首页 > 最新文献

2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Performance Analysis of MAC802.11 and MAC802.16 for AODV Routing Protocol in MANET 面向MANET AODV路由协议的MAC802.11和MAC802.16性能分析
D. Gour, R. Jain, Rashmi Tikar, R. Bhatia, Umesh Barahdiya
A Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. In this paper mainly focused on MAC layer because this layer is most important for data communication to control the packet loss and error, we analyze MAC layer 802.16 and 802.11 networks using Ad hoc on-demand Distance Vector Routing Protocol under MANET by varying pause time and maximum speed. These simulations are carried out using the Network simulator version-2. From the results it is seen that end to end delay is less, PDF is more packet loss is minimum on varying maximum speed and pause time of 802.16 when compared with 802.11. hence 802.16 shows better performance as compared with 802.11.
无线自组织网络是一组无线移动节点,是通过无线链路连接的移动节点自治系统。每个节点不仅作为终端系统运行,而且作为转发数据包的路由器。由于MAC层对数据通信的丢包和错误控制最为重要,本文主要对MAC层进行了分析,通过改变暂停时间和最大速度,分析了在MANET下使用Ad hoc按需距离矢量路由协议的MAC层802.16和802.11网络。这些模拟是使用Network simulator version-2进行的。从结果可以看出,与802.11相比,在不同的最大速率和暂停时间下,802.16的端到端延迟更小,PDF更多,丢包最小。因此,与802.11相比,802.16表现出更好的性能。
{"title":"Performance Analysis of MAC802.11 and MAC802.16 for AODV Routing Protocol in MANET","authors":"D. Gour, R. Jain, Rashmi Tikar, R. Bhatia, Umesh Barahdiya","doi":"10.1109/CICN.2013.37","DOIUrl":"https://doi.org/10.1109/CICN.2013.37","url":null,"abstract":"A Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. In this paper mainly focused on MAC layer because this layer is most important for data communication to control the packet loss and error, we analyze MAC layer 802.16 and 802.11 networks using Ad hoc on-demand Distance Vector Routing Protocol under MANET by varying pause time and maximum speed. These simulations are carried out using the Network simulator version-2. From the results it is seen that end to end delay is less, PDF is more packet loss is minimum on varying maximum speed and pause time of 802.16 when compared with 802.11. hence 802.16 shows better performance as compared with 802.11.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selecting Optimal Forwarder Based on Energy and Trust for Routing in WSN 基于能量和信任的WSN路由优化转发器选择
S. Maqbool, N. Chandra, S. Dagadi
Energy efficiency is one critical issue for sensor networks because many sensors are equipped with batteries that have limited life time. This paper is focused on Opportunistic routing which is a recent technique that achieves high throughput in the face of lossy wireless links. The existing opportunistic routing protocol, ExOR (ties the MAC with routing) and MORE (MAC-independent) did not explore the benefit of selecting the appropriate forwarding list to minimize the energy cost. In this paper we intend to propose a new protocol called OFETR (Selecting Optimal Forwarder based on Energy and Trust, for Routing) to address the problems of selecting and prioritizing forwarder list based on energy and trust value such that the network performance is optimized. We show how our approach maximizes the network life time in comparison with existing protocols. Saving the nodes energy leads to an increase in the node life in the network in comparison with the other protocols (EXOR and MORE). Furthermore, the protocol increase the security by using trustworthiness routing, reduces propagation delay and loss of packets. Experimental results show that the energy consumption of routing using OFETR is significantly lower than ExOR with random forwarder list and traditional distance vector routing protocols. Simulation results have been obtained by using NS2 simulator. From the results, the performance of OFETR is better compared to the other protocols as EXOR and MORE.
