Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062727
S. Saranraj, N. Venkateswaran
Enhancement of text information from the images captured by mobile camera is a very challenging task due to the high variation between the background and the foreground that contains shadows, poor contrast and non uniform illumination. In this paper, denoising along with binarization algorithm that uses phase congruency features is proposed to extract the text information from the document images. In the pre-processing step, the image is de-noised to preserve all features present in the document image. In the next step, the phase congruency map is obtained from the document image and it is combined with the image obtained in the pre-processing step. The post-processing step is to improve the quality of the texts by using morphological operations. Experimental results shows that the proposed method performs well in enhancing the document images captured using hand held devices.
{"title":"Enhancement of hand held device captured document images with phase preservation","authors":"S. Saranraj, N. Venkateswaran","doi":"10.1109/CNT.2014.7062727","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062727","url":null,"abstract":"Enhancement of text information from the images captured by mobile camera is a very challenging task due to the high variation between the background and the foreground that contains shadows, poor contrast and non uniform illumination. In this paper, denoising along with binarization algorithm that uses phase congruency features is proposed to extract the text information from the document images. In the pre-processing step, the image is de-noised to preserve all features present in the document image. In the next step, the phase congruency map is obtained from the document image and it is combined with the image obtained in the pre-processing step. The post-processing step is to improve the quality of the texts by using morphological operations. Experimental results shows that the proposed method performs well in enhancing the document images captured using hand held devices.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062776
U. Barakkath Nisha, N. Maheswari, R. Venkatesh, R. Yasir Abdullah
Data inaccuracy is an important problem in wireless sensor networks, since the accuracy is affected by harsh environments and malicious nodes. The reason for this data inaccuracy is the improper identification of outliers. To detect exact outliers in the wireless sensor networks, we propose the relative correlation based clustering (RCC) technique with high data accuracy and low computational overhead. Identifying spatial, temporal correlation and attribute correlation is the first phase of the proposed algorithm. The second phase is optimal cluster formation and outlier classification based on two correlation levels. The inference of the proposed idea shows high outlier detection rate with different outlier corruption level. Moreover, our results when compared with previous approach taking the same data into consideration clearly outperform them, identifying high level of detection rate (99.87%) in the top-line with near to the ground false alarm rate.
{"title":"Robust estimation of incorrect data using relative correlation clustering technique in wireless sensor networks","authors":"U. Barakkath Nisha, N. Maheswari, R. Venkatesh, R. Yasir Abdullah","doi":"10.1109/CNT.2014.7062776","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062776","url":null,"abstract":"Data inaccuracy is an important problem in wireless sensor networks, since the accuracy is affected by harsh environments and malicious nodes. The reason for this data inaccuracy is the improper identification of outliers. To detect exact outliers in the wireless sensor networks, we propose the relative correlation based clustering (RCC) technique with high data accuracy and low computational overhead. Identifying spatial, temporal correlation and attribute correlation is the first phase of the proposed algorithm. The second phase is optimal cluster formation and outlier classification based on two correlation levels. The inference of the proposed idea shows high outlier detection rate with different outlier corruption level. Moreover, our results when compared with previous approach taking the same data into consideration clearly outperform them, identifying high level of detection rate (99.87%) in the top-line with near to the ground false alarm rate.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062747
Atlee Fernandes, Rakesh Helawar, R. Lokesh, Tushar Tari, Ashwini Shahapurkar
Stress is a response to mental/emotional or physical aspects that is encountered in daily life. In order to manage stress, it is required to monitor the stress levels on continuous basis. Individual physiological parameters such as Galvanic Skin Response (GSR), Heart Rate (HR), Blood Pressure (BP), ECG (Electrocardiography) and respiration activity can be used as a measure to determine stress. But, the accuracy of determination is limited by using individual parameters. Usage of multiple parameters aids in better determination of stress. A combination of parameters such as GSR and Blood Pressure further increases the accuracy. The paper signifies better detection of stress by using GSR and BP.
