首页 > 最新文献

2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Application of Uranium Mineral Band Feature Sub-set Selection Based on Genetic Algorithm 基于遗传算法的铀矿带特征子集选择的应用
Yiping Tong, Z. Cai, Jia Wu
Analyses show that the absorption band position determines the type of mineral radically. The paper proposes a method of applying GA (Genetic Algorithm) to the selection of the uranium mineral band feature sub-set. First, on the fundamental of the correlation between feature-based metrics: information entropy, information gain, symmetrical uncertainty and type space, the GA which is a random search algorithm uses the four standards as fitness functions to select the best feature points. Then set three different sub-intervals, extend the best feature points to the best feature sub-sets. Finally, the best feature sub-sets are used for classification. Experiments show that information gain and symmetrical uncertainty that based on genetic algorithm are better than based on CFS in classification.
分析表明,吸收带的位置从根本上决定了矿物的类型。提出了一种将遗传算法应用于铀矿物带特征子集选择的方法。首先,基于特征度量:信息熵、信息增益、对称不确定性和类型空间之间的相关性,遗传算法作为一种随机搜索算法,使用这四个标准作为适应度函数来选择最佳特征点。然后设置三个不同的子区间,将最佳特征点扩展到最佳特征子集。最后,利用最佳特征子集进行分类。实验表明,基于遗传算法的信息增益和对称不确定性优于基于CFS的分类。
{"title":"Application of Uranium Mineral Band Feature Sub-set Selection Based on Genetic Algorithm","authors":"Yiping Tong, Z. Cai, Jia Wu","doi":"10.1109/CICN.2013.137","DOIUrl":"https://doi.org/10.1109/CICN.2013.137","url":null,"abstract":"Analyses show that the absorption band position determines the type of mineral radically. The paper proposes a method of applying GA (Genetic Algorithm) to the selection of the uranium mineral band feature sub-set. First, on the fundamental of the correlation between feature-based metrics: information entropy, information gain, symmetrical uncertainty and type space, the GA which is a random search algorithm uses the four standards as fitness functions to select the best feature points. Then set three different sub-intervals, extend the best feature points to the best feature sub-sets. Finally, the best feature sub-sets are used for classification. Experiments show that information gain and symmetrical uncertainty that based on genetic algorithm are better than based on CFS in classification.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"16 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Wireless Monitoring and Control of Water Systems Using Zigbee 802.15.4 基于Zigbee 802.15.4的水系统实时无线监控
S. Maqbool, N. Chandra
In this paper we have shown how to monitor the water level of water systems such as water tanks, rivers, ground water table, and bore wells remotely. We have also shown that how to control the working of pump automatically and remotely. It can also be used to remotely monitor the flood areas wirelessly and information can be sent to mobile wirelessly. This project is designed to monitor the water level with the help of water level sensors, Zigbee 802.15.4, 74HC14 inverter and GSM technology. Furthermore, it can monitor the quality of water with the help of water quality sensors such as turbidity sensor and dissolved oxygen sensor. In this monitoring system, sensors monitor the water level, dissolved oxygen, turbidity, temperature and pH level of the water at some predefined sensing interval. This approach would help in reducing the water overflow and home power consumption.
在本文中,我们展示了如何远程监测水箱,河流,地下水位和钻孔等水系统的水位。并介绍了如何实现对泵工作的自动远程控制。它还可以用于远程无线监测洪水地区,并可以将信息无线发送到移动设备。本课题利用水位传感器、Zigbee 802.15.4、74HC14逆变器和GSM技术实现水位监测。此外,它还可以通过浊度传感器、溶解氧传感器等水质传感器来监测水质。在该监测系统中,传感器以预定的传感间隔监测水的水位、溶解氧、浊度、温度和pH值。这种方法将有助于减少水溢出和家庭电力消耗。
{"title":"Real Time Wireless Monitoring and Control of Water Systems Using Zigbee 802.15.4","authors":"S. Maqbool, N. Chandra","doi":"10.1109/CICN.2013.42","DOIUrl":"https://doi.org/10.1109/CICN.2013.42","url":null,"abstract":"In this paper we have shown how to monitor the water level of water systems such as water tanks, rivers, ground water table, and bore wells remotely. We have also shown that how to control the working of pump automatically and remotely. It can also be used to remotely monitor the flood areas wirelessly and information can be sent to mobile wirelessly. This project is designed to monitor the water level with the help of water level sensors, Zigbee 802.15.4, 74HC14 inverter and GSM technology. Furthermore, it can monitor the quality of water with the help of water quality sensors such as turbidity sensor and dissolved oxygen sensor. In this monitoring system, sensors monitor the water level, dissolved oxygen, turbidity, temperature and pH level of the water at some predefined sensing interval. This approach would help in reducing the water overflow and home power consumption.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A  Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home Security System 基于无线网络的家庭安防系统中多重欺骗攻击检测与定位的新方案
Ulya Sabeel, N. Chandra, S. Dagadi
Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.
