首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
Design of high gain Wang shape microstrip patch antenna for wireless system 无线系统中高增益王氏微带贴片天线的设计
S. Sharma
In this paper, a novel Wang shape slotted microstrip patch antenna with high gain is presented and discussed. The proposed design offers low profile, very high gain and compact antenna element. The maximum gain is 12 dBi to 12.60 dBi from 1.82 GHz to 1.99GHz, antenna and radiation efficiency are more than 90% and bandwidth is 9% from 1.82GHz to 1.99GHz .The proposed design is suitable particular for wireless communication application such as WiFi and WLAN.
本文提出并讨论了一种新型的具有高增益的Wang型开槽微带贴片天线。提出的设计提供了低轮廓,非常高的增益和紧凑的天线元件。在1.82 ~ 1.99GHz范围内,最大增益为12dbi ~ 12.60 dBi,在1.82 ~ 1.99GHz范围内,天线和辐射效率均大于90%,带宽为9%,特别适合WiFi、WLAN等无线通信应用。
{"title":"Design of high gain Wang shape microstrip patch antenna for wireless system","authors":"S. Sharma","doi":"10.1109/ICCCNT.2012.6396026","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396026","url":null,"abstract":"In this paper, a novel Wang shape slotted microstrip patch antenna with high gain is presented and discussed. The proposed design offers low profile, very high gain and compact antenna element. The maximum gain is 12 dBi to 12.60 dBi from 1.82 GHz to 1.99GHz, antenna and radiation efficiency are more than 90% and bandwidth is 9% from 1.82GHz to 1.99GHz .The proposed design is suitable particular for wireless communication application such as WiFi and WLAN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context based domain identification for resolving ambiguity 用于解决歧义的基于上下文的域识别
P. Saktel, U. Shrawankar
Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.
基于上下文的领域识别是一项从句子中识别单词的正确领域的任务。领域识别是一种基于句子语境的词语歧义识别方法。语境是意义及其句子的独特证明。因此,解决了使用这种独特的实用程序的歧义。本文讨论了这三个阶段,描述了之前的工作和建议的工作。本文简要介绍了第二阶段。第二阶段描述了用于识别域的技术。在识别后,解释了如何训练系统选择正确的域。最后给出了相关结果。本文阐述了消歧义的作用,它有助于人们理解句子的意思。
{"title":"Context based domain identification for resolving ambiguity","authors":"P. Saktel, U. Shrawankar","doi":"10.1109/ICCCNT.2012.6396060","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396060","url":null,"abstract":"Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced route discovery in Mobile Adhoc Networks 移动Adhoc网络中增强的路由发现
S. Ali
Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes. In MANET nodes are self-motivated topologies can arbitrarily change their geographic locations. MANET consists of wireless links with considerable bandwidth. Packet delivery needs routing protocol to transmit a packet from source to destination. In such a network, nodes move, the established paths may break and the routing protocols must dynamically search for other feasible routes. Numerous protocols have been developed for mobile ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth and high error rates. These MANETs routing protocols are categorized in to Proactive Routing Protocols (PRP), Reactive Routing Protocols (RRP) and Hybrid Routing Protocols (HRP). This paper presents routing in wireless mobile ad-hoc networks using Destination Sequenced Distance Vector (DSDV) and Ad-hoc on demand Distance Vector (AODV) protocols. The performance of bandwidth, throughput and packet loss of DSDV and AODV has been modeled under various network configurations and mobility conditions. These mechanics can lead to significant performance differentials. The results are justified through NS-2 simulation.
