首页 > 最新文献

2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)最新文献

英文 中文
Reversible Chaotic Encryption Techniques For Images 图像的可逆混沌加密技术
N. Shyamala, K. Anusudha
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use of Arnold's cat map, in which pixel shuffling offers mystifying the image pixels based on the number of iterations decided by the authorized image owner. This is followed by other chaotic encryption techniques such as Logistic map and Tent map, which ensures secure image encryption. The simulation result shows the planned system achieves better NPCR, UACI, MSE and PSNR respectively.
图像加密一直被军队和政府用来帮助进行绝密通信。如今,它经常被用于各种民用系统之间的信息保护。为了利用各种混沌映射对图像进行安全加密,在该系统中,合法方可以在加密密钥的支持下对图像进行解密。这种可逆的混沌加密技术利用了Arnold的猫图,其中像素变换根据授权图像所有者决定的迭代次数对图像像素进行神秘化。其次是其他混沌加密技术,如Logistic映射和Tent映射,可确保安全的图像加密。仿真结果表明,所设计的系统分别获得了较好的NPCR、UACI、MSE和PSNR。
{"title":"Reversible Chaotic Encryption Techniques For Images","authors":"N. Shyamala, K. Anusudha","doi":"10.1109/ICSCN.2017.8085656","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085656","url":null,"abstract":"Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use of Arnold's cat map, in which pixel shuffling offers mystifying the image pixels based on the number of iterations decided by the authorized image owner. This is followed by other chaotic encryption techniques such as Logistic map and Tent map, which ensures secure image encryption. The simulation result shows the planned system achieves better NPCR, UACI, MSE and PSNR respectively.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic washout multiple droplet lab on chip routing: Dynamic washing technique 动态冲洗多液滴实验室芯片布线:动态冲洗技术
G. Brindha, G. Rohini, K. Aishwarya, B. Ganga
Digital microfluidic biochip (DMFB) is a technology that has just came up with the aim to attenuate droplets activity on a chip. By manipulating droplets with negligible volumes, the DMFB provides susceptibility with comparatively less human errors than the former routing methods. When two droplets are sharing a same routing path, the second droplet may be contaminated due to the leftovers of the first droplet which affects the assay. To avoid cross contamination 1. A DMFB need to be periodically washed out. 2. Contamination aware routing path need to be calculated. This work attends to utilize both the modified version of the solution. This project work attempts to propose a simultaneous wash out routing algorithm for dynamic parallel droplet testing with reduced timing overhead. A reconfigurable DMFB (Digital Microfluidic Biochip) test bed architecture with N × N pin structure will be designed using HDL. Parallel droplets will be introduced using different input pin channels with addition to that a wash out droplet will also be introduced and kept idle initially. When the destination pins for the actual droplets is configured, shortest path routing prediction will take place in parallel with a multi-objective modified swarm intelligence algorithm which is initiated to predict the routing path of the wash droplet to avoid cross contamination possibilities for the testing droplets. The second routing algorithm is dedicated for wash droplet through which is analyzes the first (droplet) routing result to find possible cross contamination. The modified swarm routing will be gated in case of non-contaminated routing path is already predicted in the first routing which saves the circuit power dissipation.
