Wireless Sensor Networks (WSNs) are composed of a large number of sensor nodes with the ability to sense and process data in the physical world in a time sensitive and time restrained environment. The sensor nodes contain power constraint which limits the network lifetime and they are not practically viable to recharge frequently. Clustering enables efficient resource allocation and is a key technology to extend the network lifetime. The main idea of this paper is focused on the performance evaluation of Enhanced Developed Distributed Energy Efficient Clustering (EDDEEC) Algorithm which employs an energy aware three level heterogeneous clustering protocol in wireless sensor network. EDDEEC implementation was performed using the MATLAB simulator as it provides good scalability unlike other simulators. The analysis of EDDEEC algorithm gave birth to a new energy-aware algorithm called modified distance based EDDEEC and the comparative analysis shows that the modified EDDEEC outperforms 42% over the existing EDDEEC protocol.
{"title":"Distributed Energy Efficient Heterogeneous Clustering in Wireless Sensor Network","authors":"M. Shaji, S. Ajith","doi":"10.1109/ICACC.2015.104","DOIUrl":"https://doi.org/10.1109/ICACC.2015.104","url":null,"abstract":"Wireless Sensor Networks (WSNs) are composed of a large number of sensor nodes with the ability to sense and process data in the physical world in a time sensitive and time restrained environment. The sensor nodes contain power constraint which limits the network lifetime and they are not practically viable to recharge frequently. Clustering enables efficient resource allocation and is a key technology to extend the network lifetime. The main idea of this paper is focused on the performance evaluation of Enhanced Developed Distributed Energy Efficient Clustering (EDDEEC) Algorithm which employs an energy aware three level heterogeneous clustering protocol in wireless sensor network. EDDEEC implementation was performed using the MATLAB simulator as it provides good scalability unlike other simulators. The analysis of EDDEEC algorithm gave birth to a new energy-aware algorithm called modified distance based EDDEEC and the comparative analysis shows that the modified EDDEEC outperforms 42% over the existing EDDEEC protocol.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor network (WSN) has wide range of application like monitoring the environment, military, health application etc. Wireless sensor network has limited energy and resource, so challenging task in WSN is to design a network in such a way that maximize the lifetime of network. WSN are harmed or damaged by the Denial of Service (DoS) attack which destroy the network, resources and lose its energy rapidly. Various IDS used to detect malicious node in the network but they consume more energy to monitor malicious node, so decrease the network lifetime and throughput. It is important to form an energy efficient IDS which detect intruder accurately and consume less energy. In this paper, EEIDS (Energy Efficient Intrusion Detection Scheme) is proposed and designed, which detect malicious node based on energy consumption of nodes by comparing actual and predicted energy. The node with abnormal energy detected as malicious node. In EEIDS, Bayesian approach is used for energy prediction of sensor nodes, in which energy consumption of each sensor node is predicted using prior information and likelihood function also energy efficient approach used to reduce energy consumption of network. The simulation results show that EEIDS gives better network lifetime, throughput and energy consumption and effectively detect malicious node.
