首页 > 最新文献

2015 Fifth International Conference on Advances in Computing and Communications (ICACC)最新文献

英文 中文
Distributed Energy Efficient Heterogeneous Clustering in Wireless Sensor Network 无线传感器网络中的分布式节能异构聚类
M. Shaji, S. Ajith
Wireless Sensor Networks (WSNs) are composed of a large number of sensor nodes with the ability to sense and process data in the physical world in a time sensitive and time restrained environment. The sensor nodes contain power constraint which limits the network lifetime and they are not practically viable to recharge frequently. Clustering enables efficient resource allocation and is a key technology to extend the network lifetime. The main idea of this paper is focused on the performance evaluation of Enhanced Developed Distributed Energy Efficient Clustering (EDDEEC) Algorithm which employs an energy aware three level heterogeneous clustering protocol in wireless sensor network. EDDEEC implementation was performed using the MATLAB simulator as it provides good scalability unlike other simulators. The analysis of EDDEEC algorithm gave birth to a new energy-aware algorithm called modified distance based EDDEEC and the comparative analysis shows that the modified EDDEEC outperforms 42% over the existing EDDEEC protocol.
无线传感器网络(WSNs)由大量传感器节点组成,具有在时间敏感和时间约束的环境中感知和处理物理世界中的数据的能力。传感器节点存在功率约束,这限制了网络的生存时间,并且它们实际上不具有频繁充电的可行性。集群能够实现资源的高效分配,是延长网络生命周期的关键技术。本文主要研究了在无线传感器网络中采用能量感知的三级异构聚类协议的增强型分布式能效聚类(EDDEEC)算法的性能评价。eddec的实现使用MATLAB模拟器,因为它提供了与其他模拟器不同的良好可扩展性。通过对EDDEEC算法的分析,提出了一种新的能量感知算法——改进的基于距离的EDDEEC算法,对比分析表明,改进的EDDEEC算法比现有的EDDEEC协议性能提高42%。
{"title":"Distributed Energy Efficient Heterogeneous Clustering in Wireless Sensor Network","authors":"M. Shaji, S. Ajith","doi":"10.1109/ICACC.2015.104","DOIUrl":"https://doi.org/10.1109/ICACC.2015.104","url":null,"abstract":"Wireless Sensor Networks (WSNs) are composed of a large number of sensor nodes with the ability to sense and process data in the physical world in a time sensitive and time restrained environment. The sensor nodes contain power constraint which limits the network lifetime and they are not practically viable to recharge frequently. Clustering enables efficient resource allocation and is a key technology to extend the network lifetime. The main idea of this paper is focused on the performance evaluation of Enhanced Developed Distributed Energy Efficient Clustering (EDDEEC) Algorithm which employs an energy aware three level heterogeneous clustering protocol in wireless sensor network. EDDEEC implementation was performed using the MATLAB simulator as it provides good scalability unlike other simulators. The analysis of EDDEEC algorithm gave birth to a new energy-aware algorithm called modified distance based EDDEEC and the comparative analysis shows that the modified EDDEEC outperforms 42% over the existing EDDEEC protocol.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Energy Efficient Intrusion Detection Scheme Based on Bayesian Energy Prediction in WSN 基于贝叶斯能量预测的WSN节能入侵检测方案
Shelke Shailaja Shivaji, Ashwini B. Patil
Wireless sensor network (WSN) has wide range of application like monitoring the environment, military, health application etc. Wireless sensor network has limited energy and resource, so challenging task in WSN is to design a network in such a way that maximize the lifetime of network. WSN are harmed or damaged by the Denial of Service (DoS) attack which destroy the network, resources and lose its energy rapidly. Various IDS used to detect malicious node in the network but they consume more energy to monitor malicious node, so decrease the network lifetime and throughput. It is important to form an energy efficient IDS which detect intruder accurately and consume less energy. In this paper, EEIDS (Energy Efficient Intrusion Detection Scheme) is proposed and designed, which detect malicious node based on energy consumption of nodes by comparing actual and predicted energy. The node with abnormal energy detected as malicious node. In EEIDS, Bayesian approach is used for energy prediction of sensor nodes, in which energy consumption of each sensor node is predicted using prior information and likelihood function also energy efficient approach used to reduce energy consumption of network. The simulation results show that EEIDS gives better network lifetime, throughput and energy consumption and effectively detect malicious node.