数字微流控生物芯片(DMFB)是一项刚刚提出的技术,旨在减弱芯片上液滴的活性。通过操纵体积可忽略不计的液滴,DMFB提供了比以前的路由方法相对较少的人为错误的敏感性。当两个液滴共享相同的路径时,第二个液滴可能由于第一个液滴的残余物而受到污染,从而影响检测。避免交叉污染DMFB需要定期清洗。2. 需要计算具有污染意识的路由路径。这项工作旨在利用解决方案的修改版本。本项目工作试图提出一种同时清洗路由算法,用于减少时间开销的动态并行液滴测试。采用HDL语言设计了一种N × N引脚结构的可重构数字微流控生物芯片(DMFB)试验台结构。平行液滴将使用不同的输入引脚通道引入,此外还将引入一个洗出液滴,并在最初保持空闲状态。当实际液滴的目标引脚配置完成后,最短路径路径预测将与多目标修正群智能算法并行进行,该算法用于预测洗涤液滴的路径,以避免测试液滴的交叉污染可能性。第二种路由算法是专门针对洗涤液滴的,通过分析第一种(液滴)路由结果来发现可能的交叉污染。改进后的群路由在第一个路由中已经预测了无污染路由路径的情况下进行了门控,节省了电路功耗。
{"title":"Dynamic washout multiple droplet lab on chip routing: Dynamic washing technique","authors":"G. Brindha, G. Rohini, K. Aishwarya, B. Ganga","doi":"10.1109/ICSCN.2017.8085706","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085706","url":null,"abstract":"Digital microfluidic biochip (DMFB) is a technology that has just came up with the aim to attenuate droplets activity on a chip. By manipulating droplets with negligible volumes, the DMFB provides susceptibility with comparatively less human errors than the former routing methods. When two droplets are sharing a same routing path, the second droplet may be contaminated due to the leftovers of the first droplet which affects the assay. To avoid cross contamination 1. A DMFB need to be periodically washed out. 2. Contamination aware routing path need to be calculated. This work attends to utilize both the modified version of the solution. This project work attempts to propose a simultaneous wash out routing algorithm for dynamic parallel droplet testing with reduced timing overhead. A reconfigurable DMFB (Digital Microfluidic Biochip) test bed architecture with N × N pin structure will be designed using HDL. Parallel droplets will be introduced using different input pin channels with addition to that a wash out droplet will also be introduced and kept idle initially. When the destination pins for the actual droplets is configured, shortest path routing prediction will take place in parallel with a multi-objective modified swarm intelligence algorithm which is initiated to predict the routing path of the wash droplet to avoid cross contamination possibilities for the testing droplets. The second routing algorithm is dedicated for wash droplet through which is analyzes the first (droplet) routing result to find possible cross contamination. The modified swarm routing will be gated in case of non-contaminated routing path is already predicted in the first routing which saves the circuit power dissipation.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A systematic approach for pulse diagnosis based on siddha medical procedures 基于悉达医学程序的脉象诊断系统方法
Ramesh Duraisamy, S. Dinakar, Vishnusankar Venkittaramanujam, V. Jeyakumar
Diagnosing Diseases by analyzing the pulseis an automated system to identify the diseases. This project provides necessary details and reports on patients by obtaining their nadi pulses. These pulses are sensed form radial arteries by using the IR sensor. These pulses differ for different kinds of patients and the waveforms obtained from the sensor will also be varying according to the conditions. These pulse signals are too weak and needs amplification and filteration. Set of three IR sensors are placed on the wrist in order to sense three pulses, namely vata, pitta and kapha. The pulse signals obtained from IR sensor were processed through signal processing circuit, which includes signal amplifier, filter and noise reduction circuit. These waveforms are used to detect the diseases in the patient's body by extracting its features. Hence our Indian siddha Practitioners can use this system as automated computer-aided diagnostic tool.
通过分析脉搏来诊断疾病是一种识别疾病的自动化系统。该项目通过获取患者的nadi脉冲来提供必要的细节和报告。这些脉冲是通过使用红外传感器从桡动脉感应到的。这些脉冲对不同类型的患者是不同的,从传感器获得的波形也会根据情况而变化。这些脉冲信号太弱,需要放大和滤波。一组三个红外传感器放置在手腕上,以感应三种脉冲,即vata, pitta和kapha。通过信号处理电路对红外传感器获得的脉冲信号进行处理,该信号处理电路包括信号放大、滤波和降噪电路。这些波形通过提取其特征来检测患者体内的疾病。因此,我们的印度悉达弟子可以使用这个系统作为自动计算机辅助诊断工具。
{"title":"A systematic approach for pulse diagnosis based on siddha medical procedures","authors":"Ramesh Duraisamy, S. Dinakar, Vishnusankar Venkittaramanujam, V. Jeyakumar","doi":"10.1109/ICSCN.2017.8085694","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085694","url":null,"abstract":"Diagnosing Diseases by analyzing the pulseis an automated system to identify the diseases. This project provides necessary details and reports on patients by obtaining their nadi pulses. These pulses are sensed form radial arteries by using the IR sensor. These pulses differ for different kinds of patients and the waveforms obtained from the sensor will also be varying according to the conditions. These pulse signals are too weak and needs amplification and filteration. Set of three IR sensors are placed on the wrist in order to sense three pulses, namely vata, pitta and kapha. The pulse signals obtained from IR sensor were processed through signal processing circuit, which includes signal amplifier, filter and noise reduction circuit. These waveforms are used to detect the diseases in the patient's body by extracting its features. Hence our Indian siddha Practitioners can use this system as automated computer-aided diagnostic tool.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131187040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low power XOR gate design and its applications 低功耗异或门的设计及其应用
K. Ravali, Nagapurkar Renuka Vijay, Srilakshmi Jaggavarapu, R. Sakthivel
With advent of technology scaling, the prime objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into physical level design that comprises of PMOS and NMOS transistors. In similar way, logic can be implemented in other styles as well, with the difference in number of transistors required. The conventional CMOS design for XOR logic can be possible with 8 or more than 8 transistors, with the methodology discussed in this paper, the same design for XOR logic can be made possible with 6 transistors. The proposed methodology consists of Pass transistor logic and Single feedback topology. This design consumes 50% less power than that of conventional XOR logic design with CMOS technology. Since the design for XOR logic, is useful for variety of applications such as Data encryption, Arithmetic circuits, Binary to Gray encoding etc. the XOR logic has been selected for design. The design explained in this paper is simulated with Cadence 90nm technology.