由于无线传感器网络的日益普及,它们已成为恶意攻击的诱人目标。由于无线传感器网络的特殊性和开放性,它们很容易受到基于身份的攻击,如欺骗。传统的解决欺骗攻击的方法是采用加密认证、空间签名等。这种方法的缺点是开销、有限的功率、带宽和其他可用资源以及高昂的实现成本。本文提出了一种攻击检测与定位方案(ADLS)来检测和定位基于身份的攻击。本文还提出了一种改进的哈希算法。我们将其命名为有效哈希技术(EHT)。它生成哈希密钥以区分攻击者和正常节点,并减少任何误报或误报的发生。同时,我们的定位算法可以有效地找到节点的位置估计。利用该方法可以对攻击者进行鲁棒识别和定位,防止DoS攻击和资源耗尽攻击等大规模网络恶意攻击的发生。对基于802.15.4 (Zigbee)的实时家庭安全系统进行了仿真,并分析了基于NS2的实时家庭安全系统的性能。
{"title":"A  Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home Security System","authors":"Ulya Sabeel, N. Chandra, S. Dagadi","doi":"10.1109/CICN.2013.81","DOIUrl":"https://doi.org/10.1109/CICN.2013.81","url":null,"abstract":"Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Data Structure Based Smart Card Implementation 基于高效数据结构的智能卡实现
Shalini Jain, Anupam Shukla, B. Pandey, Mayank Kumar
To make smart card much faster, we need efficient data structure. Access time of on chip data depends on how and where we stored. Some Data Structure take maximum time and some take minimum time depending on the space and time complexity of data structure. In this work, we have taken some data structures and find that BST is the best suitable data structure for performing smart card operations in compare to other possible data structures.
为了使智能卡更快,我们需要高效的数据结构。芯片上数据的访问时间取决于我们存储的方式和位置。根据数据结构的空间和时间复杂度的不同,有些数据结构所需的时间最多,有些所需的时间最少。在这项工作中,我们采用了一些数据结构,并发现与其他可能的数据结构相比,BST是最适合执行智能卡操作的数据结构。
{"title":"Efficient Data Structure Based Smart Card Implementation","authors":"Shalini Jain, Anupam Shukla, B. Pandey, Mayank Kumar","doi":"10.1109/CICN.2013.102","DOIUrl":"https://doi.org/10.1109/CICN.2013.102","url":null,"abstract":"To make smart card much faster, we need efficient data structure. Access time of on chip data depends on how and where we stored. Some Data Structure take maximum time and some take minimum time depending on the space and time complexity of data structure. In this work, we have taken some data structures and find that BST is the best suitable data structure for performing smart card operations in compare to other possible data structures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object Recognition from Color Images by Fuzzy Classification of Gabor Wavelet Features 基于Gabor小波特征模糊分类的彩色图像目标识别
Seba Susan, S. Chandna
This paper introduces a novel object recognition approach based on the Gabor Wavelet representation of the binarized image that makes use of fuzzy logic for determining the 'soft' class label of the color test images with respect to the gray training templates. The fuzzy membership function used is a Generalized Gaussian function whose exponent value is determined empirically. The use of simple computations for assigning the class label to the query image makes the technique computationally effective. The experimental results on 494 color test images from ten object categories from the Caltech database show a high percentage of classification accuracy with only fifteen gray images from each category used for training. The efficiency of our method is established by comparing our results with that of different classifiers and also with Qiu's Content based Image retrieval (CBIR) system for color images.