无线传感器网络(WSN)在环境监测、军事、卫生等领域有着广泛的应用。无线传感器网络的能量和资源是有限的,因此如何设计一个具有最大寿命的网络是无线传感器网络的一个挑战。无线传感器网络受到DoS (Denial of Service,拒绝服务)攻击的损害或破坏,这种攻击会破坏网络、资源并迅速失去能量。各种检测网络中恶意节点的IDS消耗了大量的能量,降低了网络的生命周期和吞吐量。建立高效节能的入侵检测系统,既能准确地检测出入侵者,又能降低系统能耗。本文提出并设计了EEIDS (Energy Efficient Intrusion Detection Scheme),该方案通过比较节点的实际能量和预测能量,根据节点的能量消耗来检测恶意节点。检测到能量异常的节点为恶意节点。在EEIDS中,采用贝叶斯方法进行传感器节点的能量预测,利用先验信息和似然函数预测每个传感器节点的能量消耗,并采用节能方法降低网络的能量消耗。仿真结果表明,EEIDS具有更好的网络生存期、吞吐量和能耗,能够有效地检测出恶意节点。
{"title":"Energy Efficient Intrusion Detection Scheme Based on Bayesian Energy Prediction in WSN","authors":"Shelke Shailaja Shivaji, Ashwini B. Patil","doi":"10.1109/ICACC.2015.107","DOIUrl":"https://doi.org/10.1109/ICACC.2015.107","url":null,"abstract":"Wireless sensor network (WSN) has wide range of application like monitoring the environment, military, health application etc. Wireless sensor network has limited energy and resource, so challenging task in WSN is to design a network in such a way that maximize the lifetime of network. WSN are harmed or damaged by the Denial of Service (DoS) attack which destroy the network, resources and lose its energy rapidly. Various IDS used to detect malicious node in the network but they consume more energy to monitor malicious node, so decrease the network lifetime and throughput. It is important to form an energy efficient IDS which detect intruder accurately and consume less energy. In this paper, EEIDS (Energy Efficient Intrusion Detection Scheme) is proposed and designed, which detect malicious node based on energy consumption of nodes by comparing actual and predicted energy. The node with abnormal energy detected as malicious node. In EEIDS, Bayesian approach is used for energy prediction of sensor nodes, in which energy consumption of each sensor node is predicted using prior information and likelihood function also energy efficient approach used to reduce energy consumption of network. The simulation results show that EEIDS gives better network lifetime, throughput and energy consumption and effectively detect malicious node.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Microwave Signal Generation and Noise Reduction Using Cascaded MZM for Radar Applications 级联MZM用于雷达的微波信号产生和降噪
K. A. Fayza, P. A. Meeva, Asha Maria Joseph, D. Meena, S. Talabattula
In a radar system, frequency up and down conversion processes requires higher frequency local oscillators (LO). Advancement in microwave photonics and optical domain made it possible to synthesis high frequency microwave signals. There are variety of microwave generation techniques available in optical domain such as optical heterodyning, optical injection locking, optical phase lock loop, Mach-Zehnder modulator based photonic technique etc. It is known that Mach-Zehnder modulator based microwave signal generation is superior in terms of reduced complexity and noise effects. But this work explores the possibility of reducing noise still further for generating signals in 2-4GHz range (preferred for normal S-band of radar operation). For this purpose single and cascaded Mach-Zehnder configurations are compared and evaluated. An addition of cascaded Mach-Zehnder modulator results in noise reduction. We also propose that the carrier signal filtering is not required in cascaded configuration compared to single Mach-Zehnder modulator which is an additional component in single Mach-Zehnder modulator. The work is also supported with results and its analysis for above configurations.
