首页 > 最新文献

2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)最新文献

英文 中文
Implementation of digital lock-in and concentration measurement for Wavelength Modulation Spectroscopy (WMS) based sensors using MATLAB 利用MATLAB实现波长调制光谱(WMS)传感器的数字锁定和浓度测量
Manish Chandra, Aditi Sharma, Amrit Roy, A. Venkatesh, S. S. Kamble, J. K. Radhakrishnan, U. K. Singh
Wavelength Modulation Spectroscopy (WMS) using tunable diode laser is a versatile method for determination of concentration, temperature and velocity of absorbing gaseous molecules. This technique finds major application in industrial and scientific areas. An important component of sensors/systems based on these techniques is the phase sensitive detection for demodulation, in the form of hardware or software based lock-in amplifier. This paper presents the details of (a) a MATLAB based Digital Lock-in amplifier technique for extraction of harmonics (1f & 2f), from the wavelength modulated optical absorption signal, and (b) a MATLAB based program for calculating the oxygen concentration from 1f and 2f harmonics. The oxygen concentration has been measured using MATLAB implemented digital lock-in-amplifier and concentration computation formula. The deviation in the measured Oxygen concentration from the actual Oxygen concentration supplied through the mass flow controllers is less than 1%. The oxygen concentration measured using digital Lock-in amplifier has a deviation within 0.2% as compared to measurement from hardware measuring device.
波长调制光谱学(WMS)是一种用于测定气体分子吸收浓度、温度和速度的通用方法。这项技术在工业和科学领域有广泛的应用。基于这些技术的传感器/系统的一个重要组成部分是用于解调的相敏检测,其形式是基于硬件或软件的锁相放大器。本文详细介绍了(a)基于MATLAB的从波长调制光吸收信号中提取谐波(1f和2f)的数字锁相放大器技术,以及(b)基于MATLAB的从1f和2f谐波中计算氧浓度的程序。利用MATLAB实现的数字锁相放大器和浓度计算公式对氧浓度进行了测量。测量的氧气浓度与通过质量流量控制器提供的实际氧气浓度的偏差小于1%。用数字锁相放大器测量的氧浓度与用硬件测量装置测量的氧浓度偏差在0.2%以内。
{"title":"Implementation of digital lock-in and concentration measurement for Wavelength Modulation Spectroscopy (WMS) based sensors using MATLAB","authors":"Manish Chandra, Aditi Sharma, Amrit Roy, A. Venkatesh, S. S. Kamble, J. K. Radhakrishnan, U. K. Singh","doi":"10.1109/SSPS.2017.8071619","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071619","url":null,"abstract":"Wavelength Modulation Spectroscopy (WMS) using tunable diode laser is a versatile method for determination of concentration, temperature and velocity of absorbing gaseous molecules. This technique finds major application in industrial and scientific areas. An important component of sensors/systems based on these techniques is the phase sensitive detection for demodulation, in the form of hardware or software based lock-in amplifier. This paper presents the details of (a) a MATLAB based Digital Lock-in amplifier technique for extraction of harmonics (1f & 2f), from the wavelength modulated optical absorption signal, and (b) a MATLAB based program for calculating the oxygen concentration from 1f and 2f harmonics. The oxygen concentration has been measured using MATLAB implemented digital lock-in-amplifier and concentration computation formula. The deviation in the measured Oxygen concentration from the actual Oxygen concentration supplied through the mass flow controllers is less than 1%. The oxygen concentration measured using digital Lock-in amplifier has a deviation within 0.2% as compared to measurement from hardware measuring device.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127449697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle network security testing 车辆网络安全测试
Jihas Khan
In-vehicle networks like Controller Area Network, FlexRay, Ethernet are now subjected to huge security threats where unauthorized entities can take control of the whole vehicle. This can pose very serious threats including accidents. Security features like encryption, message authentication are getting implemented in vehicle networks to counteract these issues. This paper is proposing a set of novel validation techniques to ensure that vehicle network security is fool proof. Security validation against requirements, security validation using white box approach, black box approach and grey box approaches are put forward. Test system architecture, validation of message authentication, decoding the patterns from vehicle network data, using diagnostics as a security loophole, V2V V2X loopholes, gateway module security testing are considered in detail. Aim of this research paper is to put forward a set of tools and methods for finding and reporting any security loopholes in the in-vehicle network security implementation.