{"title":"Determination of stress using Blood Pressure and Galvanic Skin Response","authors":"Atlee Fernandes, Rakesh Helawar, R. Lokesh, Tushar Tari, Ashwini Shahapurkar","doi":"10.1109/CNT.2014.7062747","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062747","url":null,"abstract":"Stress is a response to mental/emotional or physical aspects that is encountered in daily life. In order to manage stress, it is required to monitor the stress levels on continuous basis. Individual physiological parameters such as Galvanic Skin Response (GSR), Heart Rate (HR), Blood Pressure (BP), ECG (Electrocardiography) and respiration activity can be used as a measure to determine stress. But, the accuracy of determination is limited by using individual parameters. Usage of multiple parameters aids in better determination of stress. A combination of parameters such as GSR and Blood Pressure further increases the accuracy. The paper signifies better detection of stress by using GSR and BP.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062717
C. Sridhar, G. Mahadevan, P. Deepthi
A horizontal polarized, tri-band antenna for RF energy harvesting applications is presented. A simple meander inverted-F antenna (MIFA) with size of 34mm×17mm×8mm is proposed in this paper. The radiating patch is folded at one end and etched with three slits to create multiple resonant frequency bands. The antenna covers following frequency bands: Global System for Mobile communication (GSM900MHz, 880-960 MHz)/Digital Communication System (DCS1800MHz, 1710-1880 MHz)/WiFi (2450MHz, 2400-2480 MHz).The proposed antenna has been designed and analyzed by using High Frequency Structure Simulator (HFSS). The antenna shows good measured performance of -0.2dBi at 1.5GHz and -0.4dBi at 1.61GHz and 1.7GHz.
{"title":"Inverted-F antenna with meander line antenna for energy harvesting","authors":"C. Sridhar, G. Mahadevan, P. Deepthi","doi":"10.1109/CNT.2014.7062717","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062717","url":null,"abstract":"A horizontal polarized, tri-band antenna for RF energy harvesting applications is presented. A simple meander inverted-F antenna (MIFA) with size of 34mm×17mm×8mm is proposed in this paper. The radiating patch is folded at one end and etched with three slits to create multiple resonant frequency bands. The antenna covers following frequency bands: Global System for Mobile communication (GSM900MHz, 880-960 MHz)/Digital Communication System (DCS1800MHz, 1710-1880 MHz)/WiFi (2450MHz, 2400-2480 MHz).The proposed antenna has been designed and analyzed by using High Frequency Structure Simulator (HFSS). The antenna shows good measured performance of -0.2dBi at 1.5GHz and -0.4dBi at 1.61GHz and 1.7GHz.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062737
V. Subhashree, C. Tharini, M. Swarna Lakshmi
Energy efficient Routing algorithms for wireless sensor network play a vital role among many other algorithms for improving lifetime of sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the major hierarchical routing protocols for WSNs, in which cluster heads are randomly elected. In this paper, a Modified LEACH algorithm is proposed to maximize the lifetime of the network. The network is partitioned into clusters using simulated annealing technique. The cluster head and next heads are chosen by the base station based on their residual energy. Unlike LEACH, re-clustering is not done after completion of each round. Re-clustering is done once the energy of the elected heads goes below the threshold. This in turn reduces the node and network failure, thus making the network fault-tolerant. The QoS parameters such as throughput, packet delivery ratio, delay and network lifetime are metrics used to measure the performance of Modified LEACH. Simulation results show that Modified LEACH outperforms the LEACH protocol and the AODV protocol.
{"title":"Modified LEACH: A QoS-aware clustering algorithm for Wireless Sensor Networks","authors":"V. Subhashree, C. Tharini, M. Swarna Lakshmi","doi":"10.1109/CNT.2014.7062737","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062737","url":null,"abstract":"Energy efficient Routing algorithms for wireless sensor network play a vital role among many other algorithms for improving lifetime of sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the major hierarchical routing protocols for WSNs, in which cluster heads are randomly elected. In this paper, a Modified LEACH algorithm is proposed to maximize the lifetime of the network. The network is partitioned into clusters using simulated annealing technique. The cluster head and next heads are chosen by the base station based on their residual energy. Unlike LEACH, re-clustering is not done after completion of each round. Re-clustering is done once the energy of the elected heads goes below the threshold. This in turn reduces the node and network failure, thus making the network fault-tolerant. The QoS parameters such as throughput, packet delivery ratio, delay and network lifetime are metrics used to measure the performance of Modified LEACH. Simulation results show that Modified LEACH outperforms the LEACH protocol and the AODV protocol.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062748
A. Deepa, S. Niyas, M. Sasikumar
This paper aims for the development of a highly efficient computer aided decision system to automatically detect abnormalities in mammograms. Enhancement of the contrast of the intensity image by transforming the values using Contrast Limited Adaptive Histogram Equalization (CLAHE) is done for preprocessing of images after classifying the mammograms into various intensity levels. Then mathematical morphology is used for the extraction of abnormalities which are located on a non uniform background. After performing the thresholding of the image by extended maxima transformation by using adaptive H-domes transformation feature extraction is performed. Transformation constant (h) is based on the breast density of the mammogram considered. The Feature extraction is focused on the extraction of GLCM based statistical features of the objects. Finally the extracted objects are classified using Naive Baye's Classifier and abnormalities are detected. SVM classifier is also employed to classify the mammogram whether it is suspicious or not.