能源效率是传感器网络的一个关键问题,因为许多传感器配备的电池寿命有限。机会路由是最近出现的一种能够在有损耗的无线链路中实现高吞吐量的路由技术。现有的机会路由协议,ExOR(将MAC与路由联系起来)和MORE (MAC独立)没有探索选择合适的转发列表以最小化能源成本的好处。在本文中,我们打算提出一种新的协议OFETR(基于能量和信任的选择最优转发器,用于路由),以解决基于能量和信任值的转发器列表选择和优先级问题,从而优化网络性能。我们将展示与现有协议相比,我们的方法如何最大限度地延长网络生命周期。与其他协议(EXOR和MORE)相比,节省节点能量导致网络中节点寿命的增加。此外,该协议采用可信路由,提高了安全性,减少了传播延迟和数据包丢失。实验结果表明,使用OFETR的路由能耗明显低于使用随机转发器列表和传统距离矢量路由协议的ExOR。利用NS2仿真器进行了仿真。结果表明,与EXOR和MORE等协议相比,OFETR的性能更好。
{"title":"Selecting Optimal Forwarder Based on Energy and Trust for Routing in WSN","authors":"S. Maqbool, N. Chandra, S. Dagadi","doi":"10.1109/CICN.2013.82","DOIUrl":"https://doi.org/10.1109/CICN.2013.82","url":null,"abstract":"Energy efficiency is one critical issue for sensor networks because many sensors are equipped with batteries that have limited life time. This paper is focused on Opportunistic routing which is a recent technique that achieves high throughput in the face of lossy wireless links. The existing opportunistic routing protocol, ExOR (ties the MAC with routing) and MORE (MAC-independent) did not explore the benefit of selecting the appropriate forwarding list to minimize the energy cost. In this paper we intend to propose a new protocol called OFETR (Selecting Optimal Forwarder based on Energy and Trust, for Routing) to address the problems of selecting and prioritizing forwarder list based on energy and trust value such that the network performance is optimized. We show how our approach maximizes the network life time in comparison with existing protocols. Saving the nodes energy leads to an increase in the node life in the network in comparison with the other protocols (EXOR and MORE). Furthermore, the protocol increase the security by using trustworthiness routing, reduces propagation delay and loss of packets. Experimental results show that the energy consumption of routing using OFETR is significantly lower than ExOR with random forwarder list and traditional distance vector routing protocols. Simulation results have been obtained by using NS2 simulator. From the results, the performance of OFETR is better compared to the other protocols as EXOR and MORE.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy L Membership Function Based Hand Gesture Recognition for Bharatanatyam Dance 基于模糊L隶属函数的Bharatanatyam舞蹈手势识别
S. Saha, Lidia Ghosh, A. Konar, R. Janarthanan
This paper presents a method for automatic hand gesture recognition of 'Bharatanatyam' dance using Fuzzy L membership function based approach. Here, a 3-stage system has been designed. In the first stage, the hand of the dancer from background is isolated using Texture based segmentation and thus the contour of the hand is extracted by using Sobel edge detection technique. In the next stage, centre point of the boundary is located and based on this eight spatial distances are calculated. These distances are normalized by dividing the maximum distance value. In the final stage, fuzzy L Membership values are calculated for each distance and matching of an unknown hand gesture is done with the known hand gestures from the database based on L fuzzy membership function. The proposed algorithm gives overall an accuracy of 85.1% and timing complexity is 2.563 sec in an Intel Pentium Dual Core processor running Mat lab R011b for each hand gesture. This simple yet effective code is very useful for e-learning of 'Bharatanatyam' dance.
本文提出了一种基于模糊L隶属度函数的“婆罗塔纳塔姆”舞蹈手势自动识别方法。在这里,我们设计了一个三级系统。第一阶段,采用基于纹理的分割方法将舞者的手从背景中分离出来,然后利用Sobel边缘检测技术提取手的轮廓;下一步,定位边界中心点,并以此为基础计算八个空间距离。这些距离通过除最大距离值而归一化。最后,计算每个距离的模糊L隶属度值,并基于L模糊隶属度函数将未知手势与数据库中的已知手势进行匹配。该算法在运行Mat lab R011b的Intel Pentium双核处理器上,每个手势的总体准确率为85.1%,时序复杂度为2.563秒。这个简单而有效的代码对于“Bharatanatyam”舞蹈的电子学习非常有用。
{"title":"Fuzzy L Membership Function Based Hand Gesture Recognition for Bharatanatyam Dance","authors":"S. Saha, Lidia Ghosh, A. Konar, R. Janarthanan","doi":"10.1109/CICN.2013.75","DOIUrl":"https://doi.org/10.1109/CICN.2013.75","url":null,"abstract":"This paper presents a method for automatic hand gesture recognition of 'Bharatanatyam' dance using Fuzzy L membership function based approach. Here, a 3-stage system has been designed. In the first stage, the hand of the dancer from background is isolated using Texture based segmentation and thus the contour of the hand is extracted by using Sobel edge detection technique. In the next stage, centre point of the boundary is located and based on this eight spatial distances are calculated. These distances are normalized by dividing the maximum distance value. In the final stage, fuzzy L Membership values are calculated for each distance and matching of an unknown hand gesture is done with the known hand gestures from the database based on L fuzzy membership function. The proposed algorithm gives overall an accuracy of 85.1% and timing complexity is 2.563 sec in an Intel Pentium Dual Core processor running Mat lab R011b for each hand gesture. This simple yet effective code is very useful for e-learning of 'Bharatanatyam' dance.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