控制器局域网、FlexRay、以太网等车载网络现在面临巨大的安全威胁,未经授权的实体可以控制整个车辆。这可能会造成非常严重的威胁,包括事故。加密、消息验证等安全特性正在车辆网络中实现,以解决这些问题。本文提出了一套新颖的验证技术,以确保车辆网络安全是防傻瓜的。提出了基于需求的安全验证、白盒方法、黑盒方法和灰盒方法的安全验证。详细讨论了测试系统架构、消息认证验证、车联网数据模式解码、利用诊断作为安全漏洞、V2V V2X漏洞、网关模块安全测试等。本研究的目的是提出一套工具和方法来发现和报告车载网络安全实施中的安全漏洞。
{"title":"Vehicle network security testing","authors":"Jihas Khan","doi":"10.1109/SSPS.2017.8071577","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071577","url":null,"abstract":"In-vehicle networks like Controller Area Network, FlexRay, Ethernet are now subjected to huge security threats where unauthorized entities can take control of the whole vehicle. This can pose very serious threats including accidents. Security features like encryption, message authentication are getting implemented in vehicle networks to counteract these issues. This paper is proposing a set of novel validation techniques to ensure that vehicle network security is fool proof. Security validation against requirements, security validation using white box approach, black box approach and grey box approaches are put forward. Test system architecture, validation of message authentication, decoding the patterns from vehicle network data, using diagnostics as a security loophole, V2V V2X loopholes, gateway module security testing are considered in detail. Aim of this research paper is to put forward a set of tools and methods for finding and reporting any security loopholes in the in-vehicle network security implementation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mutual authentication for IoT smart environment using certificate-less public key cryptography 使用无证书公钥加密的物联网智能环境相互认证
Dania Qara Bala, Soumyadev Maity, S. K. Jena
Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.
密钥管理和认证在保证物联网通信安全方面发挥着重要作用。传统的密钥管理协议具有区别性,无法在物联网中应用。智能环境中资源受限的传感器节点与远程终端用户之间的相互认证是物联网认证中的一项具有挑战性的任务。在本文中,我们为此提出了一种新的协议,该协议通过使用无证书公钥加密(CL-PKC)技术来消除证书管理的使用。此外,我们不要求资源受限的传感器节点执行公钥加密。我们提出的协议对节点模拟攻击和重放攻击是安全的。
{"title":"Mutual authentication for IoT smart environment using certificate-less public key cryptography","authors":"Dania Qara Bala, Soumyadev Maity, S. K. Jena","doi":"10.1109/SSPS.2017.8071559","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071559","url":null,"abstract":"Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Jellyfish attack detection and prevention in MANET MANET中水母攻击的检测与预防
B. Pooja, M. Manish, B. P. Megha
Jellyfish attack is type of DoS attack which is difficult to detect and prevent. Jellyfish attack is categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. JF attack delay data packets for some amount of time before forwarding and after reception which results high end-to-end delay in the network. JF Attack disrupts whole functionality of transmission and reduces the performance of network. In this paper difference of receive time and sending time greater than threshold value then delay occur due to congestion or availability of JF nodes that confirm by checking load of network. This way detect and prevent jellyfish attack.
水母攻击是一种难以检测和防范的DoS攻击。水母攻击分为JF重排序攻击、JF周期性掉落攻击和JF延迟方差攻击。JF攻击使数据包在转发之前和接收之后延迟一段时间,从而导致网络中端到端的高延迟。JF攻击破坏了整个传输功能,降低了网络的性能。在本文中,当接收时间和发送时间的差值大于阈值时,由于JF节点的拥塞或可用性导致延迟,通过检查网络负载来确认。这种方法可以探测和防止水母的攻击。
{"title":"Jellyfish attack detection and prevention in MANET","authors":"B. Pooja, M. Manish, B. P. Megha","doi":"10.1109/SSPS.2017.8071564","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071564","url":null,"abstract":"Jellyfish attack is type of DoS attack which is difficult to detect and prevent. Jellyfish attack is categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. JF attack delay data packets for some amount of time before forwarding and after reception which results high end-to-end delay in the network. JF Attack disrupts whole functionality of transmission and reduces the performance of network. In this paper difference of receive time and sending time greater than threshold value then delay occur due to congestion or availability of JF nodes that confirm by checking load of network. This way detect and prevent jellyfish attack.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigation on dielectric resonator antennas 介质谐振器天线的研究
Surendra Kota, N. Gunavathi
The area of wireless communications has been increased from last decade. The success of the second-generation(2G) motivates the development of wideband 3G, 4G, cellular phones and other wireless products and services, including WLAN, local multi-point distributed networks(LMDS), home RF, Bluetooth etc. The crucial component of wireless network is the antenna. Even though our cities flooded with antenna of different kinds of shapes, maximum we prefer safety, low return loss, low power, multifunctional and multi band devices. All the above demands will be fulfilled by the development of highly efficient, small-size, low-profile antennas like micro strip and dielectric resonant antennas (DRAs) in wireless domain. The dielectric resonant antennas are highly preferred when compare to other antennas because of its negligible metallic losses at higher frequencies. In this paper i analyze how to increase impedance bandwidth in Hemispherical DRAs especially for Wi-Fi applications and i compare HDRA characteristics for different layers and with rectangular DRA.
