首页 > 最新文献

2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)最新文献

英文 中文
A server based load analysis of smart meter systems 基于服务器的智能电表系统负载分析
S. Elakshumi, A. Ponraj
The electricity demand is increasing with the growth of population and with the use of different appliances in the households. So, there is a need for consumers to track their daily usage and understand the consumption patterns to save and control these resources. Smart meter along with Advanced Metering Infrastructure(AMI) is a pragmatic and efficient solution for this. Earlier procedure which put to profitable use of one-way communications to gather meter data, were mentioned to as Automated Meter Reading (AMR)Systems. This paper aims at analysing the performance of the proposed smart meter systems, efficient transmission and how utilities explore new developments for the benefit of consumers as well as themselves by remotely monitoring energy consumption. The methodology followed to analyze the outcome is Power Line Communication(PLC), which is an arrangement to pass on data on an electrical conductor used for transmitting electric power from high voltage transmission lines to lower voltage lines used inside the buildings. This is achieved by using PLC modems for remote monitoring and control of energy meters. By this way we can bring down human efforts needed to outline meter readings which are till now recorded by visiting every home individually. As a result, the consumption patterns at the utilities are studies and load analysis is made so that this can help in maintaining other systems associated with energy management. To study and analyze the load consumption patterns, simulations were carried out in MATLAB. By this way an estimate on the energy consumption can be made and thus have a control on its usage.
随着人口的增长和家庭中不同电器的使用,电力需求也在增加。因此,消费者需要跟踪他们的日常使用情况并了解消费模式,以节省和控制这些资源。智能电表以及高级计量基础设施(AMI)是一种实用而有效的解决方案。早期使用单向通信收集仪表数据的程序被称为自动抄表系统(AMR)。本文旨在分析拟议的智能电表系统的性能、高效传输以及公用事业如何通过远程监控能源消耗来探索新的发展,以造福消费者和他们自己。分析结果所遵循的方法是电力线通信(PLC),这是一种将数据传递到用于将电力从高压输电线路传输到建筑物内使用的低压线路的电导体上的安排。这是通过使用PLC调制解调器对电能表进行远程监控来实现的。通过这种方式,我们可以减少人类需要的努力来概述仪表读数,到目前为止,这些读数是通过单独访问每个家庭来记录的。因此,对公用事业公司的消费模式进行了研究,并进行了负荷分析,从而有助于维护与能源管理相关的其他系统。为了研究和分析负载消耗模式,在MATLAB中进行了仿真。通过这种方法,可以对能源消耗进行估计,从而控制其使用。
{"title":"A server based load analysis of smart meter systems","authors":"S. Elakshumi, A. Ponraj","doi":"10.1109/ICNETS2.2017.8067916","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067916","url":null,"abstract":"The electricity demand is increasing with the growth of population and with the use of different appliances in the households. So, there is a need for consumers to track their daily usage and understand the consumption patterns to save and control these resources. Smart meter along with Advanced Metering Infrastructure(AMI) is a pragmatic and efficient solution for this. Earlier procedure which put to profitable use of one-way communications to gather meter data, were mentioned to as Automated Meter Reading (AMR)Systems. This paper aims at analysing the performance of the proposed smart meter systems, efficient transmission and how utilities explore new developments for the benefit of consumers as well as themselves by remotely monitoring energy consumption. The methodology followed to analyze the outcome is Power Line Communication(PLC), which is an arrangement to pass on data on an electrical conductor used for transmitting electric power from high voltage transmission lines to lower voltage lines used inside the buildings. This is achieved by using PLC modems for remote monitoring and control of energy meters. By this way we can bring down human efforts needed to outline meter readings which are till now recorded by visiting every home individually. As a result, the consumption patterns at the utilities are studies and load analysis is made so that this can help in maintaining other systems associated with energy management. To study and analyze the load consumption patterns, simulations were carried out in MATLAB. By this way an estimate on the energy consumption can be made and thus have a control on its usage.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131166988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Vehicle license plate detection and recognition using non-blind image de-blurring algorithm 车牌检测与识别采用非盲图像去模糊算法
A. Prakash, M. Jagannath, K. Adalarasu, G. M. Babu
This paper proposes the method of vehicle license plate recognition, which is essential in the field of intelligent transportation system. The purpose of the study is to present a simple and effective vehicle license plate detection and recognition using non-bling image de-blurring algorithm. The sharpness of the edges in an image is restored by the prior information on images. The blue kernel is free of noise while using the non-blind image de-blurring algorithm. This non-blind image de-blurring (NBID) algorithm is involved in the process of removing the optimization difficulties with respect to unknown image and unknown blur. Estimation is carried out for the length of the motion kernel with Radon transform in Fourier domain. The proposed algorithm was tested on different vehicle images and achieved satisfactory results in license plate detection. The experimental results deal with the efficiency and robustness of the proposed algorithm in both synthesized and real images.