在雷达系统中,频率上下转换过程需要更高频率的本振(LO)。微波光子学和光畴的发展使高频微波信号的合成成为可能。在光学领域有多种微波产生技术,如光外差、光注入锁定、光锁相环、基于马赫-曾德尔调制器的光子技术等。众所周知,基于马赫-曾德尔调制器的微波信号产生在降低复杂性和噪声效应方面具有优越性。但这项工作探索了进一步降低噪声的可能性,以产生2-4GHz范围内的信号(首选用于正常的s波段雷达操作)。为此,对单马赫-曾德构型和级联马赫-曾德构型进行了比较和评估。级联马赫-曾德尔调制器的加入降低了噪声。我们还提出,与单马赫-曾德调制器相比,级联配置中不需要载波信号滤波,而单马赫-曾德调制器是单马赫-曾德调制器的附加组件。本文还提供了上述配置的结果和分析。
{"title":"Microwave Signal Generation and Noise Reduction Using Cascaded MZM for Radar Applications","authors":"K. A. Fayza, P. A. Meeva, Asha Maria Joseph, D. Meena, S. Talabattula","doi":"10.1109/ICACC.2015.77","DOIUrl":"https://doi.org/10.1109/ICACC.2015.77","url":null,"abstract":"In a radar system, frequency up and down conversion processes requires higher frequency local oscillators (LO). Advancement in microwave photonics and optical domain made it possible to synthesis high frequency microwave signals. There are variety of microwave generation techniques available in optical domain such as optical heterodyning, optical injection locking, optical phase lock loop, Mach-Zehnder modulator based photonic technique etc. It is known that Mach-Zehnder modulator based microwave signal generation is superior in terms of reduced complexity and noise effects. But this work explores the possibility of reducing noise still further for generating signals in 2-4GHz range (preferred for normal S-band of radar operation). For this purpose single and cascaded Mach-Zehnder configurations are compared and evaluated. An addition of cascaded Mach-Zehnder modulator results in noise reduction. We also propose that the carrier signal filtering is not required in cascaded configuration compared to single Mach-Zehnder modulator which is an additional component in single Mach-Zehnder modulator. The work is also supported with results and its analysis for above configurations.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright Protection for E-Learning Videos Using Digital Watermarking 使用数字水印的电子学习视频版权保护
P. M. Neena, S. Athi Narayanan, K. Bijlani
E-Learning system provides a new platform for learning and is becoming more and more popular nowadays. As part of E-Learning, digital multimedia contents like video lectures, seminar talks are made available to the learners through the internet. The teachers or the authority upload videos in the file repositories of E-learning systems. It is not so difficult to copy such files without quality loss. Any user can obtain the copies of these videos and upload and claim it as their own. So the security plays an important role in ELearning. Digital watermarking is a strong solution for this problem. In this paper we propose a method for digital watermarking in which frequency domain transforms (Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT)) are used for the data insertion. The decoding is based on the side information which produced at the time of watermarking. We have compared the Peak signal-to-noise ratio (PSNR) and Bit Error Rate (BER) of the results. The testing includes applying of spatial attacks and compression attacks on the watermarked video. The result shows that the method using wavelet transform is more efficient.
电子学习系统为学习提供了一个新的平台,越来越受到人们的欢迎。作为电子学习的一部分,数字多媒体内容,如视频讲座,研讨会讲座,可通过互联网提供给学习者。教师或权威人士上传视频到E-learning系统的文件库中。复制这样的文件而不损失质量并不是那么困难。任何用户都可以获得这些视频的副本,并上传并声称它是自己的。因此,安全在网络学习中起着重要的作用。数字水印是解决这一问题的有力方法。本文提出了一种利用频域变换(离散余弦变换(DCT)、离散傅立叶变换(DFT)、离散小波变换(DWT))进行数据插入的数字水印方法。解码是基于水印时产生的边信息进行的。我们比较了峰值信噪比(PSNR)和误码率(BER)的结果。测试包括空间攻击和压缩攻击对水印视频的应用。结果表明,采用小波变换的方法是有效的。
{"title":"Copyright Protection for E-Learning Videos Using Digital Watermarking","authors":"P. M. Neena, S. Athi Narayanan, K. Bijlani","doi":"10.1109/ICACC.2015.74","DOIUrl":"https://doi.org/10.1109/ICACC.2015.74","url":null,"abstract":"E-Learning system provides a new platform for learning and is becoming more and more popular nowadays. As part of E-Learning, digital multimedia contents like video lectures, seminar talks are made available to the learners through the internet. The teachers or the authority upload videos in the file repositories of E-learning systems. It is not so difficult to copy such files without quality loss. Any user can obtain the copies of these videos and upload and claim it as their own. So the security plays an important role in ELearning. Digital watermarking is a strong solution for this problem. In this paper we propose a method for digital watermarking in which frequency domain transforms (Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT)) are used for the data insertion. The decoding is based on the side information which produced at the time of watermarking. We have compared the Peak signal-to-noise ratio (PSNR) and Bit Error Rate (BER) of the results. The testing includes applying of spatial attacks and compression attacks on the watermarked video. The result shows that the method using wavelet transform is more efficient.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of Notch Cut Circularly Polarized Circular Microstrip Antenna 切迹圆极化圆微带天线的设计
