首页 > 最新文献

2015 International Conference on Communication Networks (ICCN)最新文献

英文 中文
Analyzing the behavior of WPA with modification 分析修改后的WPA的行为
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.11
Kashish Monga, V. Arora, Ashish Kumar
With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.
随着科技的进步,信息和通信的价值已经显现出来。快速可靠的通信是这一代人所需要的。信息和快速沟通已成为成功的关键。随着人们对技术和软数据的依赖越来越多,网络或系统的破坏也越来越多。人们可以很容易地使用防病毒或反恶意软件来保护系统,但网络呢?为此,Wi-Fi联盟定义了一些协议,通常被称为WEP, WPA WPA2,在本文中,我们将修改WPA,使其更可靠,使用SHA3作为加密散列算法,以保证数据的安全性和完整性。稍后我们将分析结果,并将其与类似条件下使用的SHA1进行比较。
{"title":"Analyzing the behavior of WPA with modification","authors":"Kashish Monga, V. Arora, Ashish Kumar","doi":"10.1109/ICCN.2015.11","DOIUrl":"https://doi.org/10.1109/ICCN.2015.11","url":null,"abstract":"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of low leakage CMOS based full wave bridge rectifier 低漏CMOS全波桥式整流器的设计
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.70
Poonam Tiwari, Prateek Jain, S. Akashe
In this paper a low leakage CMOS based full wave bridge rectifier is analyzed. MOS based bridge rectifier circuit is being proposed in this study instead of the conventional diode bridge rectifier circuit because of its less reverse leakage parameters, proper utilization of switching mechanism results in high efficiency and suitability for high frequency application. It finds applications in many modern electronic applications such as signal processing, conditioning, measurement and instrumentation. The reduction of leakage parameters is exceeded to the improved rectifier efficiency of the proposed circuit. After simulation and analysis of proposed circuit, the leakage power obtained for the proposed circuit has found 1.089 fW; the average power of the proposed circuit has found 1.76 μW. The efficiency of the proposed circuit has found 81.83% which explains an improvement as compared to that of the diode based bridge rectifier circuit. The design is simulated at 45nm technology.
本文分析了一种基于CMOS的低漏全波桥式整流器。本文提出了基于MOS的桥式整流电路,以取代传统的二极管桥式整流电路,其反漏参数少,合理利用开关机构,效率高,适合于高频应用。它在许多现代电子应用中得到应用,如信号处理、调理、测量和仪器仪表。漏电参数的降低不仅提高了电路的整流效率。通过对所提电路的仿真分析,得到所提电路的漏功率为1.089 fW;该电路的平均功率为1.76 μW。该电路的效率为81.83%,与基于二极管的桥式整流电路相比有了很大的提高。该设计采用45纳米技术进行仿真。
{"title":"Design of low leakage CMOS based full wave bridge rectifier","authors":"Poonam Tiwari, Prateek Jain, S. Akashe","doi":"10.1109/ICCN.2015.70","DOIUrl":"https://doi.org/10.1109/ICCN.2015.70","url":null,"abstract":"In this paper a low leakage CMOS based full wave bridge rectifier is analyzed. MOS based bridge rectifier circuit is being proposed in this study instead of the conventional diode bridge rectifier circuit because of its less reverse leakage parameters, proper utilization of switching mechanism results in high efficiency and suitability for high frequency application. It finds applications in many modern electronic applications such as signal processing, conditioning, measurement and instrumentation. The reduction of leakage parameters is exceeded to the improved rectifier efficiency of the proposed circuit. After simulation and analysis of proposed circuit, the leakage power obtained for the proposed circuit has found 1.089 fW; the average power of the proposed circuit has found 1.76 μW. The efficiency of the proposed circuit has found 81.83% which explains an improvement as compared to that of the diode based bridge rectifier circuit. The design is simulated at 45nm technology.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency compensation in two stage operational amplifier using common gate stage 两级运算放大器的共门级频率补偿
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.31
Aditya Raj, R. Yadav, S. Akashe
This paper represents a highly stable, more efficient and low power CMOS based operational amplifier. A compensation strategy using common gate stage is used which provides high gain-bandwidth product and overcomes the drawback of source follower and lead compensation approaches by eliminating the complex poles and right-half-plane (RHP) zero. The proposed circuit utilized the miller capacitance in conjunction with common gate current buffer to obtain the design equations. This circuit is simulated at 45nm technology using cadence analog virtuoso tool. The operational amplifier designed here produces an improved unity gain frequency of 6.8 MHZ with phase margin of approximately 68° and an open loop gain of 88 dB which ensures the stability of the system. The stability is required in high frequency switching regulators like sampled data system to generate their power supplies. These can also be used in a so many analog circuits such as active filters, analog-to-digital converters, low-dropout regulators (LDOs).