DCT Domain Encryption in LSB Steganography LSB隐写术中的DCT域加密
R. Biswas, Sayantan Mukherjee, S. Bandyopadhyay
This paper on 'COLOR IMAGE STEGANOGRAPHY IN DCT DOMAIN' portrays a new arena in steganography in color images in frequency domain or more precisely that in Discrete Cosine Transform (DCT) domain. In this paper the authors have proposed the exploration of a deft method for image-secret data-steg pass based sampling along with encryption and embedding in frequency domain with a variable bit retrieval function where the secret data becomes more secure by hiding with the steg password, so that without knowing the steg password one cannot get the secret data explored. The strong adhesion amongst the color images, secret data and steg password, varied with a pixel dependant embedding in DCT domain yields a highly protected and reliable substitution. A group of 8×8 quantized DCT Coefficient (QDC) is selected as our secret data carrier for the color image. The variable bit operation is applied to the proper QDCs to embed a byte of secret data, where the variable bit operation is dependent on the pixel value. Assiduous statistical analysis has been done and provided to emphasize the strong security of the algorithm to the various steganalysis methods. This will also help to reveal its huge carrier capacity and stego image quality.
本文“DCT域彩色图像隐写”描述了频域彩色图像隐写的新领域,或者更准确地说,是在离散余弦变换(DCT)域。在本文中,作者提出了一种基于steg通道的图像秘密数据的灵巧采样方法,并在频域内使用可变位检索函数进行加密和嵌入,其中秘密数据通过steg密码的隐藏而变得更加安全,从而在不知道steg密码的情况下无法获得被探测到的秘密数据。彩色图像、秘密数据和密码之间的强附着性,在DCT域中的像素依赖嵌入产生了高度保护和可靠的替代。选择一组8×8量化DCT系数(QDC)作为彩色图像的秘密数据载体。可变位操作应用于适当的qdc以嵌入一个字节的秘密数据,其中可变位操作依赖于像素值。并进行了大量的统计分析,以强调该算法相对于各种隐写分析方法具有较强的安全性。这也将有助于揭示其巨大的载波容量和隐写图像质量。
{"title":"DCT Domain Encryption in LSB Steganography","authors":"R. Biswas, Sayantan Mukherjee, S. Bandyopadhyay","doi":"10.1109/CICN.2013.89","DOIUrl":"https://doi.org/10.1109/CICN.2013.89","url":null,"abstract":"This paper on 'COLOR IMAGE STEGANOGRAPHY IN DCT DOMAIN' portrays a new arena in steganography in color images in frequency domain or more precisely that in Discrete Cosine Transform (DCT) domain. In this paper the authors have proposed the exploration of a deft method for image-secret data-steg pass based sampling along with encryption and embedding in frequency domain with a variable bit retrieval function where the secret data becomes more secure by hiding with the steg password, so that without knowing the steg password one cannot get the secret data explored. The strong adhesion amongst the color images, secret data and steg password, varied with a pixel dependant embedding in DCT domain yields a highly protected and reliable substitution. A group of 8×8 quantized DCT Coefficient (QDC) is selected as our secret data carrier for the color image. The variable bit operation is applied to the proper QDCs to embed a byte of secret data, where the variable bit operation is dependent on the pixel value. Assiduous statistical analysis has been done and provided to emphasize the strong security of the algorithm to the various steganalysis methods. This will also help to reveal its huge carrier capacity and stego image quality.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improved Indexing Mechanism to Index Web Documents 一种用于索引Web文档的改进索引机制
Pooja Mudgil, A. Sharma, Pooja Gupta
Owing to the dynamic nature of the web, it is difficult for search engine to find the relevant documents to serve a user query. For this purpose, search engine maintains the index of downloaded documents stored in the local repository. Whenever a query comes search engine searches the index in order to find the relevant matched results to be presented to the user. The quality of the matched result depends on the information stored in the index. The more efficient is the structure of index, more efficient the performance of search engine. Generally, inverted index are based solely on the frequency of keywords present in number of documents. In order to improve the efficiency of the search engine, an improved indexing mechanism to index the web documents is being proposed that keeps the context related information integrated with the frequency of the keyword. The structure is implemented using Trie. The implementation results on various documents show that proposed index efficiently stores the documents and search is fast.