近十年来,无线通信的领域不断扩大。第二代(2G)的成功推动了宽带3G、4G、蜂窝电话等无线产品和服务的发展,包括WLAN、本地多点分布式网络(LMDS)、家庭射频、蓝牙等。无线网络的关键部件是天线。尽管我们的城市充斥着各种形状的天线,但我们更喜欢安全、低回波损耗、低功耗、多功能和多频段的设备。无线领域的微带天线和介电谐振天线(DRAs)等高效、小尺寸、低轮廓天线的发展将满足上述需求。与其他天线相比,介质谐振天线在较高频率下的金属损耗可以忽略不计,因此备受青睐。本文分析了如何提高半球形DRA的阻抗带宽,特别是在Wi-Fi应用中,并比较了不同层和矩形DRA的HDRA特性。
{"title":"Investigation on dielectric resonator antennas","authors":"Surendra Kota, N. Gunavathi","doi":"10.1109/SSPS.2017.8071558","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071558","url":null,"abstract":"The area of wireless communications has been increased from last decade. The success of the second-generation(2G) motivates the development of wideband 3G, 4G, cellular phones and other wireless products and services, including WLAN, local multi-point distributed networks(LMDS), home RF, Bluetooth etc. The crucial component of wireless network is the antenna. Even though our cities flooded with antenna of different kinds of shapes, maximum we prefer safety, low return loss, low power, multifunctional and multi band devices. All the above demands will be fulfilled by the development of highly efficient, small-size, low-profile antennas like micro strip and dielectric resonant antennas (DRAs) in wireless domain. The dielectric resonant antennas are highly preferred when compare to other antennas because of its negligible metallic losses at higher frequencies. In this paper i analyze how to increase impedance bandwidth in Hemispherical DRAs especially for Wi-Fi applications and i compare HDRA characteristics for different layers and with rectangular DRA.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129653368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure three-party authentication protocol for wireless body area networks 无线体域网络的安全三方认证协议
Rahul Vishwakarma, R. Mohapatra
Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.
无线体域网络(WBAN)是医疗领域发展最为迅速的技术之一。然而,由于无线宽带网络中交换的敏感数据受到资源的限制,在无线宽带网络上提供安全的通信系统是一项具有挑战性的任务。本文提出了一种基于椭圆曲线加密(ECC)的高效无线宽带网络三方认证协议。我们采用基于WBAN标准的两跳星型网络拓扑结构。BAN逻辑和AVIS PA工具的分析结果为协议的安全性提供了证明。实现结果证明了协议的有效性。
{"title":"A secure three-party authentication protocol for wireless body area networks","authors":"Rahul Vishwakarma, R. Mohapatra","doi":"10.1109/SSPS.2017.8071573","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071573","url":null,"abstract":"Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129751496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of supervised machine learning techniques for sentiment analysis 情感分析中监督式机器学习技术的性能分析
Biswaranjan Samal, Anil Behera, M. Panda
Wide use of internet and web applications like, feedback collection systems are now making peoples smarter. In these applications, peoples used to give their feedback about the movies, products, services, etc through which they have gone, and this feedback are publicly available for future references. It is a tedious task for the machines to identify the feedback types, i:e positive or negative. And here Machine Learning Techniques plays vital roles to train the machine and make it intelligent so that the machine will be able to identify the feedback type which may give more benefits and features for those web applications and the users. There are many supervised machine learning techniques are available so it is a difficult task to choose the best one. In this paper, we have collected the movie review datasets of different sizes and have selected some of the widely used and popular supervised machine learning algorithms, for training the model. So that the model will be able to categorize the review. Python's NLTK package along with the WinPython and Spyder are used for processing the movie reviews. Then Python's sklearn package is used for training the model and finding the accuracy of the model.