本文介绍了一种高稳定、高效率、低功耗的CMOS运算放大器。采用公共栅极级补偿策略,既能提供高增益带宽积,又克服了源从动和引线补偿方法的缺点,消除了复杂极点和右半平面(RHP)零点。该电路利用米勒电容和共门电流缓冲器得到设计方程。该电路在45纳米技术下使用cadence模拟virtuoso工具进行仿真。本文设计的运算放大器的单位增益频率为6.8 MHZ,相位裕度约为68°,开环增益为88 dB,确保了系统的稳定性。在高频开关稳压器中,如采样数据系统,需要稳定的供电。这些也可以用于许多模拟电路,如有源滤波器,模数转换器,低差稳压器(ldo)。
{"title":"Frequency compensation in two stage operational amplifier using common gate stage","authors":"Aditya Raj, R. Yadav, S. Akashe","doi":"10.1109/ICCN.2015.31","DOIUrl":"https://doi.org/10.1109/ICCN.2015.31","url":null,"abstract":"This paper represents a highly stable, more efficient and low power CMOS based operational amplifier. A compensation strategy using common gate stage is used which provides high gain-bandwidth product and overcomes the drawback of source follower and lead compensation approaches by eliminating the complex poles and right-half-plane (RHP) zero. The proposed circuit utilized the miller capacitance in conjunction with common gate current buffer to obtain the design equations. This circuit is simulated at 45nm technology using cadence analog virtuoso tool. The operational amplifier designed here produces an improved unity gain frequency of 6.8 MHZ with phase margin of approximately 68° and an open loop gain of 88 dB which ensures the stability of the system. The stability is required in high frequency switching regulators like sampled data system to generate their power supplies. These can also be used in a so many analog circuits such as active filters, analog-to-digital converters, low-dropout regulators (LDOs).","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Traffic analysis for VANET using WAVE and WiMAX 基于WAVE和WiMAX的VANET流量分析
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.65
Priyanka Tiwari, R. S. Kushwah
In recent years, the immense and ubiquitous coverage area of vehicular network is growing very frequently as the computational power and deployment of modern vehicle's wireless connectivity and their service facilities are raised. VANET (Vehicular Ad hoc Network) have become an orientation to the researchers and users both for inventive utilization of wide range of safety and non-safety applications provided by this network. It has many issues and challenges for perpetuating the efficiency of the vehicular network in terms of throughput, packet loss and jitter/delay. In this paper, implementation of two different scenarios of vehicular environment with mobile IP using WAVE (Wireless Access in Vehicular Environment or IEEE 802.11p) and WiMAX (Worldwide Interoperability for Microwave Access IEEE 802.16e) technologies is done, for calculating the delay for different packet length over base station. NCTUns simulator is used for simulation.
