首页 > 最新文献

2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)最新文献

英文 中文
Signal generation employing Chebyshev polynomial for pulse compression with small relative side-lobe level 信号产生采用切比雪夫多项式的脉冲压缩与小的相对旁瓣电平
Ankur Thakur, S. Talluri, D. Saini
The theme of this paper is to present the improvement in the peak side-lobe levels (PSL) and time-bandwidth product with Chebyshev polynomial. This PSL behavior is observed by the matched filter (MF) response, which contains main-lobe width as well as side-lobes. Here to get a better reduction in the side-lobes, Chebyshev polynomials are modified by using zero-crossing there by getting the positive and negative pulse. Here two cases have been considered, in first ordinary Chebyshev polynomial are analyzed, second is a modification in the cycles of Chebyshev polynomial is incorporated. After this the smallest duration of the pulse has been used in determining the optimal duration which has the smallest mean square error (MSE) between the number of pulses incorporated and original signal. This is giving a much larger signal with less PSL by reducing the search domain considerably. This new method tries to implement a side lobe level reduction technique. All of the mentioned procedure is carried out by mathematical equations and simulation verification.
本文的主题是提出用切比雪夫多项式改善峰值旁瓣电平和时带宽积。这种PSL行为是通过匹配滤波器(MF)响应观察到的,该响应包含主瓣宽度和副瓣。为了更好地减少旁瓣,切比雪夫多项式被修改了通过得到正脉冲和负脉冲进行过零处理。本文考虑了两种情况,一是分析了普通的切比雪夫多项式,二是在切比雪夫多项式的循环中加入了一个修正。在此之后,脉冲的最小持续时间被用于确定在合并的脉冲数与原始信号之间具有最小均方误差(MSE)的最佳持续时间。这是通过大大减少搜索域,以更少的PSL给出更大的信号。这种新方法尝试实现一种旁瓣电平降低技术。所有这些过程都是通过数学方程和仿真验证进行的。
{"title":"Signal generation employing Chebyshev polynomial for pulse compression with small relative side-lobe level","authors":"Ankur Thakur, S. Talluri, D. Saini","doi":"10.1109/SSPS.2017.8071576","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071576","url":null,"abstract":"The theme of this paper is to present the improvement in the peak side-lobe levels (PSL) and time-bandwidth product with Chebyshev polynomial. This PSL behavior is observed by the matched filter (MF) response, which contains main-lobe width as well as side-lobes. Here to get a better reduction in the side-lobes, Chebyshev polynomials are modified by using zero-crossing there by getting the positive and negative pulse. Here two cases have been considered, in first ordinary Chebyshev polynomial are analyzed, second is a modification in the cycles of Chebyshev polynomial is incorporated. After this the smallest duration of the pulse has been used in determining the optimal duration which has the smallest mean square error (MSE) between the number of pulses incorporated and original signal. This is giving a much larger signal with less PSL by reducing the search domain considerably. This new method tries to implement a side lobe level reduction technique. All of the mentioned procedure is carried out by mathematical equations and simulation verification.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IoT enabled plant soil moisture monitoring using wireless sensor networks 物联网支持植物土壤湿度监测,使用无线传感器网络
A.M. Ezhilazhahi, P. Bhuvaneswari
In recent years, the increasing demand on organic farming necessitates continuous monitoring of plant health. In order to ensure the quality and quantity this becomes more essential. Hence, the objective of this research is to develop a remote monitoring system that continuously monitors the soil moisture of the plant. The Wireless Sensor Network (WSN) is integrated with Internet of Things (IoT) to achieve the above objective. Further, to enhance the network lifetime, Exponential Weighted Moving Average (EWMA) event detection algorithm is adopted in the proposed research.