A. Deshmukh, S. Shaikh, A. Desai, K. Lele, Shafin Nagarbowdi
The notch cut circular microstrip antenna to realize circular polarization on thinner substrate is proposed. The notch degenerates fundamental TM11 mode into two orthogonal modes, to yield circular polarization. To improve upon the gain and bandwidth, its three layer suspended configuration is proposed. It yields VSWR and axial ratio BW of 60 and 15 MHz, respectively with gain of more than 5 dBi over axial ratio bandwidth. Further formulation in resonant length at two orthogonal modes for notch cut circular patch on non-suspended and suspended configurations is proposed. The frequencies calculated using them closely agrees with the simulated results. Using proposed formulations, the design procedure for notch cut circularly polarized antennas in 1000 to 4000 MHz frequency band, is presented. It gives circularly polarized response with formation of small loop (kink) inside VSWR = 2 circle in the smith chart. Thus the proposed formulation can be used to design circular polarized antenna at any given frequency.
提出了在较薄衬底上实现圆极化的陷波切割圆形微带天线。缺口使TM11基模简并为两个正交模,产生圆偏振。为了提高增益和带宽,提出了三层悬架结构。它的VSWR和轴比BW分别为60 MHz和15 MHz,在轴比带宽上的增益大于5 dBi。在非悬架和悬架构型下,进一步提出了缺口切割圆片在两种正交模式下的共振长度公式。用它们计算的频率与模拟结果吻合较好。利用所提出的公式,给出了1000 ~ 4000 MHz频段的陷波圆极化天线的设计过程。在史密斯图的VSWR = 2圆内形成小环路(扭结),给出圆极化响应。因此,所提出的公式可用于设计任何给定频率的圆极化天线。
{"title":"Design of Notch Cut Circularly Polarized Circular Microstrip Antenna","authors":"A. Deshmukh, S. Shaikh, A. Desai, K. Lele, Shafin Nagarbowdi","doi":"10.1109/ICACC.2015.38","DOIUrl":"https://doi.org/10.1109/ICACC.2015.38","url":null,"abstract":"The notch cut circular microstrip antenna to realize circular polarization on thinner substrate is proposed. The notch degenerates fundamental TM11 mode into two orthogonal modes, to yield circular polarization. To improve upon the gain and bandwidth, its three layer suspended configuration is proposed. It yields VSWR and axial ratio BW of 60 and 15 MHz, respectively with gain of more than 5 dBi over axial ratio bandwidth. Further formulation in resonant length at two orthogonal modes for notch cut circular patch on non-suspended and suspended configurations is proposed. The frequencies calculated using them closely agrees with the simulated results. Using proposed formulations, the design procedure for notch cut circularly polarized antennas in 1000 to 4000 MHz frequency band, is presented. It gives circularly polarized response with formation of small loop (kink) inside VSWR = 2 circle in the smith chart. Thus the proposed formulation can be used to design circular polarized antenna at any given frequency.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Microstrip Meandered Dual Mode Wideband Bandpass Filter Using Quarter Wavelength Stubs 利用四分之一波长存根设计微带弯曲双模宽带带通滤波器
K. Avinash, I. S. Rao
This paper proposes a new compact microstrip meandered dual mode loop resonator wideband bandpass filter. The proposed filter is constructed by using bandstop filter with orthogonal direct connected feed lines. The passband is created inside a wide stopband by using the quarter wavelength open circuited stubs which are connected to the opposite sides of the input and output port sides. A small square patch perturbation element is added at right top corner of symmetrical axis of the loop. Perturbation element excites dual degenerate modes thereby improving the selectivity of the filter on both higher and lower side of the passband. Simulated filter is designed at a center frequency of 3.85 GHz shows a very low insertion loss of 0.3 dB and high return loss of above 17 dB with a wide fractional bandwidth of 55.26 %. The introduced filter is compact with low insertion loss, high return loss and wide bandwidth suitable for modern wireless and satellite communication systems.