移动自组网(MANET)是无线移动节点的集合。在MANET中,节点是自激励的拓扑结构,可以任意改变其地理位置。MANET由具有相当带宽的无线链路组成。报文传输需要路由协议来将报文从源端传输到目的端。在这样的网络中,节点移动,已经建立的路径可能会中断,路由协议必须动态地寻找其他可行的路由。已经为移动自组织移动网络开发了许多协议。这些协议必须处理这些网络的典型限制,包括高功耗、低带宽和高错误率。这些manet路由协议分为主动路由协议(PRP)、被动路由协议(RRP)和混合路由协议(HRP)。本文介绍了无线移动自组网中使用目的地顺序距离矢量(DSDV)和自组网按需距离矢量(AODV)协议的路由问题。对DSDV和AODV在各种网络配置和移动条件下的带宽、吞吐量和丢包性能进行了建模。这些机制可能导致显著的性能差异。通过NS-2仿真验证了结果的正确性。
{"title":"Enhanced route discovery in Mobile Adhoc Networks","authors":"S. Ali","doi":"10.1109/ICCCNT.2012.6395894","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395894","url":null,"abstract":"Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes. In MANET nodes are self-motivated topologies can arbitrarily change their geographic locations. MANET consists of wireless links with considerable bandwidth. Packet delivery needs routing protocol to transmit a packet from source to destination. In such a network, nodes move, the established paths may break and the routing protocols must dynamically search for other feasible routes. Numerous protocols have been developed for mobile ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth and high error rates. These MANETs routing protocols are categorized in to Proactive Routing Protocols (PRP), Reactive Routing Protocols (RRP) and Hybrid Routing Protocols (HRP). This paper presents routing in wireless mobile ad-hoc networks using Destination Sequenced Distance Vector (DSDV) and Ad-hoc on demand Distance Vector (AODV) protocols. The performance of bandwidth, throughput and packet loss of DSDV and AODV has been modeled under various network configurations and mobility conditions. These mechanics can lead to significant performance differentials. The results are justified through NS-2 simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Wireless sensor network for river water quality monitoring in India 印度用于河流水质监测的无线传感器网络
K. A. Menon, D. P, M. Ramesh
Water is an important natural resource which needs constant quality monitoring for ensuring its safe use. This paper introduces a river water quality monitoring system based on wireless sensor network which helps in continuous and remote monitoring of the water quality data in India. The wireless sensor node in the system is designed for monitoring the pH of water, which is one of the main parameters that affect the quality of water. The proposed sensor node design mainly comprises of a signal conditioning module, processing module, wireless communication module and the power module. The sensed pH value will be wirelessly transmitted to the base station using Zigbee communication after the required signal conditioning and processing techniques. The circuit for the sensor node is designed, simulated and the hardware prototype is developed using the appropriate components which minimize the power requirement of the system and provides a cost effective platform for monitoring water quality.
水是一种重要的自然资源,需要持续监测水质以确保其安全使用。本文介绍了一种基于无线传感器网络的河流水质监测系统,实现了印度水质数据的连续远程监测。系统中的无线传感器节点是为了监测水的pH值而设计的,pH值是影响水质的主要参数之一。本文提出的传感器节点设计主要包括信号调理模块、处理模块、无线通信模块和电源模块。测得的pH值经过所需的信号调理和处理技术后,利用Zigbee通信无线传输到基站。对传感器节点的电路进行了设计、仿真,并使用合适的组件开发了硬件原型,从而最大限度地降低了系统的功耗要求,并为水质监测提供了一个具有成本效益的平台。
{"title":"Wireless sensor network for river water quality monitoring in India","authors":"K. A. Menon, D. P, M. Ramesh","doi":"10.1109/ICCCNT.2012.6512437","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6512437","url":null,"abstract":"Water is an important natural resource which needs constant quality monitoring for ensuring its safe use. This paper introduces a river water quality monitoring system based on wireless sensor network which helps in continuous and remote monitoring of the water quality data in India. The wireless sensor node in the system is designed for monitoring the pH of water, which is one of the main parameters that affect the quality of water. The proposed sensor node design mainly comprises of a signal conditioning module, processing module, wireless communication module and the power module. The sensed pH value will be wirelessly transmitted to the base station using Zigbee communication after the required signal conditioning and processing techniques. The circuit for the sensor node is designed, simulated and the hardware prototype is developed using the appropriate components which minimize the power requirement of the system and provides a cost effective platform for monitoring water quality.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security of cloud computing system using object oriented technique 基于面向对象技术的云计算系统安全
S. Shukla, Rakesh Kumar Singh
Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.