近年来,对有机农业的需求不断增加,需要对植物健康进行持续监测。为了保证质量和数量,这一点变得更加重要。因此,本研究的目的是开发一种远程监测系统,连续监测植物的土壤湿度。无线传感器网络(WSN)与物联网(IoT)相结合,以实现上述目标。此外,为了提高网络的生存期,本研究采用了指数加权移动平均(Exponential Weighted Moving Average, EWMA)事件检测算法。
{"title":"IoT enabled plant soil moisture monitoring using wireless sensor networks","authors":"A.M. Ezhilazhahi, P. Bhuvaneswari","doi":"10.1109/SSPS.2017.8071618","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071618","url":null,"abstract":"In recent years, the increasing demand on organic farming necessitates continuous monitoring of plant health. In order to ensure the quality and quantity this becomes more essential. Hence, the objective of this research is to develop a remote monitoring system that continuously monitors the soil moisture of the plant. The Wireless Sensor Network (WSN) is integrated with Internet of Things (IoT) to achieve the above objective. Further, to enhance the network lifetime, Exponential Weighted Moving Average (EWMA) event detection algorithm is adopted in the proposed research.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123645927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A back-up protection of teed-transmission line using Taylor-Kalman-Fourier filter 基于泰勒-卡尔曼-傅立叶滤波的输电网后备保护
Abhishek Kumar, P. Babu, N. Babu, Saptarshi Roy
A second order Taylor-Kalman-Fourier (T2KF) filter based backup protection of teed-transmission network is demonstrated in this paper. The measured current and voltage signals at relaying end will be supplied to the proposed T2KF filter to estimation of the faulty section from relaying point. This algorithm has considered the out-feeding effect in the presence of practical load for estimating the fault impedance accurately. The proposed method is tested on a teed-transmission network. The results show that this method has identified the faults in backup zones successfully.
提出了一种基于二阶泰勒-卡尔曼-傅立叶(T2KF)滤波器的馈网备份保护方法。将继电端测量到的电流和电压信号提供给T2KF滤波器,从继电点对故障段进行估计。该算法考虑了实际负载存在时的出馈电效应,以准确估计故障阻抗。在一个馈源传输网络上对该方法进行了测试。结果表明,该方法能较好地识别出备份区故障。
{"title":"A back-up protection of teed-transmission line using Taylor-Kalman-Fourier filter","authors":"Abhishek Kumar, P. Babu, N. Babu, Saptarshi Roy","doi":"10.1109/SSPS.2017.8071598","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071598","url":null,"abstract":"A second order Taylor-Kalman-Fourier (T2KF) filter based backup protection of teed-transmission network is demonstrated in this paper. The measured current and voltage signals at relaying end will be supplied to the proposed T2KF filter to estimation of the faulty section from relaying point. This algorithm has considered the out-feeding effect in the presence of practical load for estimating the fault impedance accurately. The proposed method is tested on a teed-transmission network. The results show that this method has identified the faults in backup zones successfully.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124734007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Brain tumor detection using SVM classifier 基于SVM分类器的脑肿瘤检测
T. Kumar, K. Rashmi, Sreevidhya Ramadoss, L. K. Sandhya, T. J. Sangeetha
Magnetic Resonance Imaging is a standard non-invasive methodology used in medical field for the analysis, diagnosis and treatment of brain tissues. The early diagnosis of brain tumor helps in saving the patients' life by providing proper treatment. The accurate detection of tumors in the MRI slices becomes a fastidious task to perform and therefore, by this proposed system, the classification and segmentation the tumor region can be done accurately. Segmentation and 3D reconstruction also uses the detection of tumor from an MR image. The manual tracing and visual exploration by doctors will be restrained in order to avoid time consumption. The brain tumor detection allows localizing a mass of abnormal cells in a slice of Magnetic Resonance (MR) using SVM Classifier and segmentation of the tumor cells to know about the size of the tumor present in that segmented area. The extracted features of the segmented portion will be trained using artificial neural network to display the type of the tumor. These features will also be used for comparing the accuracy of different classifiers in Classification learner app. The scope of this project is helpful in post processing of the extracted region like the tumor segmentation.
