the users to directly access the letters on the keyboard at a practical speed. The system serves as a viable tool for natural and affordable communication for handicapped aphasiacs through continuous hand language input.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/43722018
Ewit
: Geosocial Network information can be provided as service for the users to take decisions for the events that occurs in the real-world like earth quakes, bombblast, and fire and also other events occurred in the different places in the world. After analyzing the data the user can able to take decisions for the real-time to predict for the future which are the places that will be affected by the particular events.We propose a system that should be able to handle the data generated by the different sensors in a secure manner the data sent by the sensors will be stored in the encrypted format in the Geo-social network. When the user is searching for the particular event that occurred the user need to decrypt the data before using the information . Twitter is analyzed using the proposed system to recognize the events like earth quakes, fire, Bomb related data. We are using the Hadoop system for analysis of the big-data generating by the different sensors.
{"title":"SECURE ANALYSIS OF SENSOR DATA IN BIG-DATA PLATFORM FOR GEO-SOCIAL NETWORK","authors":"Ewit","doi":"10.30534/ijccn/2018/43722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/43722018","url":null,"abstract":": Geosocial Network information can be provided as service for the users to take decisions for the events that occurs in the real-world like earth quakes, bombblast, and fire and also other events occurred in the different places in the world. After analyzing the data the user can able to take decisions for the real-time to predict for the future which are the places that will be affected by the particular events.We propose a system that should be able to handle the data generated by the different sensors in a secure manner the data sent by the sensors will be stored in the encrypted format in the Geo-social network. When the user is searching for the particular event that occurred the user need to decrypt the data before using the information . Twitter is analyzed using the proposed system to recognize the events like earth quakes, fire, Bomb related data. We are using the Hadoop system for analysis of the big-data generating by the different sensors.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/49722018
Ewit
{"title":"Characterization of Health Data using Neural Network and Routing in Health Monitoring","authors":"Ewit","doi":"10.30534/ijccn/2018/49722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/49722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/23722018
Ewit
{"title":"NAVIGATION OF CATAMARAN USING WIRELESS TECHNOLOGY","authors":"Ewit","doi":"10.30534/ijccn/2018/23722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/23722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122886065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/34722018
Ewit
{"title":"Health Monitoring System Using IoT and Raspberry Pi","authors":"Ewit","doi":"10.30534/ijccn/2018/34722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/34722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/20722018
Ewit
Cloud storage benefit has critical points of interest on both advantageous information sharing and cost lessening. Therefore, an ever increasing number of endeavors and people outsource their information to the cloud to be profited from this administration. Nonetheless, this new worldview of information stockpiling postures new difficulties on information secrecy conservation. As cloud benefit isolates the information from the cloud benefit customer (people or substances), denying their immediate control over these information, the information proprietor can't believe the cloud server to lead secure information get to control. In this way, the safe access control issue has turned into a testing issue out in the open cloud storage.
{"title":"ACCESS CONTROL FOR TIME SENSITIVE DATA BY USING TIME AND ATTRIBUTE FACTORS IN PUBLIC CLOUD","authors":"Ewit","doi":"10.30534/ijccn/2018/20722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/20722018","url":null,"abstract":"Cloud storage benefit has critical points of interest on both advantageous information sharing and cost lessening. Therefore, an ever increasing number of endeavors and people outsource their information to the cloud to be profited from this administration. Nonetheless, this new worldview of information stockpiling postures new difficulties on information secrecy conservation. As cloud benefit isolates the information from the cloud benefit customer (people or substances), denying their immediate control over these information, the information proprietor can't believe the cloud server to lead secure information get to control. In this way, the safe access control issue has turned into a testing issue out in the open cloud storage.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/30722018
Ewit
Deep web is termed as data present on web but inaccessible to search engine. Due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. Smart crawler for hidden web interfaces consist of mainly two stages, first is site locating another is in-site exploring. Site locating starts from seed sites and obtains relevant websites through reverse searching and obtains relevant sites through feature space of URL, anchor and text around URL. Second stage takes input from site locating and goes to find relevant link from those sites. The adaptive link learner is used to find out relevant links with help of link priority and link rank.. To eliminate bias on visiting some highly relevant links in hidden web directories, we design a link tree data structure to achieve wider coverage for a website.
{"title":"IMPLEMENTATION OF SMARTCRAWLER FOR DEEP-WEB SITES","authors":"Ewit","doi":"10.30534/ijccn/2018/30722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/30722018","url":null,"abstract":"Deep web is termed as data present on web but inaccessible to search engine. Due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. Smart crawler for hidden web interfaces consist of mainly two stages, first is site locating another is in-site exploring. Site locating starts from seed sites and obtains relevant websites through reverse searching and obtains relevant sites through feature space of URL, anchor and text around URL. Second stage takes input from site locating and goes to find relevant link from those sites. The adaptive link learner is used to find out relevant links with help of link priority and link rank.. To eliminate bias on visiting some highly relevant links in hidden web directories, we design a link tree data structure to achieve wider coverage for a website.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117028791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/19722018
Ewit
{"title":"DENSITY BASED TRAFFIC SIGNAL CONTROL WITH POWER SAVER STREET LIGHT","authors":"Ewit","doi":"10.30534/IJCCN/2018/19722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/19722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115696279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}