云计算是一种新兴的技术。它已经作为一种替代计算环境出现,其中基于web的服务允许不同类型的用户获得各种各样的资源,例如软件和硬件。云计算提供了一种通过互联网共享属于不同组织的大量分布式资源的方式,因此容易出现几种类型的安全风险。因此,系统的安全需求分析方法和过程是必不可少的。针对云计算系统的威胁、风险和漏洞,应制定多层次的安全策略。本文讨论了一种高阶面向对象的鲁棒安全策略构建技术和方法,使云系统更加可靠可信。
{"title":"Security of cloud computing system using object oriented technique","authors":"S. Shukla, Rakesh Kumar Singh","doi":"10.1109/ICCCNT.2012.6395865","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395865","url":null,"abstract":"Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Load frequency control using battery energy storage system in interconnected power system 基于电池储能系统的互联电力系统负荷频率控制
S. Kalyani, S. Nagalakshmi, R. Marisha
The main objective of Load Frequency Control (LFC) is to regulate the power output of the generator within an area in response to changes in system frequency and tie-line loading. LFC helps in maintaining the scheduled system frequency and tie-line power interchange with the other areas within the prescribed limits. The conventional controllers are slow and do not allow the controller designer to take into account possible changes in operating condition and non-linearities in the generator unit. When there is a variation in the load demand on a generating unit, there is a momenterial occurrence of unbalance between real power input and output. To compensate this power imbalance, an external Battery Energy Storage (BES) system is incorporated. Frequency oscillations due to large load disturbance can be effectively damped by fast acting energy storage devices such as Battery Energy Storage systems. The energy storage devices share the sudden changes in power requirement in the load. This paper presents the qualitative and quantitative comparison of conventional controllers and BES system in Load Frequency Control (LFC) of a typical two area interconnected power system. The superiority of the performance of BES over conventional controllers is highlighted and discussed in this paper.
负荷频率控制(LFC)的主要目标是根据系统频率和联络线负荷的变化来调节一个区域内发电机的输出功率。LFC有助维持订明的系统频率及与其他地区的接线电力交换在订明的范围内。传统的控制器速度很慢,不能让控制器设计者考虑到发电机组运行条件的可能变化和非线性。当发电机组的负荷需求发生变化时,实际输入和输出功率之间会出现短暂的不平衡。为了补偿这种功率不平衡,采用了外部电池储能系统(BES)。快速储能装置(如电池储能系统)可以有效地抑制由负载扰动引起的频率振荡。储能设备可以分担负载中电力需求的突然变化。本文对典型两区互联电力系统的负荷频率控制(LFC)进行了常规控制器和BES系统的定性和定量比较。本文着重讨论了BES相对于传统控制器的优越性。
{"title":"Load frequency control using battery energy storage system in interconnected power system","authors":"S. Kalyani, S. Nagalakshmi, R. Marisha","doi":"10.1109/ICCCNT.2012.6396052","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396052","url":null,"abstract":"The main objective of Load Frequency Control (LFC) is to regulate the power output of the generator within an area in response to changes in system frequency and tie-line loading. LFC helps in maintaining the scheduled system frequency and tie-line power interchange with the other areas within the prescribed limits. The conventional controllers are slow and do not allow the controller designer to take into account possible changes in operating condition and non-linearities in the generator unit. When there is a variation in the load demand on a generating unit, there is a momenterial occurrence of unbalance between real power input and output. To compensate this power imbalance, an external Battery Energy Storage (BES) system is incorporated. Frequency oscillations due to large load disturbance can be effectively damped by fast acting energy storage devices such as Battery Energy Storage systems. The energy storage devices share the sudden changes in power requirement in the load. This paper presents the qualitative and quantitative comparison of conventional controllers and BES system in Load Frequency Control (LFC) of a typical two area interconnected power system. The superiority of the performance of BES over conventional controllers is highlighted and discussed in this paper.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Iterative TD-BPM for modeling ultrashort pulse in z-variant optical structures 变z光学结构中超短脉冲的迭代TD-BPM建模
M. S. Akond, H. M. Masoudi
In this work, the Iterative Time Domain Beam Propagation Method (TD-BPM) has been implemented in the propagation of femtosecond pulsed beam inside two dimensional Y-junction. Being an implicit technique, it is free from Courant-Friedrichs-Lewy (CFL) stability criteria. Moreover, the mesh grid (Δx) and the propagation step (Δz) sizes are much more relaxed compared to the explicit one, such as the Finite Difference Time Domain (FDTD)technique. In order to verify the result, the FDTD has been implemented on the same problem and the result has been compared. The comparison shows a good agreement between the techniques.