磁共振成像是医学领域用于分析、诊断和治疗脑组织的一种标准的非侵入性方法。脑肿瘤的早期诊断通过提供适当的治疗有助于挽救患者的生命。在MRI切片中对肿瘤的准确检测成为一项繁琐的任务,因此,该系统可以准确地对肿瘤区域进行分类和分割。分割和三维重建也使用从磁共振图像中检测肿瘤。为了避免耗费时间,医生的手工追踪和视觉探查将被限制。脑肿瘤检测允许使用SVM分类器在磁共振(MR)切片中定位大量异常细胞,并对肿瘤细胞进行分割,以了解该分割区域中存在的肿瘤大小。利用人工神经网络对提取的分割部分特征进行训练,显示肿瘤的类型。这些特征还将用于比较分类学习app中不同分类器的准确率。本项目的范围有助于对提取区域的后处理,如肿瘤分割。
{"title":"Brain tumor detection using SVM classifier","authors":"T. Kumar, K. Rashmi, Sreevidhya Ramadoss, L. K. Sandhya, T. J. Sangeetha","doi":"10.1109/SSPS.2017.8071613","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071613","url":null,"abstract":"Magnetic Resonance Imaging is a standard non-invasive methodology used in medical field for the analysis, diagnosis and treatment of brain tissues. The early diagnosis of brain tumor helps in saving the patients' life by providing proper treatment. The accurate detection of tumors in the MRI slices becomes a fastidious task to perform and therefore, by this proposed system, the classification and segmentation the tumor region can be done accurately. Segmentation and 3D reconstruction also uses the detection of tumor from an MR image. The manual tracing and visual exploration by doctors will be restrained in order to avoid time consumption. The brain tumor detection allows localizing a mass of abnormal cells in a slice of Magnetic Resonance (MR) using SVM Classifier and segmentation of the tumor cells to know about the size of the tumor present in that segmented area. The extracted features of the segmented portion will be trained using artificial neural network to display the type of the tumor. These features will also be used for comparing the accuracy of different classifiers in Classification learner app. The scope of this project is helpful in post processing of the extracted region like the tumor segmentation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Sub-system model for data collection and distributed sensing search technique for Internet of Things applications 物联网应用中数据采集和分布式传感搜索技术的子系统模型
K. Sriraghav, N. Vidya, G. Varshitha, S. Jayanthi, K. R. S. Chandran
The Internet of Things (IoT) is spanning into the most diverse, widespread and pervasive global network of all. In IoT applications, enormous amounts of heterogeneous and unstructured data are continuously generated on an unprecedented scale. The data sensed is sent across the network which increases the network traffic. Retrieving the data in an efficient and economical way is also a challenge. The paper proposes clustered-tier architecture, where sensors are clustered based on their geographical area and controlled by a secondary controller. The sensors can communicate only to the secondary controller while the secondary controllers are connected to the sink. There is assumed to be no sensor-sensor communication. Dynamic relocation of sensors is also addressed. For an environmental monitoring system, the proposed system reduces the network traffic on an average by 58% compared to existing distributive sensing search techniques for IoT.
物联网(IoT)正在成为最多样化、最广泛和最普遍的全球网络。在物联网应用中,以前所未有的规模不断产生大量异构和非结构化数据。感知到的数据通过网络发送,这增加了网络流量。以高效和经济的方式检索数据也是一个挑战。本文提出了一种基于地理区域的聚类层结构,通过二级控制器对传感器进行控制。当从控制器连接到接收器时,传感器只能与从控制器通信。假定没有传感器与传感器之间的通信。还讨论了传感器的动态重新定位。对于环境监测系统,与现有的物联网分布式传感搜索技术相比,所提出的系统平均减少了58%的网络流量。
{"title":"Sub-system model for data collection and distributed sensing search technique for Internet of Things applications","authors":"K. Sriraghav, N. Vidya, G. Varshitha, S. Jayanthi, K. R. S. Chandran","doi":"10.1109/SSPS.2017.8071556","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071556","url":null,"abstract":"The Internet of Things (IoT) is spanning into the most diverse, widespread and pervasive global network of all. In IoT applications, enormous amounts of heterogeneous and unstructured data are continuously generated on an unprecedented scale. The data sensed is sent across the network which increases the network traffic. Retrieving the data in an efficient and economical way is also a challenge. The paper proposes clustered-tier architecture, where sensors are clustered based on their geographical area and controlled by a secondary controller. The sensors can communicate only to the secondary controller while the secondary controllers are connected to the sink. There is assumed to be no sensor-sensor communication. Dynamic relocation of sensors is also addressed. For an environmental monitoring system, the proposed system reduces the network traffic on an average by 58% compared to existing distributive sensing search techniques for IoT.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware validation for intelligibility improvement of NELE on DSP processor 在DSP处理器上提高NELE可理解性的硬件验证
K. Arvind, B. S. Premananda, S. Yellampalli
In communication systems, the speech signal is affected by background noise which reduces perception of the received speech. In the near-end scenario, noise can't besuppressed as it is generated in real time (background) and it reaches human ear directly. Smart way is to enhance the speech samples with respect to varying background noise. This fact opens a space for developing an algorithm that would be capable of sensing the magnitude of noise and adjusting the amplitude of the speech samples according to near-end (background) noise. Based on the noise level, speech samples can be enhanced dynamically to make it more acoustic. This work focuses on averaging the gain obtained by analyzing the speech and noise energy frame-wise to obtain the smooth gain and then implementing the Near End Listening Enhancement (NELE) algorithm on DSP TMS320C6713 processor for hardware validation. The intelligibility of the unprocessed and processed speech samples is assessed using Speech Intelligibility Index (SII).