由于网络的动态性,搜索引擎很难找到相关的文档来满足用户的查询。为此,搜索引擎维护存储在本地存储库中的下载文档的索引。每当出现查询时,搜索引擎都会搜索索引,以便找到要呈现给用户的相关匹配结果。匹配结果的质量取决于存储在索引中的信息。索引的结构越高效,搜索引擎的性能就越高效。通常,倒排索引仅基于关键字在文档数量中出现的频率。为了提高搜索引擎的效率,提出了一种改进的索引机制,将上下文相关信息与关键词的出现频率相结合,对网络文档进行索引。该结构是使用Trie实现的。对各种文档的实现结果表明,该索引存储文档效率高,搜索速度快。
{"title":"An Improved Indexing Mechanism to Index Web Documents","authors":"Pooja Mudgil, A. Sharma, Pooja Gupta","doi":"10.1109/CICN.2013.101","DOIUrl":"https://doi.org/10.1109/CICN.2013.101","url":null,"abstract":"Owing to the dynamic nature of the web, it is difficult for search engine to find the relevant documents to serve a user query. For this purpose, search engine maintains the index of downloaded documents stored in the local repository. Whenever a query comes search engine searches the index in order to find the relevant matched results to be presented to the user. The quality of the matched result depends on the information stored in the index. The more efficient is the structure of index, more efficient the performance of search engine. Generally, inverted index are based solely on the frequency of keywords present in number of documents. In order to improve the efficiency of the search engine, an improved indexing mechanism to index the web documents is being proposed that keeps the context related information integrated with the frequency of the keyword. The structure is implemented using Trie. The implementation results on various documents show that proposed index efficiently stores the documents and search is fast.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobile Cloud Computing: A Needed Shift from Cloud to Mobile Cloud 移动云计算:从云到移动云的必要转变
Rishabh Sharma, Sanjay Kumar, M. Trivedi
Cloud is the kind of distributed computing which disperses and processes data distributed by virtualized manner. Cloud provides resources and computing infrastructure on demand basis to cloud consumers. The combination of cloud computing into the mobile computing environment is developed as a capable technology for mobile services. In this paper we emphasis on scenarios for availability of cloud resources and services on mobile devices. Further need of mobile cloud computing, real time mobile cloud applications, a comparative analysis on mobile cloud enablement technologies and role of middleware system are discussed as counter part of this research.
云是一种分布式计算,它以虚拟化的方式对分布的数据进行分散和处理。云为云消费者按需提供资源和计算基础设施。云计算与移动计算环境的结合是一种移动服务的能力技术。在本文中,我们着重于云资源和服务在移动设备上的可用性。对移动云计算的进一步需求、实时移动云应用、移动云实现技术和中间件系统的作用进行了对比分析。
{"title":"Mobile Cloud Computing: A Needed Shift from Cloud to Mobile Cloud","authors":"Rishabh Sharma, Sanjay Kumar, M. Trivedi","doi":"10.1109/CICN.2013.116","DOIUrl":"https://doi.org/10.1109/CICN.2013.116","url":null,"abstract":"Cloud is the kind of distributed computing which disperses and processes data distributed by virtualized manner. Cloud provides resources and computing infrastructure on demand basis to cloud consumers. The combination of cloud computing into the mobile computing environment is developed as a capable technology for mobile services. In this paper we emphasis on scenarios for availability of cloud resources and services on mobile devices. Further need of mobile cloud computing, real time mobile cloud applications, a comparative analysis on mobile cloud enablement technologies and role of middleware system are discussed as counter part of this research.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124400931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
PaaS-Platform for Mobile Health 移动健康paas平台
Long Chang, Cong Guan, Jihui Xu, Huaiyu Xu
With the development of communication technology, every industry has change lot. The medical industry has the same trend at this time. In order to create an environment for different social department, this paper presents a new solution which PaaS is used for mobile health. In the PaaS-Platform, distributed storage and cluster technology have been used for providing better service. The PaaS-Platform gives some permission for some departments to develop their own SaaSPlatform. And different mobile clients will be developed based on different departments' needs. Means of communication take Web Service which is the idea of SOA so that the platform is compatible with a variety of platforms. As a validation of our framework, a mobile client is presented in this paper.