广泛使用互联网和网络应用程序,如反馈收集系统,现在使人们更聪明。在这些应用程序中,人们过去常常对他们看过的电影、产品、服务等给出反馈,这些反馈是公开的,供将来参考。对于机器来说,识别反馈类型是一项繁琐的任务,无论是积极的还是消极的。在这里,机器学习技术在训练机器并使其智能化方面发挥着至关重要的作用,这样机器就能够识别反馈类型,从而为这些网络应用程序和用户提供更多的好处和功能。有许多监督机器学习技术可用,因此选择最好的技术是一项困难的任务。在本文中,我们收集了不同规模的电影评论数据集,并选择了一些广泛使用和流行的监督机器学习算法来训练模型。这样模型就可以对评论进行分类。Python的NLTK包以及WinPython和Spyder用于处理电影评论。然后使用Python的sklearn包来训练模型并查找模型的准确性。
{"title":"Performance analysis of supervised machine learning techniques for sentiment analysis","authors":"Biswaranjan Samal, Anil Behera, M. Panda","doi":"10.1109/SSPS.2017.8071579","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071579","url":null,"abstract":"Wide use of internet and web applications like, feedback collection systems are now making peoples smarter. In these applications, peoples used to give their feedback about the movies, products, services, etc through which they have gone, and this feedback are publicly available for future references. It is a tedious task for the machines to identify the feedback types, i:e positive or negative. And here Machine Learning Techniques plays vital roles to train the machine and make it intelligent so that the machine will be able to identify the feedback type which may give more benefits and features for those web applications and the users. There are many supervised machine learning techniques are available so it is a difficult task to choose the best one. In this paper, we have collected the movie review datasets of different sizes and have selected some of the widely used and popular supervised machine learning algorithms, for training the model. So that the model will be able to categorize the review. Python's NLTK package along with the WinPython and Spyder are used for processing the movie reviews. Then Python's sklearn package is used for training the model and finding the accuracy of the model.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Energy efficient routing in mobile Ad-hoc network 移动Ad-hoc网络中的节能路由
K. Rinku, M. Manish, B. P. Megha
MANET is kind of mobile ad hoc network. MANETs are having self organizing and self configuring network and there is no centralized base station. In routing forwarding the data packets on one node to another node is core problem in the networks. Overcome to this problem to build up challenging task an efficient routing algorithm in MANET. Here we proposed method energy for routing in MANET and based on signal strength. Received Signal Strength (RSS) measured distance between two nodes. If value of RSS is greater than Th_RSS than intermediate node compare value of RSS and Th_RSS then accepted RREQ packet otherwise drop the packet and send to the next node it calculate node energy. If value of RSS is greater than Th_RSS than intermediate node will compare the value of residual energy RE with Energy_ threshold and value of queue length QLen with threshold of squeue length Th_QLen, then send RREQ packet next node otherwise drop the packet. This method is increases in network lifetime.
MANET是一种移动自组织网络。manet具有自组织自配置的特点,没有集中的基站。在路由中,将一个节点上的数据包转发到另一个节点是网络中的核心问题。为了克服这一难题,提出了一种高效的自组网路由算法。本文提出了一种基于信号强度的自组网路由能量算法。接收信号强度(RSS)测量两个节点之间的距离。如果中间节点的RSS值大于Th_RSS值,则接受RREQ报文,否则丢弃报文并发送到下一个节点,计算节点能量。如果RSS值大于Th_RSS值,中间节点将剩余能量RE值与Energy_ threshold值进行比较,队列长度QLen值与队列长度Th_QLen值进行比较,则发送RREQ报文,否则丢弃报文。这种方法会增加网络生存期。
{"title":"Energy efficient routing in mobile Ad-hoc network","authors":"K. Rinku, M. Manish, B. P. Megha","doi":"10.1109/SSPS.2017.8071563","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071563","url":null,"abstract":"MANET is kind of mobile ad hoc network. MANETs are having self organizing and self configuring network and there is no centralized base station. In routing forwarding the data packets on one node to another node is core problem in the networks. Overcome to this problem to build up challenging task an efficient routing algorithm in MANET. Here we proposed method energy for routing in MANET and based on signal strength. Received Signal Strength (RSS) measured distance between two nodes. If value of RSS is greater than Th_RSS than intermediate node compare value of RSS and Th_RSS then accepted RREQ packet otherwise drop the packet and send to the next node it calculate node energy. If value of RSS is greater than Th_RSS than intermediate node will compare the value of residual energy RE with Energy_ threshold and value of queue length QLen with threshold of squeue length Th_QLen, then send RREQ packet next node otherwise drop the packet. This method is increases in network lifetime.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low voltage low power sub-threshold operational amplifier in 180nm CMOS 180nm CMOS低电压低功率亚阈值运算放大器
C. Yadav, Sunita Prasad
A two-stage operational amplifier for biomedical applications is presented in this paper. In the Op-Amp design, all transistors have been operated in sub-threshold region for low voltage low power application. The proposed Op-Amp has been designed based on TSMC foundry 180nm process and simulated in Cadence analog design environment. The proposed circuit generates a 40dB gain, 114 KHz UGBW, 72 deg phase margin & total power consumption is just 112nW with 0.8V battery.