近年来,随着现代汽车无线连接及其服务设施的计算能力和部署的不断提高,汽车网络覆盖范围日益广阔,无处不在。车辆自组织网络(Vehicular Ad hoc Network,简称VANET)已成为研究人员和用户的研究方向,因为它提供了广泛的安全和非安全应用。它在保持车载网络的效率方面存在许多问题和挑战,如吞吐量、数据包丢失和抖动/延迟。本文采用WAVE (Wireless Access In vehicular environment或IEEE 802.11p)和WiMAX (Worldwide Interoperability for Microwave Access, IEEE 802.16e)技术实现了两种不同的车载环境移动IP场景,计算了基站上不同数据包长度的延迟。采用NCTUns模拟器进行仿真。
{"title":"Traffic analysis for VANET using WAVE and WiMAX","authors":"Priyanka Tiwari, R. S. Kushwah","doi":"10.1109/ICCN.2015.65","DOIUrl":"https://doi.org/10.1109/ICCN.2015.65","url":null,"abstract":"In recent years, the immense and ubiquitous coverage area of vehicular network is growing very frequently as the computational power and deployment of modern vehicle's wireless connectivity and their service facilities are raised. VANET (Vehicular Ad hoc Network) have become an orientation to the researchers and users both for inventive utilization of wide range of safety and non-safety applications provided by this network. It has many issues and challenges for perpetuating the efficiency of the vehicular network in terms of throughput, packet loss and jitter/delay. In this paper, implementation of two different scenarios of vehicular environment with mobile IP using WAVE (Wireless Access in Vehicular Environment or IEEE 802.11p) and WiMAX (Worldwide Interoperability for Microwave Access IEEE 802.16e) technologies is done, for calculating the delay for different packet length over base station. NCTUns simulator is used for simulation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"37 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Introduction to the basic LTE handover procedures 介绍基本的LTE移交程序
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.39
J. Agrawal, Rakesh Patel, P. Mor, P. Dubey, J. M. Keller
Mobile communication industry is growing very fast with the increasing demand of users in the field of communication. To meet up the users demand and to provide them better communication a new radio access network was designed which was named as Long Term Evolution (LTE). As better connectivity is very important during both stationary and roaming conditions, a proper handover is of keen importance. LTE has introduced new handover procedures for both inter and intra radio access communication which has not only reduced the call drops but has also increased the communication quality. A short description of these procedures is given in this paper.
随着用户在通信领域的需求不断增加,移动通信行业发展非常迅速。为了满足用户的需求,为用户提供更好的通信,设计了一种新的无线接入网,称为长期演进(LTE)。由于在静止和漫游条件下,更好的连接非常重要,因此适当的切换非常重要。LTE为内部和内部无线接入通信引入了新的切换程序,这不仅减少了通话掉线,而且提高了通信质量。本文对这些步骤作了简要说明。
{"title":"Introduction to the basic LTE handover procedures","authors":"J. Agrawal, Rakesh Patel, P. Mor, P. Dubey, J. M. Keller","doi":"10.1109/ICCN.2015.39","DOIUrl":"https://doi.org/10.1109/ICCN.2015.39","url":null,"abstract":"Mobile communication industry is growing very fast with the increasing demand of users in the field of communication. To meet up the users demand and to provide them better communication a new radio access network was designed which was named as Long Term Evolution (LTE). As better connectivity is very important during both stationary and roaming conditions, a proper handover is of keen importance. LTE has introduced new handover procedures for both inter and intra radio access communication which has not only reduced the call drops but has also increased the communication quality. A short description of these procedures is given in this paper.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tolerant design of low power D Flip Flop using GDI and DSTC for higher performance 采用GDI和DSTC的低功耗D触发器容错设计,实现更高的性能
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.64
S. Gupta, N. Saxena
This article clarifies another execution of productive D-Flip-Flop (DFF) utilizing Gate-Diffusion-Input (GDI) strategy and DSTC. This DFF outline permits diminishing force delay item and territory of the circuit, while keeping up low many-sided quality of rationale configuration. Execution correlation with other DFF plan systems is exhibited, regarding entryway range, number of gadgets, postpone and power scattering, indicating points of interest and disadvantages of GDI DFF when contrasted with ordinary strategy. The execution is completed by HSPICE reenactment with 180 nm & 90 nm CMOS innovation.