本文将迭代时域波束传播方法应用于飞秒脉冲波束在二维y型结内的传播。作为一种隐式技术,它不受CFL (Courant-Friedrichs-Lewy)稳定性判据的约束。此外,网格(Δx)和传播步长(Δz)的大小比显式的要宽松得多,例如时域有限差分(FDTD)技术。为了验证结果,对同一问题进行了时域有限差分实现,并对结果进行了比较。对比结果表明,两种技术具有较好的一致性。
{"title":"Iterative TD-BPM for modeling ultrashort pulse in z-variant optical structures","authors":"M. S. Akond, H. M. Masoudi","doi":"10.1109/ICCCNT.2012.6396087","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396087","url":null,"abstract":"In this work, the Iterative Time Domain Beam Propagation Method (TD-BPM) has been implemented in the propagation of femtosecond pulsed beam inside two dimensional Y-junction. Being an implicit technique, it is free from Courant-Friedrichs-Lewy (CFL) stability criteria. Moreover, the mesh grid (Δx) and the propagation step (Δz) sizes are much more relaxed compared to the explicit one, such as the Finite Difference Time Domain (FDTD)technique. In order to verify the result, the FDTD has been implemented on the same problem and the result has been compared. The comparison shows a good agreement between the techniques.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database intrusion detection by transaction signature 基于事务签名的数据库入侵检测
Y. Rathod, M. Chaudhari, G. Jethava
In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.
本文提出了一种用于数据库管理系统的入侵检测系统的方法,该方法主要关注数据库管理系统允许的事务的安全策略。我们的方法旨在挖掘使用数据库执行的合法事务的审计日志,并根据安全策略为合法事务生成签名。不符合有效交易签名的交易被认定为恶意交易。由于数据库管理系统现有的安全机制不足以检测入侵行为,特权用户或未经授权的用户会执行恶意事务来访问关键数据。因此,在数据库管理系统中加入侵入式检测技术可以增强系统的安全性。
{"title":"Database intrusion detection by transaction signature","authors":"Y. Rathod, M. Chaudhari, G. Jethava","doi":"10.1109/ICCCNT.2012.6395997","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395997","url":null,"abstract":"In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Pattern reconfigurable Ultra Wideband thin antenna 方向图可重构超宽带薄天线
R. Shobanasree, S. Radha, P. H. Rao
An Ultra Wideband (UWB) monopole antenna on a shaped ground plane is presented. This compact and thin antenna operates from 3.1 to 10.6 GHz. The radiating element is created by stitching the conductive thread instead of the copper metallization. The ground plane is created by using a Liquid Crystal Polymer (LCP)material(ε r=2.9). The substrate of the designed antenna is made from jeans fabric (ε r=1.7) while the radiating element is made from stainless steel coated conductive thread. By changing the shaped ground, the direction of the radiation pattern can be changed. Radiation pattern is steered over an angle of 60 degrees on the both the sides of beam pointing angle.