介绍了一种用于生物医学的两级运算放大器。在运算放大器设计中,所有的晶体管都工作在亚阈值区域,用于低电压低功耗应用。基于TSMC代工180nm工艺设计了该运算放大器,并在Cadence模拟设计环境中进行了仿真。该电路产生40dB增益,114 KHz UGBW, 72°相位裕度,总功耗仅为112nW,电池电压为0.8V。
{"title":"Low voltage low power sub-threshold operational amplifier in 180nm CMOS","authors":"C. Yadav, Sunita Prasad","doi":"10.1109/SSPS.2017.8071560","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071560","url":null,"abstract":"A two-stage operational amplifier for biomedical applications is presented in this paper. In the Op-Amp design, all transistors have been operated in sub-threshold region for low voltage low power application. The proposed Op-Amp has been designed based on TSMC foundry 180nm process and simulated in Cadence analog design environment. The proposed circuit generates a 40dB gain, 114 KHz UGBW, 72 deg phase margin & total power consumption is just 112nW with 0.8V battery.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Smart industry pollution monitoring and controlling using LabVIEW based IoT 基于LabVIEW的物联网智能工业污染监测与控制
Kunjabihari Swain, G. Santamanyu, Amiya Ranjan Senapati
With the advent of IoT based technologies; the overall industrial sector is amenable to undergo a fundamental and essential change alike to the industrial revolution. Online Monitoring solutions of environmental polluting parameter using Internet Of Things (IoT) techniques help us to gather the parameter values such as pH, temperature, humidity and concentration of carbon monoxide gas, etc. Using sensors and enables to have a keen control on the environmental pollution caused by the industries. This paper introduces a LabVIEW based online pollution monitoring of industries for the control over pollution caused by untreated disposal of waste. This paper proposes the use of an AT-mega 2560 Arduino board which collects the temperature and humidity parameter from the DHT-11 sensor, carbon dioxide concentration using MG-811 and update it into the online database using MYSQL. For monitoring and controlling, a website is designed and hosted which will give a real essence of IoT. To increase the reliability and flexibility an android application is also developed.
随着物联网技术的出现;整个工业部门有可能经历一场与工业革命类似的根本和本质的变革。利用物联网技术的环境污染参数在线监测解决方案,帮助我们收集诸如pH值、温度、湿度、一氧化碳气体浓度等参数值。利用传感器,能够对工业造成的环境污染进行敏锐的控制。本文介绍了一种基于LabVIEW的工业污染在线监测系统,用于对未经处理的废物处理造成的污染进行控制。本文提出使用AT-mega 2560 Arduino板,通过DHT-11传感器采集温湿度参数,通过MG-811采集二氧化碳浓度,并通过MYSQL更新到在线数据库中。为了监测和控制,设计和托管一个网站,这将赋予物联网的真正本质。为了提高可靠性和灵活性,还开发了一个android应用程序。
{"title":"Smart industry pollution monitoring and controlling using LabVIEW based IoT","authors":"Kunjabihari Swain, G. Santamanyu, Amiya Ranjan Senapati","doi":"10.1109/SSPS.2017.8071568","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071568","url":null,"abstract":"With the advent of IoT based technologies; the overall industrial sector is amenable to undergo a fundamental and essential change alike to the industrial revolution. Online Monitoring solutions of environmental polluting parameter using Internet Of Things (IoT) techniques help us to gather the parameter values such as pH, temperature, humidity and concentration of carbon monoxide gas, etc. Using sensors and enables to have a keen control on the environmental pollution caused by the industries. This paper introduces a LabVIEW based online pollution monitoring of industries for the control over pollution caused by untreated disposal of waste. This paper proposes the use of an AT-mega 2560 Arduino board which collects the temperature and humidity parameter from the DHT-11 sensor, carbon dioxide concentration using MG-811 and update it into the online database using MYSQL. For monitoring and controlling, a website is designed and hosted which will give a real essence of IoT. To increase the reliability and flexibility an android application is also developed.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115810990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1