本文阐明了利用门扩散输入(GDI)策略和DSTC实现生产性d触发器(DFF)的另一种方法。该DFF轮廓允许减小力延迟项和电路的范围,同时保持低的基本原理配置的多面质量。在入口通道范围、小工具数量、延迟和功率散射等方面,展示了与其他DFF计划系统的执行相关性,表明了GDI DFF与普通策略相比的兴趣点和缺点。通过HSPICE再现180nm和90nm CMOS创新完成执行。
{"title":"Tolerant design of low power D Flip Flop using GDI and DSTC for higher performance","authors":"S. Gupta, N. Saxena","doi":"10.1109/ICCN.2015.64","DOIUrl":"https://doi.org/10.1109/ICCN.2015.64","url":null,"abstract":"This article clarifies another execution of productive D-Flip-Flop (DFF) utilizing Gate-Diffusion-Input (GDI) strategy and DSTC. This DFF outline permits diminishing force delay item and territory of the circuit, while keeping up low many-sided quality of rationale configuration. Execution correlation with other DFF plan systems is exhibited, regarding entryway range, number of gadgets, postpone and power scattering, indicating points of interest and disadvantages of GDI DFF when contrasted with ordinary strategy. The execution is completed by HSPICE reenactment with 180 nm & 90 nm CMOS innovation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy based optimization of social network with special reference to terrorist network mining 基于模糊的社会网络优化,特别涉及恐怖分子网络的挖掘
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.32
Suraksha Tiwari, Shilky Shrivastava, Manish Gupta
The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.
社会网络分析的广阔领域促使执法机构对社会网络行为进行研究。世界各国的执法机构已经开始研究先进的知识发现技术,以协助分析恐怖分子的信息。这类技术的使用被视为通过预测恐怖分子的活动来打击恐怖主义的情报工具。这种恐怖活动可以通过发现网络中的可疑节点来预测。在发现可疑节点的方法上,提出了一种减小网络规模或减少节点个数的方法。由于网络的大小是SNA中新出现的问题。在该方法中,我们使用模糊对网络进行约简,使约简后的网络只包含潜在节点的集合。应用我们的方法得到了一个具有高恐怖分子节点可能性的简化网络。
{"title":"Fuzzy based optimization of social network with special reference to terrorist network mining","authors":"Suraksha Tiwari, Shilky Shrivastava, Manish Gupta","doi":"10.1109/ICCN.2015.32","DOIUrl":"https://doi.org/10.1109/ICCN.2015.32","url":null,"abstract":"The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wideband Low Noise Unity Gain amplifier using linearity enhancement technique 采用线性增强技术的宽带低噪声单位增益放大器
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.69
Shaily Singh, Arun Patel, Pritesh Tiwari, Vaibhav Singh
A low noise-figure (NF) and Unity power gain 1-100 GHz ultra-wideband Low Noise π Network with excellent linearity is reported. An π-match input network, Capacitive feedback with series and shunt inductive peaking techniques are used to achieve wideband impedance matching with low noise figure as well as flat unity gain response. This technique exists unity voltage and current gain so that matching used as a follower. The LNA consumes power dissipation 1.586 mW, and group-delay (GD) variation less than 0.1f ps in the frequency range 1-100 GHz. Furthermore, the LNA achieves minimum NF of 0.4 dB for frequencies 1-100 GHz, one of the best NF results reported for frequencies 1-100 GHz. CMOS ultra-wideband Low Noise π Network. Low power consumption network is versatile demanded in modern technology, modern technology want such type of amplifier which gives low power consumption with less reflection, In this paper presented technique to reduce leakage power consumption with small value of reflection. Here design low power dissipation network using compensation and feedback technique.