提出了一种新型微带弯曲双模环路谐振器宽带带通滤波器。该滤波器采用带阻滤波器和正交直连馈线构成。通带是在宽阻带内创建的,使用四分之一波长开路存根连接到输入和输出端口两侧的相对侧。在环路对称轴的右上角增加一个小的方形贴片摄动元件。微扰元件激发对偶简并模式,从而提高滤波器在通带的高侧和低侧的选择性。仿真滤波器的中心频率为3.85 GHz,插入损耗低至0.3 dB,回波损耗高至17 dB以上,分数带宽为55.26%。该滤波器结构紧凑,插入损耗低,回波损耗高,带宽宽,适用于现代无线和卫星通信系统。
{"title":"Design of Microstrip Meandered Dual Mode Wideband Bandpass Filter Using Quarter Wavelength Stubs","authors":"K. Avinash, I. S. Rao","doi":"10.1109/ICACC.2015.93","DOIUrl":"https://doi.org/10.1109/ICACC.2015.93","url":null,"abstract":"This paper proposes a new compact microstrip meandered dual mode loop resonator wideband bandpass filter. The proposed filter is constructed by using bandstop filter with orthogonal direct connected feed lines. The passband is created inside a wide stopband by using the quarter wavelength open circuited stubs which are connected to the opposite sides of the input and output port sides. A small square patch perturbation element is added at right top corner of symmetrical axis of the loop. Perturbation element excites dual degenerate modes thereby improving the selectivity of the filter on both higher and lower side of the passband. Simulated filter is designed at a center frequency of 3.85 GHz shows a very low insertion loss of 0.3 dB and high return loss of above 17 dB with a wide fractional bandwidth of 55.26 %. The introduced filter is compact with low insertion loss, high return loss and wide bandwidth suitable for modern wireless and satellite communication systems.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115698748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Data Replication Strategy in Cloud Environments 云环境中的动态数据复制策略
D. S. Jayalakshmi, Ranjana T. P. Rashmi, R. Srinivasan
Replication of a popular file and storing its replica in the locations closer to the clients who are making requests is the best choice to reduce the execution time. Although replication helps in increasing availability, the question of how to decide an optimal replication number and correct locations to place the replicas are open challenges. In this paper, a brief survey on various data center selection and replication strategies used are described. Further, a system model with two phases, data center selection and dynamic data replication, is proposed with an aim to effectively increase the data availability and also reduce user waiting time by very small number of replicas is presented in this paper.
复制流行文件并将其副本存储在更靠近发出请求的客户机的位置,这是减少执行时间的最佳选择。尽管复制有助于提高可用性,但如何确定最佳复制数量和放置副本的正确位置的问题是一个悬而未决的挑战。本文简要介绍了各种数据中心选择和使用的复制策略。在此基础上,提出了一种包含数据中心选择和动态数据复制两个阶段的系统模型,通过极少量的副本有效地提高数据可用性,并减少用户等待时间。
{"title":"Dynamic Data Replication Strategy in Cloud Environments","authors":"D. S. Jayalakshmi, Ranjana T. P. Rashmi, R. Srinivasan","doi":"10.1109/ICACC.2015.79","DOIUrl":"https://doi.org/10.1109/ICACC.2015.79","url":null,"abstract":"Replication of a popular file and storing its replica in the locations closer to the clients who are making requests is the best choice to reduce the execution time. Although replication helps in increasing availability, the question of how to decide an optimal replication number and correct locations to place the replicas are open challenges. In this paper, a brief survey on various data center selection and replication strategies used are described. Further, a system model with two phases, data center selection and dynamic data replication, is proposed with an aim to effectively increase the data availability and also reduce user waiting time by very small number of replicas is presented in this paper.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On-the-Fly Encryption Security in Remote Storage 远程存储中的动态加密安全性
Arun Prabhakar, P. S. Savin, K. Chandrasekaran
Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation.