无线传感器网络(WSN)在环境监测、军事、卫生等领域有着广泛的应用。无线传感器网络的能量和资源是有限的,因此如何设计一个具有最大寿命的网络是无线传感器网络的一个挑战。无线传感器网络受到DoS (Denial of Service,拒绝服务)攻击的损害或破坏,这种攻击会破坏网络、资源并迅速失去能量。各种检测网络中恶意节点的IDS消耗了大量的能量,降低了网络的生命周期和吞吐量。建立高效节能的入侵检测系统,既能准确地检测出入侵者,又能降低系统能耗。本文提出并设计了EEIDS (Energy Efficient Intrusion Detection Scheme),该方案通过比较节点的实际能量和预测能量,根据节点的能量消耗来检测恶意节点。检测到能量异常的节点为恶意节点。在EEIDS中,采用贝叶斯方法进行传感器节点的能量预测,利用先验信息和似然函数预测每个传感器节点的能量消耗,并采用节能方法降低网络的能量消耗。仿真结果表明,EEIDS具有更好的网络生存期、吞吐量和能耗,能够有效地检测出恶意节点。
{"title":"Energy Efficient Intrusion Detection Scheme Based on Bayesian Energy Prediction in WSN","authors":"Shelke Shailaja Shivaji, Ashwini B. Patil","doi":"10.1109/ICACC.2015.107","DOIUrl":"https://doi.org/10.1109/ICACC.2015.107","url":null,"abstract":"Wireless sensor network (WSN) has wide range of application like monitoring the environment, military, health application etc. Wireless sensor network has limited energy and resource, so challenging task in WSN is to design a network in such a way that maximize the lifetime of network. WSN are harmed or damaged by the Denial of Service (DoS) attack which destroy the network, resources and lose its energy rapidly. Various IDS used to detect malicious node in the network but they consume more energy to monitor malicious node, so decrease the network lifetime and throughput. It is important to form an energy efficient IDS which detect intruder accurately and consume less energy. In this paper, EEIDS (Energy Efficient Intrusion Detection Scheme) is proposed and designed, which detect malicious node based on energy consumption of nodes by comparing actual and predicted energy. The node with abnormal energy detected as malicious node. In EEIDS, Bayesian approach is used for energy prediction of sensor nodes, in which energy consumption of each sensor node is predicted using prior information and likelihood function also energy efficient approach used to reduce energy consumption of network. The simulation results show that EEIDS gives better network lifetime, throughput and energy consumption and effectively detect malicious node.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. A. Fayza, P. A. Meeva, Asha Maria Joseph, D. Meena, S. Talabattula
In a radar system, frequency up and down conversion processes requires higher frequency local oscillators (LO). Advancement in microwave photonics and optical domain made it possible to synthesis high frequency microwave signals. There are variety of microwave generation techniques available in optical domain such as optical heterodyning, optical injection locking, optical phase lock loop, Mach-Zehnder modulator based photonic technique etc. It is known that Mach-Zehnder modulator based microwave signal generation is superior in terms of reduced complexity and noise effects. But this work explores the possibility of reducing noise still further for generating signals in 2-4GHz range (preferred for normal S-band of radar operation). For this purpose single and cascaded Mach-Zehnder configurations are compared and evaluated. An addition of cascaded Mach-Zehnder modulator results in noise reduction. We also propose that the carrier signal filtering is not required in cascaded configuration compared to single Mach-Zehnder modulator which is an additional component in single Mach-Zehnder modulator. The work is also supported with results and its analysis for above configurations.
{"title":"Microwave Signal Generation and Noise Reduction Using Cascaded MZM for Radar Applications","authors":"K. A. Fayza, P. A. Meeva, Asha Maria Joseph, D. Meena, S. Talabattula","doi":"10.1109/ICACC.2015.77","DOIUrl":"https://doi.org/10.1109/ICACC.2015.77","url":null,"abstract":"In a radar system, frequency up and down conversion processes requires higher frequency local oscillators (LO). Advancement in microwave photonics and optical domain made it possible to synthesis high frequency microwave signals. There are variety of microwave generation techniques available in optical domain such as optical heterodyning, optical injection locking, optical phase lock loop, Mach-Zehnder modulator based photonic technique etc. It is known that Mach-Zehnder modulator based microwave signal generation is superior in terms of reduced complexity and noise effects. But this work explores the possibility of reducing noise still further for generating signals in 2-4GHz range (preferred for normal S-band of radar operation). For this purpose single and cascaded Mach-Zehnder configurations are compared and evaluated. An addition of cascaded Mach-Zehnder modulator results in noise reduction. We also propose that the carrier signal filtering is not required in cascaded configuration compared to single Mach-Zehnder modulator which is an additional component in single Mach-Zehnder modulator. The work is also supported with results and its analysis for above configurations.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-Learning system provides a new platform for learning and is becoming more and more popular nowadays. As part of E-Learning, digital multimedia contents like video lectures, seminar talks are made available to the learners through the internet. The teachers or the authority upload videos in the file repositories of E-learning systems. It is not so difficult to copy such files without quality loss. Any user can obtain the copies of these videos and upload and claim it as their own. So the security plays an important role in ELearning. Digital watermarking is a strong solution for this problem. In this paper we propose a method for digital watermarking in which frequency domain transforms (Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT)) are used for the data insertion. The decoding is based on the side information which produced at the time of watermarking. We have compared the Peak signal-to-noise ratio (PSNR) and Bit Error Rate (BER) of the results. The testing includes applying of spatial attacks and compression attacks on the watermarked video. The result shows that the method using wavelet transform is more efficient.