在通信系统中,语音信号受到背景噪声的影响,从而降低了接收语音的感知。在近端场景中,噪音无法被抑制,因为它是实时产生的(背景),它直接到达人耳。聪明的方法是增强语音样本相对于不同的背景噪声。这一事实为开发一种能够感知噪声大小并根据近端(背景)噪声调整语音样本幅度的算法开辟了空间。基于噪声水平,语音样本可以动态增强,使其更具声学效果。本工作重点是通过逐帧分析语音和噪声能量来平均增益,获得平滑增益,然后在DSP TMS320C6713处理器上实现近端收听增强(NELE)算法,进行硬件验证。使用语音清晰度指数(SII)对未处理和处理后的语音样本的可理解性进行评估。
{"title":"Hardware validation for intelligibility improvement of NELE on DSP processor","authors":"K. Arvind, B. S. Premananda, S. Yellampalli","doi":"10.1109/SSPS.2017.8071575","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071575","url":null,"abstract":"In communication systems, the speech signal is affected by background noise which reduces perception of the received speech. In the near-end scenario, noise can't besuppressed as it is generated in real time (background) and it reaches human ear directly. Smart way is to enhance the speech samples with respect to varying background noise. This fact opens a space for developing an algorithm that would be capable of sensing the magnitude of noise and adjusting the amplitude of the speech samples according to near-end (background) noise. Based on the noise level, speech samples can be enhanced dynamically to make it more acoustic. This work focuses on averaging the gain obtained by analyzing the speech and noise energy frame-wise to obtain the smooth gain and then implementing the Near End Listening Enhancement (NELE) algorithm on DSP TMS320C6713 processor for hardware validation. The intelligibility of the unprocessed and processed speech samples is assessed using Speech Intelligibility Index (SII).","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of window length in combining blind source separation and beamforming 窗长对盲源分离与波束形成相结合的影响
R. Johnson
Beamforming (BF) and Blind Source Separation (BSS) have similar goals in terms of signal separation. Combining both these techniques to overcome the drawbacks faced in both the processes is always an interesting task. BSS suffers a serious issue of permutation ambiguity which can be solved by combining it with BF. While combining both BSS and BF, Short Time Fourier Transform (STFT) is used in order to have the information about the signal's frequency content and the variations of its content over time since all the time related information is lost while we deal the BSS problem in frequency domain. The window length in STFT has a serious effect on the Signal to Interference Ratio (SIR) while the separation of signal is done. The result is tested in a free field environment with two speech sources.
波束形成(BF)和盲源分离(BSS)在信号分离方面具有相似的目标。结合这两种技术来克服这两种过程中面临的缺点总是一项有趣的任务。BSS存在严重的排列歧义问题,可将其与BF相结合加以解决。在结合BSS和BF的同时,由于在频域处理BSS问题时所有与时间相关的信息都会丢失,因此使用短时傅里叶变换(STFT)来获得信号的频率内容及其随时间变化的信息。在进行信号分离时,STFT中的窗长对信号的信干扰比(SIR)有很大影响。结果在两个语音源的自由场环境中进行了测试。
{"title":"Effect of window length in combining blind source separation and beamforming","authors":"R. Johnson","doi":"10.1109/SSPS.2017.8071638","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071638","url":null,"abstract":"Beamforming (BF) and Blind Source Separation (BSS) have similar goals in terms of signal separation. Combining both these techniques to overcome the drawbacks faced in both the processes is always an interesting task. BSS suffers a serious issue of permutation ambiguity which can be solved by combining it with BF. While combining both BSS and BF, Short Time Fourier Transform (STFT) is used in order to have the information about the signal's frequency content and the variations of its content over time since all the time related information is lost while we deal the BSS problem in frequency domain. The window length in STFT has a serious effect on the Signal to Interference Ratio (SIR) while the separation of signal is done. The result is tested in a free field environment with two speech sources.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"56 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132949762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure key-distribution in IoT cloud networks 物联网云网络中的安全密钥分发
Soumya Ranjan Moharana, V. Jha, Anurag Satpathy, S. K. Addya, A. K. Turuk, B. Majhi
Internet of Things (IoT) cloud networks is itself a pervasive idea where all the physical objects are connected over the internet and are allocated with special self-identifying ability to discover other potential objects to transmit data over the internet. The most important shortcoming of IoT cloud networks which needs immediate addressing is the issue of IoT nodes when used within a virtual network of a cloud system. The IoT nodes often communicate over a virtual network and this communication needs to be monitored and managed by the cloud service provider (CSP). This CSP needs to make sure that no IoT node with malicious intent can thrive in such a network. In this paper we propose a framework for the security over virtual network for IoT nodes in a cloud system. Firstly, we propose a secure key management protocol between the CSP and the user group having the IoT nodes using a balanced incomplete block design (BIBD) model. Secondly, we device a lightweight cryptographic technique involving a key exchange protocol to establish a secure end-to-end communication between the IoT nodes. Finally we measure the efficiency and resiliency of the distribution using different metrics.