随着技术规模化的出现,设计的主要目标,即低功耗可以很容易地获得。对于任何数字逻辑设计,功耗取决于;电源电压,电路中集成的晶体管数量和比例相同。由于CMOS技术支持反转逻辑设计;NAND & NOR结构对于将任何逻辑方程转换为由PMOS和NMOS晶体管组成的物理层设计都很有用。以类似的方式,逻辑也可以实现在其他风格,不同的晶体管数量的要求。传统CMOS的异或逻辑设计可以使用8个或8个以上的晶体管,通过本文讨论的方法,可以使用6个晶体管实现相同的异或逻辑设计。所提出的方法由通晶体管逻辑和单反馈拓扑组成。该设计比采用CMOS技术的传统异或逻辑设计功耗低50%。由于设计的异或逻辑,是有用的各种应用,如数据加密,算术电路,二进制到灰色编码等,异或逻辑已被选择为设计。本文介绍的设计采用Cadence 90nm技术进行了仿真。
{"title":"Low power XOR gate design and its applications","authors":"K. Ravali, Nagapurkar Renuka Vijay, Srilakshmi Jaggavarapu, R. Sakthivel","doi":"10.1109/ICSCN.2017.8085699","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085699","url":null,"abstract":"With advent of technology scaling, the prime objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into physical level design that comprises of PMOS and NMOS transistors. In similar way, logic can be implemented in other styles as well, with the difference in number of transistors required. The conventional CMOS design for XOR logic can be possible with 8 or more than 8 transistors, with the methodology discussed in this paper, the same design for XOR logic can be made possible with 6 transistors. The proposed methodology consists of Pass transistor logic and Single feedback topology. This design consumes 50% less power than that of conventional XOR logic design with CMOS technology. Since the design for XOR logic, is useful for variety of applications such as Data encryption, Arithmetic circuits, Binary to Gray encoding etc. the XOR logic has been selected for design. The design explained in this paper is simulated with Cadence 90nm technology.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A comprehensive survey on sentiment analysis 情感分析的综合调查
S. Rajalakshmi, S. Asha, N. Pazhaniraja
Social media data are effectively used in organizations to gain popularity among its users. Here each user can share their ideas about different things (i.e. product views, general issues and so on.)In this case, sentiment analysis or opining mining is useful for mining facts from those data. The text data obtained from the social network primarily undergoes emotion mining to examine the sentiment of the user message. Most of the sentiment or emotional mining uses machine learning approaches for better results. The principle idea behind this article is to bring out the process involved in sentiment analysis. Further the investigation is about the various methods or techniques existing for performing sentiment analysis. It also presents the various tools used to demonstrate the process involved in sentiment analysis. This article reports about the opportunities and issues existing in the sentiment analysis.