{"title":"Copyright Protection for E-Learning Videos Using Digital Watermarking","authors":"P. M. Neena, S. Athi Narayanan, K. Bijlani","doi":"10.1109/ICACC.2015.74","DOIUrl":"https://doi.org/10.1109/ICACC.2015.74","url":null,"abstract":"E-Learning system provides a new platform for learning and is becoming more and more popular nowadays. As part of E-Learning, digital multimedia contents like video lectures, seminar talks are made available to the learners through the internet. The teachers or the authority upload videos in the file repositories of E-learning systems. It is not so difficult to copy such files without quality loss. Any user can obtain the copies of these videos and upload and claim it as their own. So the security plays an important role in ELearning. Digital watermarking is a strong solution for this problem. In this paper we propose a method for digital watermarking in which frequency domain transforms (Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT)) are used for the data insertion. The decoding is based on the side information which produced at the time of watermarking. We have compared the Peak signal-to-noise ratio (PSNR) and Bit Error Rate (BER) of the results. The testing includes applying of spatial attacks and compression attacks on the watermarked video. The result shows that the method using wavelet transform is more efficient.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Deshmukh, S. Shaikh, A. Desai, K. Lele, Shafin Nagarbowdi
The notch cut circular microstrip antenna to realize circular polarization on thinner substrate is proposed. The notch degenerates fundamental TM11 mode into two orthogonal modes, to yield circular polarization. To improve upon the gain and bandwidth, its three layer suspended configuration is proposed. It yields VSWR and axial ratio BW of 60 and 15 MHz, respectively with gain of more than 5 dBi over axial ratio bandwidth. Further formulation in resonant length at two orthogonal modes for notch cut circular patch on non-suspended and suspended configurations is proposed. The frequencies calculated using them closely agrees with the simulated results. Using proposed formulations, the design procedure for notch cut circularly polarized antennas in 1000 to 4000 MHz frequency band, is presented. It gives circularly polarized response with formation of small loop (kink) inside VSWR = 2 circle in the smith chart. Thus the proposed formulation can be used to design circular polarized antenna at any given frequency.
{"title":"Design of Notch Cut Circularly Polarized Circular Microstrip Antenna","authors":"A. Deshmukh, S. Shaikh, A. Desai, K. Lele, Shafin Nagarbowdi","doi":"10.1109/ICACC.2015.38","DOIUrl":"https://doi.org/10.1109/ICACC.2015.38","url":null,"abstract":"The notch cut circular microstrip antenna to realize circular polarization on thinner substrate is proposed. The notch degenerates fundamental TM11 mode into two orthogonal modes, to yield circular polarization. To improve upon the gain and bandwidth, its three layer suspended configuration is proposed. It yields VSWR and axial ratio BW of 60 and 15 MHz, respectively with gain of more than 5 dBi over axial ratio bandwidth. Further formulation in resonant length at two orthogonal modes for notch cut circular patch on non-suspended and suspended configurations is proposed. The frequencies calculated using them closely agrees with the simulated results. Using proposed formulations, the design procedure for notch cut circularly polarized antennas in 1000 to 4000 MHz frequency band, is presented. It gives circularly polarized response with formation of small loop (kink) inside VSWR = 2 circle in the smith chart. Thus the proposed formulation can be used to design circular polarized antenna at any given frequency.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new compact microstrip meandered dual mode loop resonator wideband bandpass filter. The proposed filter is constructed by using bandstop filter with orthogonal direct connected feed lines. The passband is created inside a wide stopband by using the quarter wavelength open circuited stubs which are connected to the opposite sides of the input and output port sides. A small square patch perturbation element is added at right top corner of symmetrical axis of the loop. Perturbation element excites dual degenerate modes thereby improving the selectivity of the filter on both higher and lower side of the passband. Simulated filter is designed at a center frequency of 3.85 GHz shows a very low insertion loss of 0.3 dB and high return loss of above 17 dB with a wide fractional bandwidth of 55.26 %. The introduced filter is compact with low insertion loss, high return loss and wide bandwidth suitable for modern wireless and satellite communication systems.