分布式存储、移动电话以及可移动硬盘的发展扩大了信息使用的多样性。另一方面,出现了一些问题,如如何判断信息是否非常敏感,以至于不可能离开客户的小工具,以及如何防止未经授权的访问。信息泄漏预防应用程序执行此分配,通常通过将可能易受攻击的文档转移到受保护的远程存储库,检查它们,然后在输出满足强制策略中定义的约束的情况下对远程存储执行最后一次复制,此时将输出复制到远程存储库。基本上连续两次写入文档所需的额外工作,一次写入本地存储库,最后写入远程存储库,这是本地存储库隔离的主要问题。本文介绍了一种利用瞬态加密密钥来防止信息泄露的替代技术。通过使用临时密钥,可以在远程存储库上安全地检查编码信息,并在扫描时不符合策略时安全地删除编码信息。与本地存储库隔离相比,这种直接过程带来了更高的生产率,并减少了时间延迟。
{"title":"On-the-Fly Encryption Security in Remote Storage","authors":"Arun Prabhakar, P. S. Savin, K. Chandrasekaran","doi":"10.1109/ICACC.2015.102","DOIUrl":"https://doi.org/10.1109/ICACC.2015.102","url":null,"abstract":"Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized Gurmukhi Text Recognition from Signboard Images Captured by Mobile Camera Using Structural Features 利用结构特征对移动相机捕捉的招牌图像进行优化的Gurmukhi文本识别
Triptinder Pal Kaur, N. Garg
Earlier, research was restricted to the images acquired by traditional scanners, however an innovative trend of research has emerged with the evolution of portable, high speed digital cameras and multimedia mobile phones comprising smart features. They provided us the opportunity to employ them for image acquisition as an alternate to traditional scanners for the recognition purpose. This subject has attracted numerous researchers, meanwhile it provides a means for automatic processing of substantial amount of data. Text to speech translation of recognized text from images can be ready to lend a hand for visually impaired people and for those who are unfamiliar with the language. This paper provides technical solution for the recognition of Gurmukhi text from the images of different signboards acquired by camera of different resolution. Segmentation is accomplished using vertical and horizontal projection histograms on the pre-processed image which breakdowns the text into lines, words and characters. Feature extraction and recognition on the segmented characters is accomplished by considering at least three corresponding structural features holes, endpoints and junctions. Consequently, our recognition is grounded on the location and number of these features extracted. The proposed algorithm was tested on 1300 images of Gurmukhi text acquired by camera and recognition rate of 90% demonstrates the precision of the system.
早期,研究仅限于传统扫描仪获取的图像,但随着便携式高速数码相机和多媒体移动电话的发展,研究出现了创新趋势,包括智能功能。它们为我们提供了使用它们进行图像采集的机会,作为识别目的的传统扫描仪的替代方案。这一课题吸引了众多研究者,同时也为大量数据的自动处理提供了一种手段。从图像中识别文本的文本到语音翻译可以随时为视障人士和不熟悉语言的人提供帮助。本文为从不同分辨率的摄像机采集的不同广告牌图像中识别古穆克文字提供了技术解决方案。分割是通过在预处理图像上使用垂直和水平投影直方图来完成的,该直方图将文本分解为行、词和字符。通过考虑至少三个相应的结构特征——孔洞、端点和连接点,来完成对分割字符的特征提取和识别。因此,我们的识别是基于提取的这些特征的位置和数量。该算法在1300张相机采集的古穆克文字图像上进行了测试,识别率达到90%,证明了系统的精度。
{"title":"Optimized Gurmukhi Text Recognition from Signboard Images Captured by Mobile Camera Using Structural Features","authors":"Triptinder Pal Kaur, N. Garg","doi":"10.1109/ICACC.2015.65","DOIUrl":"https://doi.org/10.1109/ICACC.2015.65","url":null,"abstract":"Earlier, research was restricted to the images acquired by traditional scanners, however an innovative trend of research has emerged with the evolution of portable, high speed digital cameras and multimedia mobile phones comprising smart features. They provided us the opportunity to employ them for image acquisition as an alternate to traditional scanners for the recognition purpose. This subject has attracted numerous researchers, meanwhile it provides a means for automatic processing of substantial amount of data. Text to speech translation of recognized text from images can be ready to lend a hand for visually impaired people and for those who are unfamiliar with the language. This paper provides technical solution for the recognition of Gurmukhi text from the images of different signboards acquired by camera of different resolution. Segmentation is accomplished using vertical and horizontal projection histograms on the pre-processed image which breakdowns the text into lines, words and characters. Feature extraction and recognition on the segmented characters is accomplished by considering at least three corresponding structural features holes, endpoints and junctions. Consequently, our recognition is grounded on the location and number of these features extracted. The proposed algorithm was tested on 1300 images of Gurmukhi text acquired by camera and recognition rate of 90% demonstrates the precision of the system.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of MIMO OFDM Based WiMAX System with LDPC 基于MIMO OFDM的LDPC WiMAX系统分析