本文介绍了一种新的基于二值化图像的Gabor小波表示的目标识别方法,该方法利用模糊逻辑确定颜色测试图像相对于灰度训练模板的“软”类标签。所使用的模糊隶属函数是一个广义高斯函数,其指数值由经验确定。使用简单的计算为查询图像分配类标签,使该技术在计算上有效。从加州理工学院数据库中10个对象类别的494张彩色测试图像的实验结果显示,分类准确率很高,每个类别中只有15张灰度图像用于训练。通过将我们的结果与不同分类器的结果以及Qiu的基于内容的彩色图像检索(CBIR)系统的结果进行比较,证明了我们方法的有效性。
{"title":"Object Recognition from Color Images by Fuzzy Classification of Gabor Wavelet Features","authors":"Seba Susan, S. Chandna","doi":"10.1109/CICN.2013.69","DOIUrl":"https://doi.org/10.1109/CICN.2013.69","url":null,"abstract":"This paper introduces a novel object recognition approach based on the Gabor Wavelet representation of the binarized image that makes use of fuzzy logic for determining the 'soft' class label of the color test images with respect to the gray training templates. The fuzzy membership function used is a Generalized Gaussian function whose exponent value is determined empirically. The use of simple computations for assigning the class label to the query image makes the technique computationally effective. The experimental results on 494 color test images from ten object categories from the Caltech database show a high percentage of classification accuracy with only fifteen gray images from each category used for training. The efficiency of our method is established by comparing our results with that of different classifiers and also with Qiu's Content based Image retrieval (CBIR) system for color images.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ISO 27001 Compliance via Artificial Neural Network 通过人工神经网络符合ISO 27001标准
Ankur Kumar Shrivastava, Abhinav Kumar, A. Rai, Nitisha Payal, A. Tiwari
In this modern world of computerization, lots of data is stored in Computer System & hence requirement to save this data increase day by day. There are lots of Standards which organization can follow to make all the information within their organization safe, but to implement an standard is not easy for every organization, especially with organization which are in the stage of evolution. In this Research Paper we will be presenting a solution using Artificial Intelligence Techniques with the help of which small organization can implement these standards at comparatively low price as well as it will also help organization in Information System Risk Management.
在这个计算机化的现代世界中,大量的数据存储在计算机系统中,因此对保存这些数据的需求日益增加。有许多组织可以遵循的标准来保证组织内所有信息的安全,但是要实现一个标准对每个组织来说都是不容易的,特别是对于处于发展阶段的组织。在这篇研究论文中,我们将提出一种使用人工智能技术的解决方案,在这种技术的帮助下,小型组织可以以相对较低的价格实施这些标准,同时它也将帮助组织进行信息系统风险管理。
{"title":"ISO 27001 Compliance via Artificial Neural Network","authors":"Ankur Kumar Shrivastava, Abhinav Kumar, A. Rai, Nitisha Payal, A. Tiwari","doi":"10.1109/CICN.2013.77","DOIUrl":"https://doi.org/10.1109/CICN.2013.77","url":null,"abstract":"In this modern world of computerization, lots of data is stored in Computer System & hence requirement to save this data increase day by day. There are lots of Standards which organization can follow to make all the information within their organization safe, but to implement an standard is not easy for every organization, especially with organization which are in the stage of evolution. In this Research Paper we will be presenting a solution using Artificial Intelligence Techniques with the help of which small organization can implement these standards at comparatively low price as well as it will also help organization in Information System Risk Management.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129070084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Modified LSB Approaches of Hiding Information in Digital Images 数字图像信息隐藏的改进LSB方法分析
S. Alam, S. Zakariya, M. Rafiq
Steganography is the idea of hiding private, confidential, sensitive data or information within something that appears to be nothing out of the normal. In this paper we describe on how one can use the human vision system and pure steganography to increase the size of the data that we want to embed in the image. In this analysis, we focuses on the property of human vision system that help to increase the amount of data hiding in the bitmap (.bmp) and JPEG (.JPG) images practically. In this work, we enhance the work of LSB and try to come out with a better result for both image quality and the amount of data can be hidden inside it. We come out with two approaches; first one is the 3-3-2 approach without any limitations on the type of images being used and can reach up to 33.3% of size of hidden data, and the second one is the 4-4-4 approach which increase the amount up to 50% of hidden data from the size of image but with certain limitations on the type of images chosen.