{"title":"Design of Microstrip Meandered Dual Mode Wideband Bandpass Filter Using Quarter Wavelength Stubs","authors":"K. Avinash, I. S. Rao","doi":"10.1109/ICACC.2015.93","DOIUrl":"https://doi.org/10.1109/ICACC.2015.93","url":null,"abstract":"This paper proposes a new compact microstrip meandered dual mode loop resonator wideband bandpass filter. The proposed filter is constructed by using bandstop filter with orthogonal direct connected feed lines. The passband is created inside a wide stopband by using the quarter wavelength open circuited stubs which are connected to the opposite sides of the input and output port sides. A small square patch perturbation element is added at right top corner of symmetrical axis of the loop. Perturbation element excites dual degenerate modes thereby improving the selectivity of the filter on both higher and lower side of the passband. Simulated filter is designed at a center frequency of 3.85 GHz shows a very low insertion loss of 0.3 dB and high return loss of above 17 dB with a wide fractional bandwidth of 55.26 %. The introduced filter is compact with low insertion loss, high return loss and wide bandwidth suitable for modern wireless and satellite communication systems.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115698748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. S. Jayalakshmi, Ranjana T. P. Rashmi, R. Srinivasan
Replication of a popular file and storing its replica in the locations closer to the clients who are making requests is the best choice to reduce the execution time. Although replication helps in increasing availability, the question of how to decide an optimal replication number and correct locations to place the replicas are open challenges. In this paper, a brief survey on various data center selection and replication strategies used are described. Further, a system model with two phases, data center selection and dynamic data replication, is proposed with an aim to effectively increase the data availability and also reduce user waiting time by very small number of replicas is presented in this paper.
{"title":"Dynamic Data Replication Strategy in Cloud Environments","authors":"D. S. Jayalakshmi, Ranjana T. P. Rashmi, R. Srinivasan","doi":"10.1109/ICACC.2015.79","DOIUrl":"https://doi.org/10.1109/ICACC.2015.79","url":null,"abstract":"Replication of a popular file and storing its replica in the locations closer to the clients who are making requests is the best choice to reduce the execution time. Although replication helps in increasing availability, the question of how to decide an optimal replication number and correct locations to place the replicas are open challenges. In this paper, a brief survey on various data center selection and replication strategies used are described. Further, a system model with two phases, data center selection and dynamic data replication, is proposed with an aim to effectively increase the data availability and also reduce user waiting time by very small number of replicas is presented in this paper.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation.
{"title":"On-the-Fly Encryption Security in Remote Storage","authors":"Arun Prabhakar, P. S. Savin, K. Chandrasekaran","doi":"10.1109/ICACC.2015.102","DOIUrl":"https://doi.org/10.1109/ICACC.2015.102","url":null,"abstract":"Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Earlier, research was restricted to the images acquired by traditional scanners, however an innovative trend of research has emerged with the evolution of portable, high speed digital cameras and multimedia mobile phones comprising smart features. They provided us the opportunity to employ them for image acquisition as an alternate to traditional scanners for the recognition purpose. This subject has attracted numerous researchers, meanwhile it provides a means for automatic processing of substantial amount of data. Text to speech translation of recognized text from images can be ready to lend a hand for visually impaired people and for those who are unfamiliar with the language. This paper provides technical solution for the recognition of Gurmukhi text from the images of different signboards acquired by camera of different resolution. Segmentation is accomplished using vertical and horizontal projection histograms on the pre-processed image which breakdowns the text into lines, words and characters. Feature extraction and recognition on the segmented characters is accomplished by considering at least three corresponding structural features holes, endpoints and junctions. Consequently, our recognition is grounded on the location and number of these features extracted. The proposed algorithm was tested on 1300 images of Gurmukhi text acquired by camera and recognition rate of 90% demonstrates the precision of the system.