随着通信技术的发展,各行各业都发生了很大的变化。医疗行业在这个时候也有同样的趋势。为了给不同的社会部门创造一个环境,本文提出了一种新的解决方案,即PaaS用于移动医疗。在paas平台中,为了提供更好的服务,采用了分布式存储和集群技术。paas平台允许一些部门开发自己的saas平台。并根据不同部门的需求开发不同的移动客户端。通信方式采用Web服务,这是SOA的思想,使该平台与各种平台兼容。为了验证我们的框架,本文给出了一个移动客户端。
{"title":"PaaS-Platform for Mobile Health","authors":"Long Chang, Cong Guan, Jihui Xu, Huaiyu Xu","doi":"10.1109/CICN.2013.119","DOIUrl":"https://doi.org/10.1109/CICN.2013.119","url":null,"abstract":"With the development of communication technology, every industry has change lot. The medical industry has the same trend at this time. In order to create an environment for different social department, this paper presents a new solution which PaaS is used for mobile health. In the PaaS-Platform, distributed storage and cluster technology have been used for providing better service. The PaaS-Platform gives some permission for some departments to develop their own SaaSPlatform. And different mobile clients will be developed based on different departments' needs. Means of communication take Web Service which is the idea of SOA so that the platform is compatible with a variety of platforms. As a validation of our framework, a mobile client is presented in this paper.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wideband CPW-Fed Monopole Antenna with Half U Slot Cut in Rectangular Patch 矩形贴片半U型槽切割的宽带cpw馈单极天线
S. N. Ather, P. Singhal
In this paper a broadband monopole antenna with half u slot cut in rectangular patch on coplanar wave guide (CPW) feed is presented. The antenna composed of a planar rectangular patch element embedded with half U slot cut with good impedance matching. The parametric study is performed to understand the characteristics of the proposed antenna. The overall size of the antenna is 62 mm X 47 mm X 1.6 mm including the finite ground CPW feeding mechanism and total volume of the antenna is 4.66 cm3. The antenna operates in broad frequency bands from 2.4 GHz to 5.9 GHz covering wireless Local area networks (WLAN) and worldwide interoperability for microwave access (WIMAX) bands. Also good antenna performances such as radiation patterns and antenna gain over the operating band have been observed and simulated peak gain of the antenna is 2.8 dBi at resonant frequency of 4.15GHz.
本文提出了一种在共面波导馈电上采用矩形补片切割半u型槽的宽带单极天线。该天线由平面矩形贴片单元嵌入半U型槽切组成,具有良好的阻抗匹配。进行参数化研究以了解所提出天线的特性。天线的整体尺寸为62 mm X 47 mm X 1.6 mm,包括有限地CPW馈电机构,天线的总体积为4.66 cm3。该天线工作在2.4 GHz到5.9 GHz的宽频段,覆盖无线局域网(WLAN)和全球微波接入(WIMAX)频段的互操作性。在4.15GHz谐振频率下,天线的模拟峰值增益为2.8 dBi。
{"title":"Wideband CPW-Fed Monopole Antenna with Half U Slot Cut in Rectangular Patch","authors":"S. N. Ather, P. Singhal","doi":"10.1109/CICN.2013.13","DOIUrl":"https://doi.org/10.1109/CICN.2013.13","url":null,"abstract":"In this paper a broadband monopole antenna with half u slot cut in rectangular patch on coplanar wave guide (CPW) feed is presented. The antenna composed of a planar rectangular patch element embedded with half U slot cut with good impedance matching. The parametric study is performed to understand the characteristics of the proposed antenna. The overall size of the antenna is 62 mm X 47 mm X 1.6 mm including the finite ground CPW feeding mechanism and total volume of the antenna is 4.66 cm3. The antenna operates in broad frequency bands from 2.4 GHz to 5.9 GHz covering wireless Local area networks (WLAN) and worldwide interoperability for microwave access (WIMAX) bands. Also good antenna performances such as radiation patterns and antenna gain over the operating band have been observed and simulated peak gain of the antenna is 2.8 dBi at resonant frequency of 4.15GHz.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Forensic Investigation Development Model 数字法医调查发展模式
Ankur Kumar Shrivastava, Nitisha Payal, A. Rastogi, A. Tiwari
The arena of computer forensics investigation is a relatively new field of study. Many of the methods used in digital forensics have not been formally outlined. Digital Forensics is looked as part of art and part of science. This paper discussed breaking down the digital forensic investigation and their progression into an investigation development model so that an examiner can easily grip the problem and challenges during preparing and processing investigations. After going through various system and case analyses key issues, resulting in the documentation of role of computer examiner to gather evidence from a suspect computer terminal and determine whether the suspect committed a crime or violated a organization policies. As an outcome Digital forensic investigation development model (DFIDM) is introduced as a tailored approach for computer examiner or investigators for gathering and preserving the necessary digital evidence from different computer terminals or resources.