物联网(IoT)云网络本身就是一个普遍的想法,所有的物理对象都通过互联网连接起来,并被赋予特殊的自我识别能力,以发现其他潜在的对象,以便在互联网上传输数据。物联网云网络需要立即解决的最重要的缺点是在云系统的虚拟网络中使用物联网节点的问题。物联网节点通常通过虚拟网络进行通信,这种通信需要由云服务提供商(CSP)进行监控和管理。该CSP需要确保没有恶意的物联网节点可以在这样的网络中茁壮成长。本文提出了一种云系统中物联网节点虚拟网络安全框架。首先,我们使用平衡不完全块设计(BIBD)模型在CSP和具有IoT节点的用户组之间提出了安全密钥管理协议。其次,我们采用了一种轻量级加密技术,涉及密钥交换协议,以在物联网节点之间建立安全的端到端通信。最后,我们使用不同的指标来衡量分配的效率和弹性。
{"title":"Secure key-distribution in IoT cloud networks","authors":"Soumya Ranjan Moharana, V. Jha, Anurag Satpathy, S. K. Addya, A. K. Turuk, B. Majhi","doi":"10.1109/SSPS.2017.8071591","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071591","url":null,"abstract":"Internet of Things (IoT) cloud networks is itself a pervasive idea where all the physical objects are connected over the internet and are allocated with special self-identifying ability to discover other potential objects to transmit data over the internet. The most important shortcoming of IoT cloud networks which needs immediate addressing is the issue of IoT nodes when used within a virtual network of a cloud system. The IoT nodes often communicate over a virtual network and this communication needs to be monitored and managed by the cloud service provider (CSP). This CSP needs to make sure that no IoT node with malicious intent can thrive in such a network. In this paper we propose a framework for the security over virtual network for IoT nodes in a cloud system. Firstly, we propose a secure key management protocol between the CSP and the user group having the IoT nodes using a balanced incomplete block design (BIBD) model. Secondly, we device a lightweight cryptographic technique involving a key exchange protocol to establish a secure end-to-end communication between the IoT nodes. Finally we measure the efficiency and resiliency of the distribution using different metrics.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Hybrid adaptive routing algorithm for 2D mesh on-chip networks 二维网格片上网络的混合自适应路由算法
S. Gogula Krishnan, T. Inbarasan, P. Chitra
The congestion in on-chip networks is a major factor that degrades the performance due to increased message latency. In this paper, we present a hybrid routing scheme based on the reinforcement learning method, Q-leaning and odd-even turn model for 2-D mesh topology. This approach restricts the locations where some turns can be taken so that deadlock is avoided and also avoids congestion by considering the latency related information stored in the routing table. This hybrid Odd even Q routing (HOEQ) approach results in better routing decision and turns out to be more reliable. Experimental results show that the proposed approach performs better for given traffic patterns.