{"title":"Optimized Gurmukhi Text Recognition from Signboard Images Captured by Mobile Camera Using Structural Features","authors":"Triptinder Pal Kaur, N. Garg","doi":"10.1109/ICACC.2015.65","DOIUrl":"https://doi.org/10.1109/ICACC.2015.65","url":null,"abstract":"Earlier, research was restricted to the images acquired by traditional scanners, however an innovative trend of research has emerged with the evolution of portable, high speed digital cameras and multimedia mobile phones comprising smart features. They provided us the opportunity to employ them for image acquisition as an alternate to traditional scanners for the recognition purpose. This subject has attracted numerous researchers, meanwhile it provides a means for automatic processing of substantial amount of data. Text to speech translation of recognized text from images can be ready to lend a hand for visually impaired people and for those who are unfamiliar with the language. This paper provides technical solution for the recognition of Gurmukhi text from the images of different signboards acquired by camera of different resolution. Segmentation is accomplished using vertical and horizontal projection histograms on the pre-processed image which breakdowns the text into lines, words and characters. Feature extraction and recognition on the segmented characters is accomplished by considering at least three corresponding structural features holes, endpoints and junctions. Consequently, our recognition is grounded on the location and number of these features extracted. The proposed algorithm was tested on 1300 images of Gurmukhi text acquired by camera and recognition rate of 90% demonstrates the precision of the system.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Driven by multimedia based applications, the future wireless systems require high data rate capable technologies. WiMAX has attracted immense interest globally for next generation wireless communication. The requirement of a spectrally efficient modulation technique and power efficient forward error correction scheme are key factors for these technologies. Wireless link quality is determined by transmission rate, range and reliability. Multiple Input Multiple Output (MIMO), along with Orthogonal Frequency Divsion Multiplexing(OFDM) techniques improve these parameters and are also habituated in WiMAX. It uses smart antenna techniques which include spatial transmit diversity and spatial multiplexing (SM). Spatial transmit diversity is achieved by applying Alamouti's Space Time coding. To achieve high capacity with minimum error rate Low-Density Parity-Check (LDPC) codes have recently drawn much attention and have superior interest because their error correction performance in wide applications. These codes are called Tanner graph which have short cycles that degrade the performance of LDPC decoders. The Quasi Cyclic (QC) LDPC as channel coding method is incorporated in the paper. STBC is used as a MIMO technique providing a strong diversity gain. Analysis of the performance of MIMO OFDM physical layer in WiMAX with the use of LDPC under different digital modulation techniques is presented in this paper.
{"title":"Analysis of MIMO OFDM Based WiMAX System with LDPC","authors":"M. Cheema, S. Kulkarni","doi":"10.1109/ICACC.2015.64","DOIUrl":"https://doi.org/10.1109/ICACC.2015.64","url":null,"abstract":"Driven by multimedia based applications, the future wireless systems require high data rate capable technologies. WiMAX has attracted immense interest globally for next generation wireless communication. The requirement of a spectrally efficient modulation technique and power efficient forward error correction scheme are key factors for these technologies. Wireless link quality is determined by transmission rate, range and reliability. Multiple Input Multiple Output (MIMO), along with Orthogonal Frequency Divsion Multiplexing(OFDM) techniques improve these parameters and are also habituated in WiMAX. It uses smart antenna techniques which include spatial transmit diversity and spatial multiplexing (SM). Spatial transmit diversity is achieved by applying Alamouti's Space Time coding. To achieve high capacity with minimum error rate Low-Density Parity-Check (LDPC) codes have recently drawn much attention and have superior interest because their error correction performance in wide applications. These codes are called Tanner graph which have short cycles that degrade the performance of LDPC decoders. The Quasi Cyclic (QC) LDPC as channel coding method is incorporated in the paper. STBC is used as a MIMO technique providing a strong diversity gain. Analysis of the performance of MIMO OFDM physical layer in WiMAX with the use of LDPC under different digital modulation techniques is presented in this paper.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}