报道了一种低噪声系数和统一功率增益的1- 100ghz超宽带低噪声π网络,具有良好的线性度。在π匹配输入网络中,电容反馈采用串联和并联感应峰值技术,实现了低噪声系数的宽带阻抗匹配和平坦的单位增益响应。该技术存在统一的电压和电流增益,以便匹配用作从动器。LNA功耗1.586 mW,在1 ~ 100ghz频率范围内,群延迟(GD)变化小于0.1 fps。此外,LNA在1-100 GHz频率下的最小NF值为0.4 dB,这是1-100 GHz频率下的最佳NF结果之一。CMOS超宽带低噪声π网络。低功耗网络是现代技术的通用要求,现代技术需要的是低功耗、低反射的放大器,本文提出了以小反射值降低漏电功耗的技术。本文采用补偿反馈技术设计低功耗网络。
{"title":"Wideband Low Noise Unity Gain amplifier using linearity enhancement technique","authors":"Shaily Singh, Arun Patel, Pritesh Tiwari, Vaibhav Singh","doi":"10.1109/ICCN.2015.69","DOIUrl":"https://doi.org/10.1109/ICCN.2015.69","url":null,"abstract":"A low noise-figure (NF) and Unity power gain 1-100 GHz ultra-wideband Low Noise π Network with excellent linearity is reported. An π-match input network, Capacitive feedback with series and shunt inductive peaking techniques are used to achieve wideband impedance matching with low noise figure as well as flat unity gain response. This technique exists unity voltage and current gain so that matching used as a follower. The LNA consumes power dissipation 1.586 mW, and group-delay (GD) variation less than 0.1f ps in the frequency range 1-100 GHz. Furthermore, the LNA achieves minimum NF of 0.4 dB for frequencies 1-100 GHz, one of the best NF results reported for frequencies 1-100 GHz. CMOS ultra-wideband Low Noise π Network. Low power consumption network is versatile demanded in modern technology, modern technology want such type of amplifier which gives low power consumption with less reflection, In this paper presented technique to reduce leakage power consumption with small value of reflection. Here design low power dissipation network using compensation and feedback technique.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131582764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preemptable priority based dynamic resource allocation in cloud computing with fault tolerance 基于可抢占优先级的容错云计算动态资源分配
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.54
Shubhakankshi Goutam, A. Yadav
Today, cloud computing serves as a request response model, where a client makes request for various available services on “pay as you go basis”. Cloud computing offers a dynamic flexible resource allocation phenomenon. For reliable and guaranteed services there must be a scheduling mechanism that all resources are efficiently allocated to satisfy the customer's request. Cloud services are based on scalability, availability, security and fault tolerance features. Service provisioning in cloud is based on SLA. Service level agreement is the terms of cloud provider's contracts with customers to define the level(s) of service being sold in plain language terms. QoS (quality of service) plays important role in cloud environment. Resource scheduling and service deployment is done by considering multiple SLA parameters like CPU requirement, network bandwidth, memory and storage. In this paper we propose an algorithm which perform resource preemption from low priority task to high priority task and advanced reservation for resources considering multiple SLA parameters for deploying service. This algorithm is also effective for fault tolerance mechanism.
今天,云计算作为一种请求响应模型,其中客户端以“按需付费”的方式对各种可用服务发出请求。云计算提供了一种动态灵活的资源分配现象。对于可靠和有保证的服务,必须有一种调度机制,以便有效地分配所有资源以满足客户的请求。云服务基于可伸缩性、可用性、安全性和容错特性。云中的业务发放是基于SLA的。服务级别协议是云提供商与客户签订的合同中的条款,用于以简单的语言术语定义所销售的服务级别。服务质量(QoS)在云环境中起着重要的作用。资源调度和服务部署是通过考虑多个SLA参数(如CPU需求、网络带宽、内存和存储)来完成的。本文提出了一种从低优先级任务到高优先级任务的资源抢占算法,并在考虑多个SLA参数的情况下对资源进行高级预留。该算法对容错机制也是有效的。
{"title":"Preemptable priority based dynamic resource allocation in cloud computing with fault tolerance","authors":"Shubhakankshi Goutam, A. Yadav","doi":"10.1109/ICCN.2015.54","DOIUrl":"https://doi.org/10.1109/ICCN.2015.54","url":null,"abstract":"Today, cloud computing serves as a request response model, where a client makes request for various available services on “pay as you go basis”. Cloud computing offers a dynamic flexible resource allocation phenomenon. For reliable and guaranteed services there must be a scheduling mechanism that all resources are efficiently allocated to satisfy the customer's request. Cloud services are based on scalability, availability, security and fault tolerance features. Service provisioning in cloud is based on SLA. Service level agreement is the terms of cloud provider's contracts with customers to define the level(s) of service being sold in plain language terms. QoS (quality of service) plays important role in cloud environment. Resource scheduling and service deployment is done by considering multiple SLA parameters like CPU requirement, network bandwidth, memory and storage. In this paper we propose an algorithm which perform resource preemption from low priority task to high priority task and advanced reservation for resources considering multiple SLA parameters for deploying service. This algorithm is also effective for fault tolerance mechanism.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detection of non-proliferative diabetic retinopathy lesions using wavelet and classification using K-means clustering 小波检测非增生性糖尿病视网膜病变及k均值聚类分类