{"title":"An adaptive approach for computer aided screening of mammograms and classification of abnormalities","authors":"A. Deepa, S. Niyas, M. Sasikumar","doi":"10.1109/CNT.2014.7062748","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062748","url":null,"abstract":"This paper aims for the development of a highly efficient computer aided decision system to automatically detect abnormalities in mammograms. Enhancement of the contrast of the intensity image by transforming the values using Contrast Limited Adaptive Histogram Equalization (CLAHE) is done for preprocessing of images after classifying the mammograms into various intensity levels. Then mathematical morphology is used for the extraction of abnormalities which are located on a non uniform background. After performing the thresholding of the image by extended maxima transformation by using adaptive H-domes transformation feature extraction is performed. Transformation constant (h) is based on the breast density of the mammogram considered. The Feature extraction is focused on the extraction of GLCM based statistical features of the objects. Finally the extracted objects are classified using Naive Baye's Classifier and abnormalities are detected. SVM classifier is also employed to classify the mammogram whether it is suspicious or not.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134566428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062777
R. K. Jha, Farida Khurshid
The field of Network Security and the subfield of cryptographic protocols are both vast and continually evolving and expanding fields. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. Secure socket layer (SSL) protocol establish secure session between client and server after authenticating both of them. The critical factor which decides the performance of the server is the SSL connection. When no. of SSL connection on the server is raised, the throughput will be decreased. According to the standard SSL protocol, an enhanced model of SSL combines Diffie-Hellman algorithm is implemented and its performance are measured on network simulator by considering various parameters like Packet Delivery Ratio (PDR), Throughput, Delay and Node Energy. The performance of SSL combines Diffie-Hellman algorithm is compared with the existing SSL protocol, Adhoc ondemand distance vector (AODV) under Denial of service (DOS) attack. SSL combines Diffie-Hellman algorithm will reduce the delay, node energy and enhance the PDR of the server so that it can handle more no. of client and server when no. of SSL connection is raised. SSL is one of the most common protocols used for secure communication over the internet. Users have grown to trust SSL and are prone to overlook visual clues that could indicate a security breach. But SSL is vulnerable to man in the middle attacks also.
{"title":"Performance analysis of enhanced secure socket layer protocol","authors":"R. K. Jha, Farida Khurshid","doi":"10.1109/CNT.2014.7062777","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062777","url":null,"abstract":"The field of Network Security and the subfield of cryptographic protocols are both vast and continually evolving and expanding fields. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. Secure socket layer (SSL) protocol establish secure session between client and server after authenticating both of them. The critical factor which decides the performance of the server is the SSL connection. When no. of SSL connection on the server is raised, the throughput will be decreased. According to the standard SSL protocol, an enhanced model of SSL combines Diffie-Hellman algorithm is implemented and its performance are measured on network simulator by considering various parameters like Packet Delivery Ratio (PDR), Throughput, Delay and Node Energy. The performance of SSL combines Diffie-Hellman algorithm is compared with the existing SSL protocol, Adhoc ondemand distance vector (AODV) under Denial of service (DOS) attack. SSL combines Diffie-Hellman algorithm will reduce the delay, node energy and enhance the PDR of the server so that it can handle more no. of client and server when no. of SSL connection is raised. SSL is one of the most common protocols used for secure communication over the internet. Users have grown to trust SSL and are prone to overlook visual clues that could indicate a security breach. But SSL is vulnerable to man in the middle attacks also.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123527356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062732
P. Sophia, N. Venkateswaran
In this paper, we present a new approach to image segmentation that is based on Markov random fields and Maximum a posteriori rule. Segmentation of an image is a challenging task especially in low contrast images, blurred images and noisy images. Most of the segmentation techniques are based only on the gray scale intensity of the image and yield poor results when applied to images with sophisticated background and high degree fuzziness. The MRF based segmentation method gives a priori information of the local structure contained in the image to get better segmentation accuracy. This proposed algorithm gives a promising solution to image segmentation and it is also robust to noise and blur.