M. Cheema, S. Kulkarni
Driven by multimedia based applications, the future wireless systems require high data rate capable technologies. WiMAX has attracted immense interest globally for next generation wireless communication. The requirement of a spectrally efficient modulation technique and power efficient forward error correction scheme are key factors for these technologies. Wireless link quality is determined by transmission rate, range and reliability. Multiple Input Multiple Output (MIMO), along with Orthogonal Frequency Divsion Multiplexing(OFDM) techniques improve these parameters and are also habituated in WiMAX. It uses smart antenna techniques which include spatial transmit diversity and spatial multiplexing (SM). Spatial transmit diversity is achieved by applying Alamouti's Space Time coding. To achieve high capacity with minimum error rate Low-Density Parity-Check (LDPC) codes have recently drawn much attention and have superior interest because their error correction performance in wide applications. These codes are called Tanner graph which have short cycles that degrade the performance of LDPC decoders. The Quasi Cyclic (QC) LDPC as channel coding method is incorporated in the paper. STBC is used as a MIMO technique providing a strong diversity gain. Analysis of the performance of MIMO OFDM physical layer in WiMAX with the use of LDPC under different digital modulation techniques is presented in this paper.
在多媒体应用的驱动下,未来的无线系统需要高数据速率的技术。WiMAX吸引了全球对下一代无线通信的极大兴趣。对频谱高效的调制技术和功率高效的前向纠错方案的要求是实现这些技术的关键因素。无线链路质量由传输速率、距离和可靠性决定。多输入多输出(MIMO)和正交频分复用(OFDM)技术改善了这些参数,并在WiMAX中得到了应用。它采用智能天线技术,包括空间发射分集和空间复用(SM)。空间发射分集采用Alamouti时空编码实现。低密度奇偶校验码(Low-Density Parity-Check, LDPC)由于其纠错性能得到了广泛的应用,近年来受到了广泛的关注和关注。这些编码被称为坦纳图,其周期短,会降低LDPC解码器的性能。本文采用准循环LDPC作为信道编码方法。STBC被用作MIMO技术,提供了很强的分集增益。本文分析了在不同数字调制技术下使用LDPC的WiMAX中MIMO OFDM物理层的性能。
{"title":"Analysis of MIMO OFDM Based WiMAX System with LDPC","authors":"M. Cheema, S. Kulkarni","doi":"10.1109/ICACC.2015.64","DOIUrl":"https://doi.org/10.1109/ICACC.2015.64","url":null,"abstract":"Driven by multimedia based applications, the future wireless systems require high data rate capable technologies. WiMAX has attracted immense interest globally for next generation wireless communication. The requirement of a spectrally efficient modulation technique and power efficient forward error correction scheme are key factors for these technologies. Wireless link quality is determined by transmission rate, range and reliability. Multiple Input Multiple Output (MIMO), along with Orthogonal Frequency Divsion Multiplexing(OFDM) techniques improve these parameters and are also habituated in WiMAX. It uses smart antenna techniques which include spatial transmit diversity and spatial multiplexing (SM). Spatial transmit diversity is achieved by applying Alamouti's Space Time coding. To achieve high capacity with minimum error rate Low-Density Parity-Check (LDPC) codes have recently drawn much attention and have superior interest because their error correction performance in wide applications. These codes are called Tanner graph which have short cycles that degrade the performance of LDPC decoders. The Quasi Cyclic (QC) LDPC as channel coding method is incorporated in the paper. STBC is used as a MIMO technique providing a strong diversity gain. Analysis of the performance of MIMO OFDM physical layer in WiMAX with the use of LDPC under different digital modulation techniques is presented in this paper.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 Fifth International Conference on Advances in Computing and Communications (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1