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.73
Yogesh M. Rajput, R. Manza, Manjiri B. Patwari, Deepali D. Rathod, Prashant L. Borde, P. Yannawar
WHO predicts that in year 2012 there are about 347 million people worldwide have diabetes, more than 80% of diabetes deaths occur in different countries. WHO projects that diabetes will be the 7th major cause leading death in 2030. Diabetic Retinopathy caused by leakage of blood or fluid from the retinal blood vessels and it will damage the retina. Non-proliferative diabetic retinopathy (NPDR) is an early stage of diabetic retinopathy and it is categorized into three stages they are mild, moderate and sever NPDR. The characteristic of the Mild; is specified by the presence of minimum microaneurysm, Moderate; specifies the presence of hemorrhages, microaneurysms, and hard exudates where as Severe; determine on the blockage of vessels, depriving several areas of the retina. With their blood supply. These areas of the retina send signals to the body to grow new blood vessels for nourishment. The proposed algorithm tested on online databases like STARE, DRIVE, DiarectDB0, DiarectDB1 and SASWADE (the database collected during the research work). The statistical techniques were applied on NPDR lesion and calculate the mean, variance, standard deviation, & correlation for classification. K-means clustering have been applied on the dataset with extracted features 95% of correct classification have been achieved.
世卫组织预测,2012年全世界约有3.47亿人患有糖尿病,80%以上的糖尿病死亡发生在不同的国家。世卫组织预测,到2030年,糖尿病将成为导致死亡的第七大原因。糖尿病视网膜病变是由于血液或液体从视网膜血管渗漏而引起的,它会损害视网膜。非增殖性糖尿病视网膜病变(non - prolifative diabetic retinopathy, NPDR)是糖尿病视网膜病变的早期阶段,分为轻度、中度和重度三个阶段。温和的特点;最小微动脉瘤为中度;严重时为出血、微动脉瘤和硬渗出物;确定血管阻塞,剥夺视网膜的几个区域。他们的血液供应。视网膜的这些区域向身体发出信号,生长新的血管以获取营养。本文算法在STARE、DRIVE、DiarectDB0、DiarectDB1、SASWADE等在线数据库(研究工作中收集的数据库)上进行了测试。应用统计学方法对NPDR病变进行分类,计算平均值、方差、标准差和相关性。对提取的特征数据集进行K-means聚类,分类正确率达到95%。
{"title":"Detection of non-proliferative diabetic retinopathy lesions using wavelet and classification using K-means clustering","authors":"Yogesh M. Rajput, R. Manza, Manjiri B. Patwari, Deepali D. Rathod, Prashant L. Borde, P. Yannawar","doi":"10.1109/ICCN.2015.73","DOIUrl":"https://doi.org/10.1109/ICCN.2015.73","url":null,"abstract":"WHO predicts that in year 2012 there are about 347 million people worldwide have diabetes, more than 80% of diabetes deaths occur in different countries. WHO projects that diabetes will be the 7th major cause leading death in 2030. Diabetic Retinopathy caused by leakage of blood or fluid from the retinal blood vessels and it will damage the retina. Non-proliferative diabetic retinopathy (NPDR) is an early stage of diabetic retinopathy and it is categorized into three stages they are mild, moderate and sever NPDR. The characteristic of the Mild; is specified by the presence of minimum microaneurysm, Moderate; specifies the presence of hemorrhages, microaneurysms, and hard exudates where as Severe; determine on the blockage of vessels, depriving several areas of the retina. With their blood supply. These areas of the retina send signals to the body to grow new blood vessels for nourishment. The proposed algorithm tested on online databases like STARE, DRIVE, DiarectDB0, DiarectDB1 and SASWADE (the database collected during the research work). The statistical techniques were applied on NPDR lesion and calculate the mean, variance, standard deviation, & correlation for classification. K-means clustering have been applied on the dataset with extracted features 95% of correct classification have been achieved.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116879679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 International Conference on Communication Networks (ICCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1