社会媒体数据在组织中被有效地用于在用户中获得人气。在这里,每个用户都可以分享他们对不同事物的看法(如产品视图、一般问题等)。在这种情况下,情感分析或观点挖掘对于从这些数据中挖掘事实很有用。从社交网络中获取的文本数据主要进行情感挖掘,以检验用户消息的情感。大多数情绪或情感挖掘使用机器学习方法来获得更好的结果。这篇文章背后的主要思想是提出情感分析所涉及的过程。进一步的调查是关于执行情感分析的各种方法或技术。它还介绍了用于演示情感分析过程的各种工具。本文报告了情感分析中存在的机遇和问题。
{"title":"A comprehensive survey on sentiment analysis","authors":"S. Rajalakshmi, S. Asha, N. Pazhaniraja","doi":"10.1109/ICSCN.2017.8085673","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085673","url":null,"abstract":"Social media data are effectively used in organizations to gain popularity among its users. Here each user can share their ideas about different things (i.e. product views, general issues and so on.)In this case, sentiment analysis or opining mining is useful for mining facts from those data. The text data obtained from the social network primarily undergoes emotion mining to examine the sentiment of the user message. Most of the sentiment or emotional mining uses machine learning approaches for better results. The principle idea behind this article is to bring out the process involved in sentiment analysis. Further the investigation is about the various methods or techniques existing for performing sentiment analysis. It also presents the various tools used to demonstrate the process involved in sentiment analysis. This article reports about the opportunities and issues existing in the sentiment analysis.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An efficient video segmentation and transmission usingcloud storage services 使用云存储服务的高效视频分割和传输
N. Kalaiselvi, A. Gayathri, K. Asha
Android is an operating system which is available in smartphones and tablets. It uses touch gestures which correlate as activities to perform the operations to embed with the real world actions. Recent technologies adapts android as the primary element because of its salient features and open environment which could be customized in high technological devices. Another secured feature of Android is its availability on Pc devices. Android could be easily customized and manipulated when compared with IOS. Mobile Cloud Network (MCN) is the most essential applications for video transmission. Mobile Cloud Network is used for live video streaming in secured storage. In this article we examined live video recording and streaming process with cloud storage and also investigated various techniques on video fragmentation to store the resources on concurrent video transmission over heterogeneous wireless networks.
安卓是一种可以在智能手机和平板电脑上使用的操作系统。它使用与活动相关的触摸手势来执行嵌入到现实世界中的操作。最近的技术将android作为主要元素,因为它具有显著的特点和开放的环境,可以在高科技设备中定制。Android的另一个安全特性是它在Pc设备上的可用性。与IOS相比,Android可以轻松定制和操作。移动云网络(MCN)是视频传输最基本的应用。移动云网络用于安全存储的实时视频流。在本文中,我们研究了使用云存储的实时视频录制和流媒体过程,并研究了通过异构无线网络在并发视频传输中存储资源的各种视频碎片技术。
{"title":"An efficient video segmentation and transmission usingcloud storage services","authors":"N. Kalaiselvi, A. Gayathri, K. Asha","doi":"10.1109/ICSCN.2017.8085678","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085678","url":null,"abstract":"Android is an operating system which is available in smartphones and tablets. It uses touch gestures which correlate as activities to perform the operations to embed with the real world actions. Recent technologies adapts android as the primary element because of its salient features and open environment which could be customized in high technological devices. Another secured feature of Android is its availability on Pc devices. Android could be easily customized and manipulated when compared with IOS. Mobile Cloud Network (MCN) is the most essential applications for video transmission. Mobile Cloud Network is used for live video streaming in secured storage. In this article we examined live video recording and streaming process with cloud storage and also investigated various techniques on video fragmentation to store the resources on concurrent video transmission over heterogeneous wireless networks.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Influence of binning in Histograms of Oriented Gradients method representation 分组对梯度方向直方图表示方法的影响
K. Karthikeyan, A. Karpagam, M. Manikandan
This paper focuses on comparing orientation binning to perform Histograms of Oriented Gradients algorithm for the feature extraction process. The HOG algorithm comprises of gradient computation, orientation binning and block normalization aimed towards object detection. Three angles of binning are considered for (3bins, 6bins, and 9bins) with angles.64×128 image sample is taken from INRIA Person Data set to extract the feature points, using which human detection can be enhanced. The HOG technique is observed through various orientation binning obtained from experimental simulation results on MATLAB.