计算机取证调查是一个相对较新的研究领域。数字取证中使用的许多方法尚未正式概述。数字取证被视为艺术和科学的一部分。本文讨论了将数字司法调查分解并将其推进到调查发展模式,以便检查员在调查准备和处理过程中轻松掌握问题和挑战。通过对各种制度和案例的关键问题进行分析,产生了计算机审查员的角色文件,从嫌疑人的计算机终端收集证据,确定嫌疑人是否犯罪或违反组织政策。作为结果,数字法医调查发展模型(DFIDM)被引入,作为计算机审查员或调查人员从不同计算机终端或资源收集和保存必要的数字证据的定制方法。
{"title":"Digital Forensic Investigation Development Model","authors":"Ankur Kumar Shrivastava, Nitisha Payal, A. Rastogi, A. Tiwari","doi":"10.1109/CICN.2013.115","DOIUrl":"https://doi.org/10.1109/CICN.2013.115","url":null,"abstract":"The arena of computer forensics investigation is a relatively new field of study. Many of the methods used in digital forensics have not been formally outlined. Digital Forensics is looked as part of art and part of science. This paper discussed breaking down the digital forensic investigation and their progression into an investigation development model so that an examiner can easily grip the problem and challenges during preparing and processing investigations. After going through various system and case analyses key issues, resulting in the documentation of role of computer examiner to gather evidence from a suspect computer terminal and determine whether the suspect committed a crime or violated a organization policies. As an outcome Digital forensic investigation development model (DFIDM) is introduced as a tailored approach for computer examiner or investigators for gathering and preserving the necessary digital evidence from different computer terminals or resources.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling and Performance Analysis of Single Stage Power Factor Corrected Resonant Converter Using MATLAB/Simulink 基于MATLAB/Simulink的单级功率因数校正谐振变换器建模与性能分析
J. S. Soni, Smita Pareek, H. Agrawal
The projected technique is based on the utilization of customized three-level resonant converter topology to increase their power ratings to be in several kilowatts levels. In this technique low voltage stress on switches, made possibility of operation with high frequency, possibility of zero voltage switching, can be applied under a wide range of input and output conditions including high flexibility in operation and control can be achieved using the principle of combined control of frequency and asymmetrical pulse width modulation. In proposed technique the output voltage is regulated through the variation of frequency and input power factor correction are obtained through pulse width modulation control. The proposed topology of converter has been implemented and investigated in the MATLAB/Simulink and the various results are provided to validate the proposed concepts.
预计的技术是基于利用定制的三电平谐振变换器拓扑来增加其额定功率到几个千瓦级别。该技术采用频率控制与非对称脉宽调制相结合的原理,对开关施加低电压应力,使其具有高频工作的可能性,零电压开关的可能性,可以在广泛的输入和输出条件下应用,具有很高的操作灵活性和控制灵活性。该技术通过频率的变化来调节输出电压,通过脉宽调制控制来实现输入功率因数的校正。在MATLAB/Simulink中对所提出的转换器拓扑结构进行了实现和研究,并给出了各种结果来验证所提出的概念。
{"title":"Modeling and Performance Analysis of Single Stage Power Factor Corrected Resonant Converter Using MATLAB/Simulink","authors":"J. S. Soni, Smita Pareek, H. Agrawal","doi":"10.1109/CICN.2013.144","DOIUrl":"https://doi.org/10.1109/CICN.2013.144","url":null,"abstract":"The projected technique is based on the utilization of customized three-level resonant converter topology to increase their power ratings to be in several kilowatts levels. In this technique low voltage stress on switches, made possibility of operation with high frequency, possibility of zero voltage switching, can be applied under a wide range of input and output conditions including high flexibility in operation and control can be achieved using the principle of combined control of frequency and asymmetrical pulse width modulation. In proposed technique the output voltage is regulated through the variation of frequency and input power factor correction are obtained through pulse width modulation control. The proposed topology of converter has been implemented and investigated in the MATLAB/Simulink and the various results are provided to validate the proposed concepts.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 5th International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1