本文提出了智能交通系统中必不可少的车辆牌照识别方法。本研究的目的是提出一种简单有效的基于非闪烁图像去模糊的车牌检测与识别算法。利用图像上的先验信息恢复图像边缘的锐度。使用非盲图像去模糊算法时,蓝色核是无噪声的。这种非盲图像去模糊(NBID)算法涉及到消除未知图像和未知模糊的优化困难的过程。利用Radon变换在傅里叶域中对运动核的长度进行估计。该算法在不同车辆图像上进行了测试,取得了满意的车牌检测效果。实验结果证明了该算法在合成图像和真实图像中的有效性和鲁棒性。
{"title":"Vehicle license plate detection and recognition using non-blind image de-blurring algorithm","authors":"A. Prakash, M. Jagannath, K. Adalarasu, G. M. Babu","doi":"10.1109/ICNETS2.2017.8067895","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067895","url":null,"abstract":"This paper proposes the method of vehicle license plate recognition, which is essential in the field of intelligent transportation system. The purpose of the study is to present a simple and effective vehicle license plate detection and recognition using non-bling image de-blurring algorithm. The sharpness of the edges in an image is restored by the prior information on images. The blue kernel is free of noise while using the non-blind image de-blurring algorithm. This non-blind image de-blurring (NBID) algorithm is involved in the process of removing the optimization difficulties with respect to unknown image and unknown blur. Estimation is carried out for the length of the motion kernel with Radon transform in Fourier domain. The proposed algorithm was tested on different vehicle images and achieved satisfactory results in license plate detection. The experimental results deal with the efficiency and robustness of the proposed algorithm in both synthesized and real images.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the efficiency of carry skip adder using MBFA-10T 利用MBFA-10T提高进位跳加器的效率
K. Kumaran, G. A. Bhanumithra, R. Rathi, M. M. Priya
The objective of this paper is to reduce the propagation time of carry skip adder(CSA) and also minimize the area by using MUX based full adder (MBFA-10T). The efficiency of the CSA has been improved by replacing the full adders with MUX based full adder circuit. Using this approach the delay, number of required transistors and the area has been diminished while comparing it to the existing one. The results are obtained after design, simulation and timing analysis was done using SPICE tool. From the results it shows that the transistors used in MBFA is only ten, which is less than that of the CMOS Full Adder (FA).
本文的目的是通过使用基于MUX的全加法器(MBFA-10T)来减少进位跳加法器(CSA)的传播时间并使其面积最小化。用基于MUX的全加法器电路代替全加法器电路,提高了CSA的效率。与现有的电路相比,该方法的延迟、所需晶体管数量和面积都有所减少。利用SPICE工具进行了设计、仿真和时序分析,得到了设计结果。结果表明,MBFA所用晶体管数量仅为10个,比CMOS全加法器(FA)少。
{"title":"Enhancing the efficiency of carry skip adder using MBFA-10T","authors":"K. Kumaran, G. A. Bhanumithra, R. Rathi, M. M. Priya","doi":"10.1109/ICNETS2.2017.8067903","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067903","url":null,"abstract":"The objective of this paper is to reduce the propagation time of carry skip adder(CSA) and also minimize the area by using MUX based full adder (MBFA-10T). The efficiency of the CSA has been improved by replacing the full adders with MUX based full adder circuit. Using this approach the delay, number of required transistors and the area has been diminished while comparing it to the existing one. The results are obtained after design, simulation and timing analysis was done using SPICE tool. From the results it shows that the transistors used in MBFA is only ten, which is less than that of the CMOS Full Adder (FA).","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A connectivity protocol for star topology using wireless sensor network 一种基于无线传感器网络的星形拓扑连接协议
K. Induja, A. J. Deva Krupa
In this work, we concentrate on network which is not able communicate with the sensors due to fail in the sensing process due to the temporary links of clutter with the access point. The novelty of the work is mainly divided into two folds mainly i)to know the connectivity problems and its requirements in the relay networks, ii) to restore the connection problems on the sensor nodes and to recover the loss of information occurred in the connectivity obstructions. we propose the LAL protocol which automatically senses the failure location of the sensor nodes and backs up with the backup sensor node in a ad-hoc mobile environment. In this paper, mainly we concentrate on the existing protocol neighbor-assisted connectivity recovery protocol (NACRP), and the LAL protocol adding the backup sensors for both the protocols and comparing the different parameters for the better performance.