{"title":"Efficient Image Segmentation Method Based on Probabilistic Markov Random Field Model","authors":"P. Sophia, N. Venkateswaran","doi":"10.1109/CNT.2014.7062732","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062732","url":null,"abstract":"In this paper, we present a new approach to image segmentation that is based on Markov random fields and Maximum a posteriori rule. Segmentation of an image is a challenging task especially in low contrast images, blurred images and noisy images. Most of the segmentation techniques are based only on the gray scale intensity of the image and yield poor results when applied to images with sophisticated background and high degree fuzziness. The MRF based segmentation method gives a priori information of the local structure contained in the image to get better segmentation accuracy. This proposed algorithm gives a promising solution to image segmentation and it is also robust to noise and blur.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122027029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062754
S. Selva Nidhyananthan, R. Shantha Selvakumari, V. Shenbagalakshmi
Speech is the effective form of communication between human and its environment. Speech also has potential of being important mode of interaction with computer. This review paper deals with both speech and speaker recognition of persons with speech motor disorders. Normally speaker recognition consists of speaker verification and speaker identification. Speaker identification is the process of determining which registered speaker provides a given input sample. Speaker verification is the process of accepting or rejecting the identity claim of a speaker. On the other hand, the speech recognition system deals with the following challenges such as speech representation, feature extraction techniques, speech classifiers, databases and performance evaluation. Motor speech disorders are a class of speech disorder that disturbs the body's natural ability to speak. These disturbances vary in their etiology based on the integrity and integration of cognitive, neuromuscular, and musculoskeletal activities. There are various types of speech disorders like Apraxia, Cluttering (similar to stuttering), Dyspraxia, Dysarthria, Dysprosody and so on. The main objective of this review paper is to summarize and compare the well known methods used in various stages of speech and speaker recognition system.
{"title":"Contemporary speech/speaker recognition with speech from impaired vocal apparatus","authors":"S. Selva Nidhyananthan, R. Shantha Selvakumari, V. Shenbagalakshmi","doi":"10.1109/CNT.2014.7062754","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062754","url":null,"abstract":"Speech is the effective form of communication between human and its environment. Speech also has potential of being important mode of interaction with computer. This review paper deals with both speech and speaker recognition of persons with speech motor disorders. Normally speaker recognition consists of speaker verification and speaker identification. Speaker identification is the process of determining which registered speaker provides a given input sample. Speaker verification is the process of accepting or rejecting the identity claim of a speaker. On the other hand, the speech recognition system deals with the following challenges such as speech representation, feature extraction techniques, speech classifiers, databases and performance evaluation. Motor speech disorders are a class of speech disorder that disturbs the body's natural ability to speak. These disturbances vary in their etiology based on the integrity and integration of cognitive, neuromuscular, and musculoskeletal activities. There are various types of speech disorders like Apraxia, Cluttering (similar to stuttering), Dyspraxia, Dysarthria, Dysprosody and so on. The main objective of this review paper is to summarize and compare the well known methods used in various stages of speech and speaker recognition system.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/CNT.2014.7062775
Arthi Balasundaram, L. Rajesh
Game theory is a multi-agent decision theory, modelling rational, utility-maximizing agents whose actions affect one another's utilities. Its techniques have been widely applied to various engineering design problems in which the action of one component has impact on that of any other component. A brief survey on game theory for beginners is presented in this paper. The applications of game theory in wireless networking is collected and described them in a layered perspective, emphasizing on which fields game theory could be effectively applied. To this end, an extensive game model is simulated and their key features are exposed.
{"title":"A survey on game theoretic approach in wireless networks","authors":"Arthi Balasundaram, L. Rajesh","doi":"10.1109/CNT.2014.7062775","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062775","url":null,"abstract":"Game theory is a multi-agent decision theory, modelling rational, utility-maximizing agents whose actions affect one another's utilities. Its techniques have been widely applied to various engineering design problems in which the action of one component has impact on that of any other component. A brief survey on game theory for beginners is presented in this paper. The applications of game theory in wireless networking is collected and described them in a layered perspective, emphasizing on which fields game theory could be effectively applied. To this end, an extensive game model is simulated and their key features are exposed.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"93 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}