隐写术是指将私人、机密、敏感数据或信息隐藏在看似正常的东西中。在本文中,我们描述了如何使用人类视觉系统和纯隐写术来增加我们想要嵌入图像中的数据的大小。在此分析中,我们着重于人类视觉系统的特性,这有助于在实际中增加位图(.bmp)和JPEG (. jpg)图像中隐藏的数据量。在这项工作中,我们对LSB的工作进行了改进,并试图在图像质量和可以隐藏的数据量方面得到更好的结果。我们提出了两种方法;第一种是3-3-2方法,对所使用的图像类型没有任何限制,可以达到隐藏数据大小的33.3%;第二种是4-4-4方法,从图像的大小增加隐藏数据的数量高达50%,但对所选择的图像类型有一定限制。
{"title":"Analysis of Modified LSB Approaches of Hiding Information in Digital Images","authors":"S. Alam, S. Zakariya, M. Rafiq","doi":"10.1109/CICN.2013.66","DOIUrl":"https://doi.org/10.1109/CICN.2013.66","url":null,"abstract":"Steganography is the idea of hiding private, confidential, sensitive data or information within something that appears to be nothing out of the normal. In this paper we describe on how one can use the human vision system and pure steganography to increase the size of the data that we want to embed in the image. In this analysis, we focuses on the property of human vision system that help to increase the amount of data hiding in the bitmap (.bmp) and JPEG (.JPG) images practically. In this work, we enhance the work of LSB and try to come out with a better result for both image quality and the amount of data can be hidden inside it. We come out with two approaches; first one is the 3-3-2 approach without any limitations on the type of images being used and can reach up to 33.3% of size of hidden data, and the second one is the 4-4-4 approach which increase the amount up to 50% of hidden data from the size of image but with certain limitations on the type of images chosen.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design, Implementation, Simulation of a Pyramidal Horn Antenna Excited with Various Top-Hat Loaded Monopoles 各种顶帽负载单极子激励的锥形喇叭天线的设计、实现与仿真
Ranjana Manohar Makam, S. Kulkarni
This paper presents the design and simulation of a wideband, medium gain, light weight, wide bandwidth pyramidal horn antenna feed for microwave applications. The horn was designed using approximation method to calculate the gain in mat lab and simulated using CST microwave studio. The proposed antenna operates within 1-2 GHz (L-band). The horn is supported by a rectangular wave guide. It is linearly polarized and shows wide bandwidth with a gain of 15.3dB. The horn is excited with the monopole which is loaded with various top hat loading such as rectangular disc, circular disc, annular disc, L-type, T-type, Cone shape, U-shaped plates etc. and checked their performances for return loss as well as bandwidth. The circular disc and annular ring gives the low return loss and wide bandwidth as well as low VSWR. The annular ring gave good VSWR and return loss compared to the circular disc. The far field radiation pattern is obtained as well as Efield & H-field analysis for L-band pyramidal horn has been observed, simulated and optimized using CST Microwave Studio. The simulation results show that the pyramidal horn structure exhibits low VSWR as well as good radiation pattern over L-band.