本文重点介绍了比较方向分形法来进行方向梯度直方图算法的特征提取过程。HOG算法包括梯度计算、方向分割和块归一化,以实现目标检测。对于有角度的(3bins, 6bins和9bins),考虑了三个角度的装箱。从INRIA Person Data集中提取64×128图像样本,提取特征点,增强人体检测。通过MATLAB上的实验仿真结果得到的各种方向分束来观察HOG技术。
{"title":"Influence of binning in Histograms of Oriented Gradients method representation","authors":"K. Karthikeyan, A. Karpagam, M. Manikandan","doi":"10.1109/ICSCN.2017.8085684","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085684","url":null,"abstract":"This paper focuses on comparing orientation binning to perform Histograms of Oriented Gradients algorithm for the feature extraction process. The HOG algorithm comprises of gradient computation, orientation binning and block normalization aimed towards object detection. Three angles of binning are considered for (3bins, 6bins, and 9bins) with angles.64×128 image sample is taken from INRIA Person Data set to extract the feature points, using which human detection can be enhanced. The HOG technique is observed through various orientation binning obtained from experimental simulation results on MATLAB.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spectral efficiency analysis of subcarrier and link incorporation for optimizing the resource allocation in 4G LTE cellular systems 用于优化4G LTE蜂窝系统中资源分配的子载波和链路合并频谱效率分析
S. Karthika, P. Indumathi
Neighbouring cells deteriorates the performance of Orthogonal Frequency Division Multiplexing Access (OFDMA) cellular networks particularly for edge users due to Inter Cell Interference (ICI). In this paper, subcarrier integration with suitable links is proposed for minimizing ICI after Self Organized Resource Allocation (SORA) and Link Grouping Algorithm (LGA) is used to selects the satisfactory links between the terminals i.e. eNodes (eNB) and User Equipments (UEs). In this paper, Subcarrier Grouping Algorithm (SGA) is used to choose the best available resources to the selected links and Particle Swarm Optimization (PSO) is used to find the best incorporation of Subcarriers — Link from the results of grouping algorithm. The combination of SGA and LGA without consideration of any optimization techniques is referred as Subcarrier-Link Grouping Resource allocation (SLGRA) algorithm. Proposed algorithm is compared with existing methods such as Low Interference Subcarrier Allocation (LISA) and Greedy Subcarrier Allocation (GSA). SLGRA with optimization technique is referred as Subcarrier Link Integration Optimized Resource Allocation (SLIORA). Improvement of proposed method is calculated in terms of percentage for scenarios with different user densities.
由于小区间干扰(ICI),相邻小区恶化了正交频分复用接入(OFDMA)蜂窝网络的性能,特别是对于边缘用户。本文提出在自组织资源分配(SORA)和链路分组算法(LGA)的基础上,通过适当的链路进行子载波集成以最小化ICI,并在终端(endes (eNB))和用户设备(ue)之间选择满意的链路。本文使用子载波分组算法(SGA)为所选链路选择最佳可用资源,并使用粒子群算法(PSO)从分组算法的结果中寻找子载波-链路的最佳组合。将SGA和LGA结合起来,不考虑任何优化技术,称为子载波链路分组资源分配(SLGRA)算法。对现有的低干扰子载波分配方法(LISA)和贪心子载波分配方法(GSA)进行了比较。带优化技术的SLGRA被称为子载波链路集成优化资源分配(SLIORA)。在不同用户密度的情况下,以百分比计算了所提方法的改进。
{"title":"Spectral efficiency analysis of subcarrier and link incorporation for optimizing the resource allocation in 4G LTE cellular systems","authors":"S. Karthika, P. Indumathi","doi":"10.1109/ICSCN.2017.8085709","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085709","url":null,"abstract":"Neighbouring cells deteriorates the performance of Orthogonal Frequency Division Multiplexing Access (OFDMA) cellular networks particularly for edge users due to Inter Cell Interference (ICI). In this paper, subcarrier integration with suitable links is proposed for minimizing ICI after Self Organized Resource Allocation (SORA) and Link Grouping Algorithm (LGA) is used to selects the satisfactory links between the terminals i.e. eNodes (eNB) and User Equipments (UEs). In this paper, Subcarrier Grouping Algorithm (SGA) is used to choose the best available resources to the selected links and Particle Swarm Optimization (PSO) is used to find the best incorporation of Subcarriers — Link from the results of grouping algorithm. The combination of SGA and LGA without consideration of any optimization techniques is referred as Subcarrier-Link Grouping Resource allocation (SLGRA) algorithm. Proposed algorithm is compared with existing methods such as Low Interference Subcarrier Allocation (LISA) and Greedy Subcarrier Allocation (GSA). SLGRA with optimization technique is referred as Subcarrier Link Integration Optimized Resource Allocation (SLIORA). Improvement of proposed method is calculated in terms of percentage for scenarios with different user densities.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of segmentation techniques for intravascular ultrasound (IVUS) images 血管内超声图像分割技术综述
A. Swarnalatha, M. Manikandan
A specially designed instrument is the Intravascular Ultrasound (IVUS). It is made up of tiny ultrasound probing device at the end part of the catheter. The blood vessels are visualized by using this system through ultrasonic visualization technique inside and also competent of viewing the diseased vessels and detecting the placement of the vessels also detecting and measuring length of the plaque present. IVUS is a well-organized technique for detecting coronary calcium. However IVUS has a drawback in measuring the calcium thickness, and in identifying the arc of the calcium layer. Thus the occurrence of the deposited plaque and calcium along the walls of coronary vessel is a sign of escemic heart diseases. In this paper, we are presenting some of the segmentation techniques that are used for the IVUS images. The techniques that are reviewed here are Fuzzy C-Means segmentation, Edge-Tracking and gradient-based techniques, The Circle Hough Transform technique are used for the detecting and measuring the size and arc of a calcium presented in IVUS image and by minimizing the error detection that are completed by the doctors during naked eye medical revision.