在这项工作中,我们重点研究了由于与接入点的杂波临时链接而导致传感过程中失败而无法与传感器通信的网络。该工作的新颖性主要分为两部分,主要是了解中继网络中的连通性问题及其要求,恢复传感器节点上的连接问题,恢复连接障碍中发生的信息丢失。我们提出了一种自动感知传感器节点故障位置并在自组织移动环境中使用备用传感器节点进行备份的LAL协议。本文主要研究了现有的邻居辅助连接恢复协议(neighbor-assisted connectivity recovery protocol, NACRP)和为两种协议添加备份传感器的LAL协议,并比较了不同的参数以获得更好的性能。
{"title":"A connectivity protocol for star topology using wireless sensor network","authors":"K. Induja, A. J. Deva Krupa","doi":"10.1109/ICNETS2.2017.8067896","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067896","url":null,"abstract":"In this work, we concentrate on network which is not able communicate with the sensors due to fail in the sensing process due to the temporary links of clutter with the access point. The novelty of the work is mainly divided into two folds mainly i)to know the connectivity problems and its requirements in the relay networks, ii) to restore the connection problems on the sensor nodes and to recover the loss of information occurred in the connectivity obstructions. we propose the LAL protocol which automatically senses the failure location of the sensor nodes and backs up with the backup sensor node in a ad-hoc mobile environment. In this paper, mainly we concentrate on the existing protocol neighbor-assisted connectivity recovery protocol (NACRP), and the LAL protocol adding the backup sensors for both the protocols and comparing the different parameters for the better performance.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum computation based on Reciprocal Quantum logic 基于互反量子逻辑的量子计算
S. Narendran, J. Selvakumar
This paper gives a newfangled dimension to superconducting logic which is the successor of CMOS logic and other superconducting quantum logic. Reciprocal Quantum logic (RQL) is proposed to achieve the less memory capability. RQL is a modified version of Rapid Single Flux Quantum (RSFQ). We designed and analyzed different RQL logic like half adder, full adder, counter, and Carry Save Adder (CSA) and we achieved an increase in clock speed compared to RSFQ logic by 20%. The designs are made of AndOr and AnotB gate operation and analyzed using WRSPICE software.
超导逻辑是继CMOS逻辑和其他超导量子逻辑之后,又一个新的维度。提出了互反量子逻辑(RQL)来实现更小的存储容量。RQL是快速单通量量子(RSFQ)的改进版本。我们设计并分析了不同的RQL逻辑,如半加法器、全加法器、计数器和进位保存加法器(CSA),与RSFQ逻辑相比,我们实现了时钟速度提高20%。设计了AndOr和AnotB门操作,并使用WRSPICE软件进行了分析。
{"title":"Quantum computation based on Reciprocal Quantum logic","authors":"S. Narendran, J. Selvakumar","doi":"10.1109/ICNETS2.2017.8067892","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067892","url":null,"abstract":"This paper gives a newfangled dimension to superconducting logic which is the successor of CMOS logic and other superconducting quantum logic. Reciprocal Quantum logic (RQL) is proposed to achieve the less memory capability. RQL is a modified version of Rapid Single Flux Quantum (RSFQ). We designed and analyzed different RQL logic like half adder, full adder, counter, and Carry Save Adder (CSA) and we achieved an increase in clock speed compared to RSFQ logic by 20%. The designs are made of AndOr and AnotB gate operation and analyzed using WRSPICE software.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132368742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT based water management 基于物联网的水管理
Chanda Rajurkar, S. Prabaharan, S. Muthulakshmi
Objectives: This project focuses on monitoring of use of water, consider, by one block of house in a flat system, where at the partition of pipeline from where the water gets diverted to various part of a block. Methods/Statistical analysis: Water places a vital role for living beings in their day to day lives. The earth's 71% is covered by water is a ubiquitous fact. Among which Oceans has approximately 96.50% and 3% is considered to be freshwater, again out of which only 0.08% is accessible direct to human use and rest is preserved in tundra regions and in different form on and in the earth surface which is very difficult to abstract for the human