本文介绍了一种用于微波应用的宽带、中增益、轻重量、宽带宽锥形喇叭天线馈源的设计与仿真。采用近似法在mat实验室中计算增益,并在CST微波工作室进行仿真。该天线工作在1- 2ghz (l波段)。喇叭由矩形波导支撑。它是线性极化的,具有宽带宽,增益为15.3dB。用加载有矩形圆盘、圆形圆盘、环形圆盘、l型、t型、锥形、u型板等各种顶帽载荷的单极子激励喇叭,并对其回波损耗和带宽性能进行了检测。圆盘和环形环具有低回波损耗、宽带宽和低驻波比的特点。与圆盘相比,环形环具有良好的驻波比和回波损耗。利用CST Microwave Studio对l波段锥体喇叭的远场辐射方向图进行了观测、模拟和优化,并进行了e场和h场分析。仿真结果表明,锥形喇叭结构具有较低的驻波比和良好的l波段辐射方向图。
{"title":"Design, Implementation, Simulation of a Pyramidal Horn Antenna Excited with Various Top-Hat Loaded Monopoles","authors":"Ranjana Manohar Makam, S. Kulkarni","doi":"10.1109/CICN.2013.24","DOIUrl":"https://doi.org/10.1109/CICN.2013.24","url":null,"abstract":"This paper presents the design and simulation of a wideband, medium gain, light weight, wide bandwidth pyramidal horn antenna feed for microwave applications. The horn was designed using approximation method to calculate the gain in mat lab and simulated using CST microwave studio. The proposed antenna operates within 1-2 GHz (L-band). The horn is supported by a rectangular wave guide. It is linearly polarized and shows wide bandwidth with a gain of 15.3dB. The horn is excited with the monopole which is loaded with various top hat loading such as rectangular disc, circular disc, annular disc, L-type, T-type, Cone shape, U-shaped plates etc. and checked their performances for return loss as well as bandwidth. The circular disc and annular ring gives the low return loss and wide bandwidth as well as low VSWR. The annular ring gave good VSWR and return loss compared to the circular disc. The far field radiation pattern is obtained as well as Efield & H-field analysis for L-band pyramidal horn has been observed, simulated and optimized using CST Microwave Studio. The simulation results show that the pyramidal horn structure exhibits low VSWR as well as good radiation pattern over L-band.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130597098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case Study: Steria's Vendor Management System 案例研究:Steria的供应商管理系统
Nandita Mishra, J. Patel, S. S. Sarangdevot
Our study is about Vendor Management System for Steria. We have collected both primary and secondary data. We have collected the primary data through questionnaires. In this method a questionnaire is sent to the persons concerned with a request to answer the question and return the questionnaire. The analysis is done on the basis of secondary data that is concerned about duplicate payments and delayed payments.
我们的研究是关于Steria的供应商管理系统。我们收集了一手资料和第二手资料。我们通过问卷调查收集了初步数据。在这种方法中,向有关人员发送调查问卷,要求他们回答问题并返回调查问卷。分析是在次要数据的基础上完成的,这些数据涉及重复付款和延迟付款。
{"title":"Case Study: Steria's Vendor Management System","authors":"Nandita Mishra, J. Patel, S. S. Sarangdevot","doi":"10.1109/CICN.2013.128","DOIUrl":"https://doi.org/10.1109/CICN.2013.128","url":null,"abstract":"Our study is about Vendor Management System for Steria. We have collected both primary and secondary data. We have collected the primary data through questionnaires. In this method a questionnaire is sent to the persons concerned with a request to answer the question and return the questionnaire. The analysis is done on the basis of secondary data that is concerned about duplicate payments and delayed payments.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Analysis for WiMAX WiMAX的流量分析
A. Bhatele, Ramesh Parajuli, B. Chaurasia
WiMAX is a broadband wireless technology uses radio transmission for high speed direct access to internet. It is similar to Wi-Fi in working but differs in coverage area, bandwidth and many other aspects. The work discusses various security challenges of WiMAX. Moreover, traffic analysis at different packet length is also presented over IEEE 802.16(e) network so as to give a clear picture of traffic flow in a WiMAX network.
WiMAX是一种宽带无线技术,利用无线电传输实现高速直接接入互联网。它的工作原理与Wi-Fi类似,但在覆盖范围、带宽等许多方面有所不同。该工作讨论了WiMAX的各种安全挑战。此外,本文还对IEEE 802.16(e)网络中不同分组长度下的流量进行了分析,从而对WiMAX网络中的流量流进行了清晰的描述。
{"title":"Traffic Analysis for WiMAX","authors":"A. Bhatele, Ramesh Parajuli, B. Chaurasia","doi":"10.1109/CICN.2013.39","DOIUrl":"https://doi.org/10.1109/CICN.2013.39","url":null,"abstract":"WiMAX is a broadband wireless technology uses radio transmission for high speed direct access to internet. It is similar to Wi-Fi in working but differs in coverage area, bandwidth and many other aspects. The work discusses various security challenges of WiMAX. Moreover, traffic analysis at different packet length is also presented over IEEE 802.16(e) network so as to give a clear picture of traffic flow in a WiMAX network.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 5th International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1