一种特别设计的仪器是血管内超声(IVUS)。它由导管末端的微小超声探测装置组成。该系统通过超声可视化技术对血管进行内部可视化,能够观察病变血管,检测血管的位置,检测和测量斑块的长度。IVUS是一种组织良好的检测冠状动脉钙的技术。然而,IVUS在测量钙的厚度和识别钙层的弧度方面有缺点。因此,沿冠状动脉壁沉积斑块和钙的发生是缺血性心脏病的征兆。在本文中,我们介绍了一些用于IVUS图像的分割技术。这里回顾的技术是模糊c均值分割,边缘跟踪和基于梯度的技术,圆形霍夫变换技术用于检测和测量IVUS图像中钙的大小和弧度,并通过最小化医生在裸眼医学修正期间完成的错误检测。
{"title":"Review of segmentation techniques for intravascular ultrasound (IVUS) images","authors":"A. Swarnalatha, M. Manikandan","doi":"10.1109/ICSCN.2017.8085670","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085670","url":null,"abstract":"A specially designed instrument is the Intravascular Ultrasound (IVUS). It is made up of tiny ultrasound probing device at the end part of the catheter. The blood vessels are visualized by using this system through ultrasonic visualization technique inside and also competent of viewing the diseased vessels and detecting the placement of the vessels also detecting and measuring length of the plaque present. IVUS is a well-organized technique for detecting coronary calcium. However IVUS has a drawback in measuring the calcium thickness, and in identifying the arc of the calcium layer. Thus the occurrence of the deposited plaque and calcium along the walls of coronary vessel is a sign of escemic heart diseases. In this paper, we are presenting some of the segmentation techniques that are used for the IVUS images. The techniques that are reviewed here are Fuzzy C-Means segmentation, Edge-Tracking and gradient-based techniques, The Circle Hough Transform technique are used for the detecting and measuring the size and arc of a calcium presented in IVUS image and by minimizing the error detection that are completed by the doctors during naked eye medical revision.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting DDoS attacks using decision tree algorithm 使用决策树算法检测DDoS攻击
S. Lakshminarasimman, S. Ruswin, K. Sundarakantham
The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.
被称为IEEE 802.111的标准的广泛使用已经成为一种解决方案,以支持具有高带宽的积极网络覆盖,从而引发各种安全威胁。Wi-Fi(无线保真)的广泛使用使我们能够轻松访问互联网,也为许多黑客攻击的起源铺平了道路。异常检测应用于检测活动数据泄露是可能的,比如终端用户和管理层发现它反复试图理解分布式拒绝服务(DDoS)攻击。一种新的异常检测方法使用决策树程序来保护网络内的无线节点和目标节点免受DDoS攻击,并使用KDDCup'99数据集确定攻击模式并提供适当的反击步骤进行分类意图和确定,表明它以周感知率将实例分类为各自的攻击类型。这个漏洞集成了公认的分类能力是Random Forest和J48。
{"title":"Detecting DDoS attacks using decision tree algorithm","authors":"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham","doi":"10.1109/ICSCN.2017.8085703","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085703","url":null,"abstract":"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1