purposes. From this it states that only 0.08% is available as fresh water for human being to make use for drinking, domestic purposes, sanitation, manufacturing, leisure, agriculture etc which gets recharged by rain and snowfall 1. Findings: According to scientists and organizations as IPCC (Intergovernmental Panel on Climate Change), state has come, since a long time, where water management as such implies to maximizing use of water and minimizing the wastage of water and thus preventing the domino effect cycle arises as wastage of water. The sensors will sense the flow of water to each pipe which ultimately tells the usage of water at one block ideally. This water usage data would be sent to cloud using the IOT (Internet of things) space. This cloud data would be sent to the concern resident's person's mobile app (application) reporting the water used and alerting the user to limit the water use if it gets extended to the limit usage set by municipal government or corporation. If the limit gets extended the user have to pay accordingly. This will be real time operation. The objective of doing so is for limiting and minimizing the usage of water for an average of per person. And secondly, the cloud data will be used as statistic data for use of water at every seasons that is winter, summer and monsoon so that measuring steps for water management can be taken with the appropriate statistics, yielding an avenue for predictive measure. Improvements/Applications: To appraise the IOT based water management, it can be ramified as diligent, frugal for water management in a symbiotic parity way, which will constrict the water resource evenly according to the in situ factors.
目的:该项目侧重于监测水的使用情况,考虑在一个平面系统中的一个街区的房屋,在管道的分区处,水从那里被转移到街区的各个部分。方法/统计分析:水在生物的日常生活中起着至关重要的作用。地球的71%被水覆盖是一个普遍存在的事实。其中海洋约占96.50%,3%被认为是淡水,其中只有0.08%可以直接供人类使用,其余部分保存在苔原地区,以不同的形式存在于地球表面,这对于人类的目的来说是非常难以抽象的。据此,报告指出,只有0.08%的淡水可供人类饮用、家庭、卫生、制造、休闲、农业等,这些淡水可以通过降雨和降雪得到补充。研究结果:根据科学家和政府间气候变化专门委员会(IPCC)等组织的说法,长期以来,水资源管理的目的是最大限度地利用水资源,最大限度地减少水资源的浪费,从而防止因水资源浪费而产生的多米诺骨牌效应循环。传感器将感应到每条管道的水流,最终告知一个街区的理想用水情况。这些用水数据将通过物联网(IOT)空间发送到云端。该云数据将被发送到相关居民的个人移动应用程序(应用程序)报告用水量,并提醒用户限制用水量,如果它超过了市政府或公司设定的限制用水量。如果延长限制,用户必须支付相应的费用。这将是实时操作。这样做的目的是为了限制和减少平均每人的用水量。其次,云数据将被用作每个季节(冬季、夏季和季风)用水的统计数据,以便利用适当的统计数据采取水管理的测量步骤,为预测措施提供途径。改进/应用:为了评估基于物联网的水管理,可以将其扩展为以共生平价方式进行勤勉,节约的水管理,这将根据原位因素均匀地压缩水资源。
{"title":"IoT based water management","authors":"Chanda Rajurkar, S. Prabaharan, S. Muthulakshmi","doi":"10.1109/ICNETS2.2017.8067943","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067943","url":null,"abstract":"Objectives: This project focuses on monitoring of use of water, consider, by one block of house in a flat system, where at the partition of pipeline from where the water gets diverted to various part of a block. Methods/Statistical analysis: Water places a vital role for living beings in their day to day lives. The earth's 71% is covered by water is a ubiquitous fact. Among which Oceans has approximately 96.50% and 3% is considered to be freshwater, again out of which only 0.08% is accessible direct to human use and rest is preserved in tundra regions and in different form on and in the earth surface which is very difficult to abstract for the human purposes. From this it states that only 0.08% is available as fresh water for human being to make use for drinking, domestic purposes, sanitation, manufacturing, leisure, agriculture etc which gets recharged by rain and snowfall 1. Findings: According to scientists and organizations as IPCC (Intergovernmental Panel on Climate Change), state has come, since a long time, where water management as such implies to maximizing use of water and minimizing the wastage of water and thus preventing the domino effect cycle arises as wastage of water. The sensors will sense the flow of water to each pipe which ultimately tells the usage of water at one block ideally. This water usage data would be sent to cloud using the IOT (Internet of things) space. This cloud data would be sent to the concern resident's person's mobile app (application) reporting the water used and alerting the user to limit the water use if it gets extended to the limit usage set by municipal government or corporation. If the limit gets extended the user have to pay accordingly. This will be real time operation. The objective of doing so is for limiting and minimizing the usage of water for an average of per person. And secondly, the cloud data will be used as statistic data for use of water at every seasons that is winter, summer and monsoon so that measuring steps for water management can be taken with the appropriate statistics, yielding an avenue for predictive measure. Improvements/Applications: To appraise the IOT based water management, it can be ramified as diligent, frugal for water management in a symbiotic parity way, which will constrict the water resource evenly according to the in situ factors.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Energy efficiency of single cell and multi cell Massive MIMO system MMSE estimation 单小区和多小区海量MIMO系统能量效率的MMSE估计
Shubhrasmita Mandal, Sabitha Gauni
Multi input multi output (MIMO) has become a promising technique for 5th generation cellular network. By significantly increasing the number of antennas at the Base Station (BS) Massive MIMO can support very high spectral efficiency with linear transceivers. Energy efficiency is one of the critical design goal for 5G network. The aim of this paper is to analyze the energy efficiency of single cell and multi cell Massive MIMO, where transmit and circuit power consumption, training overhead, channel estimation, pilot contamination and decontamination is taken into account. Maximal energy efficiency for the system is obtained by using Maximum Ratio Transmission (MRT) for given number of antennas and users by optimizing the transmit power. A multi cell Massive MIMO suffers from pilot contamination due to unavoidable reuse of pilots in adjacent cells. Pilot contamination causes inter cell interferences, which grows as the number of Base Station (BS) antennas increases and damages the system performance.
多输入多输出(MIMO)技术已成为第五代蜂窝网络的发展方向。通过显著增加基站(BS)的天线数量,大规模MIMO可以通过线性收发器支持非常高的频谱效率。能效是5G网络的关键设计目标之一。本文的目的是分析单小区和多小区大规模MIMO的能量效率,其中考虑了传输和电路功耗,训练开销,信道估计,导频污染和去污染。在给定天线数量和用户数量的情况下,通过优化发射功率,使用最大比传输(MRT)来获得系统的最大能量效率。多小区大规模MIMO由于相邻小区不可避免地重复使用导频而遭受导频污染。导频污染会导致小区间干扰,这种干扰会随着基站天线数量的增加而增加,从而影响系统的性能。
{"title":"Energy efficiency of single cell and multi cell Massive MIMO system MMSE estimation","authors":"Shubhrasmita Mandal, Sabitha Gauni","doi":"10.1109/ICNETS2.2017.8067899","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067899","url":null,"abstract":"Multi input multi output (MIMO) has become a promising technique for 5th generation cellular network. By significantly increasing the number of antennas at the Base Station (BS) Massive MIMO can support very high spectral efficiency with linear transceivers. Energy efficiency is one of the critical design goal for 5G network. The aim of this paper is to analyze the energy efficiency of single cell and multi cell Massive MIMO, where transmit and circuit power consumption, training overhead, channel estimation, pilot contamination and decontamination is taken into account. Maximal energy efficiency for the system is obtained by using Maximum Ratio Transmission (MRT) for given number of antennas and users by optimizing the transmit power. A multi cell Massive MIMO suffers from pilot contamination due to unavoidable reuse of pilots in adjacent cells. Pilot contamination causes inter cell interferences, which grows as the number of Base Station (BS) antennas increases and damages the system performance.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure identity management in mobile cloud computing 移动云计算中的安全身份管理
M. Suguna, R. Anusia, S. Shalinie, S. Deepti
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.