提出了一种异形接地面上的超宽带单极天线。这种紧凑而薄的天线工作在3.1到10.6 GHz之间。辐射元件是通过缝合导电线而不是铜金属化来制造的。接地面由液晶聚合物(LCP)材料(ε r=2.9)创建。所设计天线的基板采用牛仔布(ε r=1.7),辐射元件采用不锈钢涂层导电丝制成。通过改变地面的形状,可以改变辐射方向图。在波束指向角两侧以60度角引导辐射方向图。
{"title":"Pattern reconfigurable Ultra Wideband thin antenna","authors":"R. Shobanasree, S. Radha, P. H. Rao","doi":"10.1109/ICCCNT.2012.6395996","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395996","url":null,"abstract":"An Ultra Wideband (UWB) monopole antenna on a shaped ground plane is presented. This compact and thin antenna operates from 3.1 to 10.6 GHz. The radiating element is created by stitching the conductive thread instead of the copper metallization. The ground plane is created by using a Liquid Crystal Polymer (LCP)material(ε r=2.9). The substrate of the designed antenna is made from jeans fabric (ε r=1.7) while the radiating element is made from stainless steel coated conductive thread. By changing the shaped ground, the direction of the radiation pattern can be changed. Radiation pattern is steered over an angle of 60 degrees on the both the sides of beam pointing angle.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VM provisioning policies to improve the profit of cloud infrastructure service providers 虚拟机发放策略,提高云基础设施服务提供商的利润
K. Patel, A. Sarje
Cloud computing is an emerging technology in the IT world. Some features of cloud, such as low cost, scalability, robustness and availability are attracting large-scale industries as well as small business towards cloud. A virtual machine (VM) can be defined as a software that can run its own operating systems and applications like an operating system in physical computer. As the number of users increases, allocation of resources and scheduling become a complex task. The optimization of VM provisioning policies offer improvement like increasing provider's profit, energy savings and load balancing in large data centres. In cloud computing when resource requirement of user's requests exceed resources limits of cloud provider, to fulfil the requests the cloud provider outsources to other cloud providers resources, this concept is known as cloud federation. In this paper we propose an algorithm for VM provisioning in federated cloud environment. The approach tries to improve the cloud providers profit. We have used the CloudSim to find-out the results and result show that how Cloud federation help to Cloud providers in order to improve its profit.
云计算是IT界的一项新兴技术。云的一些特性,如低成本、可伸缩性、健壮性和可用性,吸引着大型行业和小型企业向云发展。虚拟机可以定义为一种软件,它可以像物理计算机中的操作系统一样运行自己的操作系统和应用程序。随着用户数量的增加,资源分配和调度成为一项复杂的任务。VM配置策略的优化提供了诸如增加提供商利润、节能和大型数据中心负载平衡等方面的改进。在云计算中,当用户请求的资源需求超过云提供商的资源限制时,云提供商将资源外包给其他云提供商以满足请求,这一概念称为云联合。本文提出了一种在联邦云环境下提供虚拟机的算法。这种方法试图提高云计算提供商的利润。我们使用CloudSim来找出结果,结果显示了云联盟如何帮助云提供商提高其利润。
{"title":"VM provisioning policies to improve the profit of cloud infrastructure service providers","authors":"K. Patel, A. Sarje","doi":"10.1109/ICCCNT.2012.6395956","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395956","url":null,"abstract":"Cloud computing is an emerging technology in the IT world. Some features of cloud, such as low cost, scalability, robustness and availability are attracting large-scale industries as well as small business towards cloud. A virtual machine (VM) can be defined as a software that can run its own operating systems and applications like an operating system in physical computer. As the number of users increases, allocation of resources and scheduling become a complex task. The optimization of VM provisioning policies offer improvement like increasing provider's profit, energy savings and load balancing in large data centres. In cloud computing when resource requirement of user's requests exceed resources limits of cloud provider, to fulfil the requests the cloud provider outsources to other cloud providers resources, this concept is known as cloud federation. In this paper we propose an algorithm for VM provisioning in federated cloud environment. The approach tries to improve the cloud providers profit. We have used the CloudSim to find-out the results and result show that how Cloud federation help to Cloud providers in order to improve its profit.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1