由于消息延迟增加,片上网络中的拥塞是降低性能的一个主要因素。本文提出了一种基于强化学习方法、q学习和奇偶转弯模型的二维网格拓扑混合路由方案。这种方法限制了可以进行轮询的位置,从而避免了死锁,并且考虑了存储在路由表中的延迟相关信息,从而避免了拥塞。这种混合奇偶Q路由(HOEQ)方法具有更好的路由决策和更高的可靠性。实验结果表明,该方法在给定的交通模式下具有较好的性能。
{"title":"Hybrid adaptive routing algorithm for 2D mesh on-chip networks","authors":"S. Gogula Krishnan, T. Inbarasan, P. Chitra","doi":"10.1109/SSPS.2017.8071607","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071607","url":null,"abstract":"The congestion in on-chip networks is a major factor that degrades the performance due to increased message latency. In this paper, we present a hybrid routing scheme based on the reinforcement learning method, Q-leaning and odd-even turn model for 2-D mesh topology. This approach restricts the locations where some turns can be taken so that deadlock is avoided and also avoids congestion by considering the latency related information stored in the routing table. This hybrid Odd even Q routing (HOEQ) approach results in better routing decision and turns out to be more reliable. Experimental results show that the proposed approach performs better for given traffic patterns.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
M-commerce shopping using NFC 使用NFC的移动商务购物
Jaymala Dave, Sagar Gondaliya, Bhumi Patel, A. Mascarenhas, Maya Varghese
In RFID based system, the details of the products are displayed on the LCD screen which is attached to the cart/trolley as the products are dropped in to the trolley and at the end of shopping the customers pays the bill shown on the LCD screen and conform their payment. The recommended system goals to switch heavy basket/cart with smartphones. Smartphones come with a prebuilt NFC reader/writer. These readers can read NFC tags. In the shopping centre, each product would have 1 NFC tag that holds whole information about that product. Customer can touch or wave their mobile on NFC tag and add/remove the product to/from the trolley on their mobile. There is no want to carry the trolley/physical cart. At the merchant's end, there would be a system for billing where customer would scan their smartphone and transfer the product particulars for billing. This way the system reduces the physical task by customer load effectively. The Range of NFC is 4–10 cm (compared to RFID is 1.5 cm), cost of NFC system is inexpensive than RFID, Avg processing time of NFC is 0.98(compared to RFID is 0.99). Both NFC and RFID having similar status scenario (Complete listings of the products, Automatic billing, Update inventory in the central system).
在基于RFID的系统中,产品的详细信息显示在附在购物车/手推车上的LCD屏幕上,当产品被放入手推车时,在购物结束时,顾客支付显示在LCD屏幕上的账单并确认他们的付款。推荐的系统目标是将沉重的篮子/购物车换成智能手机。智能手机自带NFC读写器。这些阅读器可以读取NFC标签。在购物中心,每个产品都有一个NFC标签,其中包含有关该产品的全部信息。顾客可以触摸或挥动带有NFC标签的手机,并在他们的手机上向手推车中添加/移除产品。没有人想搬手推车/手推车。在商家端,将有一个计费系统,客户可以扫描他们的智能手机,并将产品细节转移到计费系统。通过这种方式,系统有效地减少了客户负载的物理任务。NFC的范围为4-10 cm(相比RFID为1.5 cm), NFC系统的成本比RFID便宜,平均处理时间为0.98(相比RFID为0.99)。NFC和RFID都具有类似的状态场景(产品完整列表,自动计费,在中央系统中更新库存)。
{"title":"M-commerce shopping using NFC","authors":"Jaymala Dave, Sagar Gondaliya, Bhumi Patel, A. Mascarenhas, Maya Varghese","doi":"10.1109/SSPS.2017.8071592","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071592","url":null,"abstract":"In RFID based system, the details of the products are displayed on the LCD screen which is attached to the cart/trolley as the products are dropped in to the trolley and at the end of shopping the customers pays the bill shown on the LCD screen and conform their payment. The recommended system goals to switch heavy basket/cart with smartphones. Smartphones come with a prebuilt NFC reader/writer. These readers can read NFC tags. In the shopping centre, each product would have 1 NFC tag that holds whole information about that product. Customer can touch or wave their mobile on NFC tag and add/remove the product to/from the trolley on their mobile. There is no want to carry the trolley/physical cart. At the merchant's end, there would be a system for billing where customer would scan their smartphone and transfer the product particulars for billing. This way the system reduces the physical task by customer load effectively. The Range of NFC is 4–10 cm (compared to RFID is 1.5 cm), cost of NFC system is inexpensive than RFID, Avg processing time of NFC is 0.98(compared to RFID is 0.99). Both NFC and RFID having similar status scenario (Complete listings of the products, Automatic billing, Update inventory in the central system).","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"817 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1