移动云计算(MCC)是一个平台,它允许移动用户通过无线访问将计算严格和存储要求高的任务卸载到可用的云资源上。MCC的主要关注点是数据隐私。移动用户通过网络提供机密信息,如果不加以保护,可能会导致安全问题。身份管理(IDM)是对云环境中的用户身份、身份验证和授权的管理。现有的综合身份管理(CIDM)克服了传统IDM的网络流量拦截问题,但在IDMS (Identity Management Server)被攻破的情况下,容易出现身份被盗的问题。这项工作的重点是开发一个安全身份管理(SIDM),通过使用加强身份验证过程和身份隐私的技术来减轻CIDM中的攻击。采用零知识证明(ZKP)和令牌验证两步身份验证过程开发了一个安全的IDM。所提出的SIDM模型减少了身份服务器泄露攻击的后果。与CIDM相比,SIDM的通信开销略有增加,但为了实现身份隐私的好处,它可能会受到损害。实验结果分析表明,与CIDM相比,通信开销总体上增加了30%。
{"title":"Secure identity management in mobile cloud computing","authors":"M. Suguna, R. Anusia, S. Shalinie, S. Deepti","doi":"10.1109/ICNETS2.2017.8067894","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067894","url":null,"abstract":"Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117154278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security protocols for Internet of Things: A survey 物联网的安全协议:调查
Snehal Deshmukh, S. Sonavane
Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy policies. Due to the different standards and communication stacks involved in traditional security solutions, it cannot be directly applied to IoT technologies. In IoT number of interconnected devices is expected to increase tremendously hence scalability is the biggest challenge for IoT development. This survey paper presents the available security protocols at respective IoT layers. A comparison of this information is done with respective to various security aspects and research gaps are identified.
物联网(Internet of Things, IoT)由多种技术组成,支持各种应用领域的高级服务。安全和隐私是物联网应用领域非常重要的方面。这些应用需要物联网网络中的数据保密性、真实性、完整性和访问控制。对于用户和事物,安全性是通过执行安全和隐私策略来实现的。由于传统安全解决方案涉及的标准和通信栈不同,无法直接应用于物联网技术。在物联网中,互联设备的数量预计将大幅增加,因此可扩展性是物联网发展的最大挑战。本调查报告介绍了各物联网层可用的安全协议。将这些信息与各个安全方面进行比较,并确定研究差距。
{"title":"Security protocols for Internet of Things: A survey","authors":"Snehal Deshmukh, S. Sonavane","doi":"10.1109/ICNETS2.2017.8067900","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067900","url":null,"abstract":"Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy policies. Due to the different standards and communication stacks involved in traditional security solutions, it cannot be directly applied to IoT technologies. In IoT number of interconnected devices is expected to increase tremendously hence scalability is the biggest challenge for IoT development. This survey paper presents the available security protocols at respective IoT layers. A comparison of this information is done with respective to various security aspects and research gaps are identified.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A study on the effect of temperature on cellular signal strength quality 温度对蜂窝信号强度质量影响的研究
S. Sabu, S. Renimol, D. Abhiram, B. Premlet
As the world is getting more connected through cell phones, Cellular Signal Strength metrics demand more attention as parameters linked to everyday life. This paper focuses on the effects of temperature on cellular signal strength quality. In telecommunications, Received Signal Strength Indicator (RSSI) is a measure of the power present in a received radio signal. This work looks into the variation of RSSI values over temperature and its effects on cellular communication networks. The study on the effect of temperature on RSSI is performed by measuring the temperature and signal strength over a region simultaneously. Signal strength values is collected using Android Packaging Index (API) of Android smartphones and temperature using a custom made weather station.
随着世界越来越多地通过手机联系在一起,蜂窝信号强度指标作为与日常生活相关的参数需要更多的关注。本文主要研究温度对蜂窝信号强度质量的影响。在电信中,接收信号强度指示器(RSSI)是对接收到的无线电信号中存在的功率的度量。这项工作着眼于RSSI值随温度的变化及其对细胞通信网络的影响。温度对RSSI影响的研究是通过同时测量一个地区的温度和信号强度来进行的。通过Android智能手机的API (Android Packaging Index)采集信号强度值,通过定制气象站采集温度。
{"title":"A study on the effect of temperature on cellular signal strength quality","authors":"S. Sabu, S. Renimol, D. Abhiram, B. Premlet","doi":"10.1109/ICNETS2.2017.8067893","DOIUrl":"https://doi.org/10.1109/ICNETS2.2017.8067893","url":null,"abstract":"As the world is getting more connected through cell phones, Cellular Signal Strength metrics demand more attention as parameters linked to everyday life. This paper focuses on the effects of temperature on cellular signal strength quality. In telecommunications, Received Signal Strength Indicator (RSSI) is a measure of the power present in a received radio signal. This work looks into the variation of RSSI values over temperature and its effects on cellular communication networks. The study on the effect of temperature on RSSI is performed by measuring the temperature and signal strength over a region simultaneously. Signal strength values is collected using Android Packaging Index (API) of Android smartphones and temperature using a custom made weather station.","PeriodicalId":413865,"journal":{"name":"2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1