Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409127
Dr Nikhil Kumar Marriwala, S. Kapoor
Software Defined Radio is an all new technology being developed in the 21st century. The major practical problem in digital communication systems is channel distortion which causes errors due to Intersymbol Interference (ISI). Channel equalisers are used in digital communication receivers to mitigate the effects of inter symbol interference (ISI) and inter user interference in the form of co-channel interference (CCI) and adjacent channel interference (ACI) in the presence of additive white Gaussian noise (AWGN). An equaliser uses a large part of the computations involved in the receiver. Equalizers are designed to reduce the ISI as much as possible and to minimize the effect of the additive noise for better demodulation. This paper presents a software defined radio module with fuzzy adaptive equalizer. The main focus will be on reconfigurable software defined radio (SDR) because the reconfiguration of mappings is very difficult to be achieved in hardware Here Fuzzy Equalizers are designed in which step size is controlled through Fuzzy Rules. Results are shown for input & output SNR at different iterations which concludes that the coefficients of Fuzzy Adaptive Equalizer are updated, correspondingly output SNR has been increased. The output and input Signal to Noise Ratio is then calculated for different Iterations.
{"title":"Performance of Fuzzy Equalizers in software defined radio","authors":"Dr Nikhil Kumar Marriwala, S. Kapoor","doi":"10.1109/WICT.2012.6409127","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409127","url":null,"abstract":"Software Defined Radio is an all new technology being developed in the 21st century. The major practical problem in digital communication systems is channel distortion which causes errors due to Intersymbol Interference (ISI). Channel equalisers are used in digital communication receivers to mitigate the effects of inter symbol interference (ISI) and inter user interference in the form of co-channel interference (CCI) and adjacent channel interference (ACI) in the presence of additive white Gaussian noise (AWGN). An equaliser uses a large part of the computations involved in the receiver. Equalizers are designed to reduce the ISI as much as possible and to minimize the effect of the additive noise for better demodulation. This paper presents a software defined radio module with fuzzy adaptive equalizer. The main focus will be on reconfigurable software defined radio (SDR) because the reconfiguration of mappings is very difficult to be achieved in hardware Here Fuzzy Equalizers are designed in which step size is controlled through Fuzzy Rules. Results are shown for input & output SNR at different iterations which concludes that the coefficients of Fuzzy Adaptive Equalizer are updated, correspondingly output SNR has been increased. The output and input Signal to Noise Ratio is then calculated for different Iterations.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133676819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409196
S. Singh, S. Tayal, G. Sachdeva
Particle Swarm Optimization (PSO) and Biogeography Based Optimization (BBO) are most popular swarm based optimization algorithms those have shown impressive performance over other Evolutionary Algorithms (EAs). Yagi-Uda is one of most widely antenna designs used at High Frequency (HF) and Ultra High Frequency (UHF) due its high gain, low cost and constructional ease. Designing a Yagi-Uda antenna involves determination of wire-element lengths and their spacings in between them those bear highly complex and non-linear relationships with antenna gain, impedance and Single Lobe Level (SLL) at a particular frequency of operation. In this paper, a comparative study between PSO and BBO is presented for faster optimization of antenna designs for maximum gain. The best antenna designs are tabulated and average of 10 monte-carlo simulations are plotted for BBO, PSO and their combinational iterative performances in the ending sections.
{"title":"Evolutionary performance of BBO and PSO algorithms for Yagi-Uda antenna design optimization","authors":"S. Singh, S. Tayal, G. Sachdeva","doi":"10.1109/WICT.2012.6409196","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409196","url":null,"abstract":"Particle Swarm Optimization (PSO) and Biogeography Based Optimization (BBO) are most popular swarm based optimization algorithms those have shown impressive performance over other Evolutionary Algorithms (EAs). Yagi-Uda is one of most widely antenna designs used at High Frequency (HF) and Ultra High Frequency (UHF) due its high gain, low cost and constructional ease. Designing a Yagi-Uda antenna involves determination of wire-element lengths and their spacings in between them those bear highly complex and non-linear relationships with antenna gain, impedance and Single Lobe Level (SLL) at a particular frequency of operation. In this paper, a comparative study between PSO and BBO is presented for faster optimization of antenna designs for maximum gain. The best antenna designs are tabulated and average of 10 monte-carlo simulations are plotted for BBO, PSO and their combinational iterative performances in the ending sections.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132162012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409080
N. Dey, S. Biswas, P. Das, A. Das, S. S. Chaudhuri
The last decade has witnessed an ample amount of research work in tele-monitoring that involves transmission of biomedicai signals through wireless media. Exchange of bio-signals amongst various hospitals and diagnostic centres requires high level of security and reliability while transmitting through internet. Watermarking is added "ownership" information in multimedia content to prove authenticity, verify signal integrity, and achieve control over the copy process. The Photoplethysmography (PPG) is a very sensitive and significant diagnostic tool in the medical world to analyse the functions of the human heart. This analysis is done in a simple manner than the most common way of using electrocardiography to detect various cardio-vascular diseases by measuring the electrical activity of the heart. The variance in its characteristics also provides important information about cardiac diseases incorporated with the same cause and raises alarm about heart malfunctioning. The present work proposes a Lifting Wavelet Transformation based method of binary watermark embedding within the Photoplethysmographic (PPG) signal as well as the process of extracting watermark from the PPG signal. In this approach, the generated watermarked signal having an acceptable level of imperceptibility and distortion is compared to the original PPG signal. Finally, a comparative study of Pulse Transit Time (PTT), pulse transit time to the foot of the pulse (PTTf) and Pulse amplitude (AMP) between the recovered PPG signal and different levels of wavelet based de-noised recovered PPG signal is done. Telecardiology is achieved by successful transmission of the watermarked PPG signal with reversibility of watermark to avoid discrepancies in data to deliver precise treatment.
{"title":"Lifting Wavelet Transformation based blind watermarking technique of Photoplethysmographic signals in wireless telecardiology","authors":"N. Dey, S. Biswas, P. Das, A. Das, S. S. Chaudhuri","doi":"10.1109/WICT.2012.6409080","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409080","url":null,"abstract":"The last decade has witnessed an ample amount of research work in tele-monitoring that involves transmission of biomedicai signals through wireless media. Exchange of bio-signals amongst various hospitals and diagnostic centres requires high level of security and reliability while transmitting through internet. Watermarking is added \"ownership\" information in multimedia content to prove authenticity, verify signal integrity, and achieve control over the copy process. The Photoplethysmography (PPG) is a very sensitive and significant diagnostic tool in the medical world to analyse the functions of the human heart. This analysis is done in a simple manner than the most common way of using electrocardiography to detect various cardio-vascular diseases by measuring the electrical activity of the heart. The variance in its characteristics also provides important information about cardiac diseases incorporated with the same cause and raises alarm about heart malfunctioning. The present work proposes a Lifting Wavelet Transformation based method of binary watermark embedding within the Photoplethysmographic (PPG) signal as well as the process of extracting watermark from the PPG signal. In this approach, the generated watermarked signal having an acceptable level of imperceptibility and distortion is compared to the original PPG signal. Finally, a comparative study of Pulse Transit Time (PTT), pulse transit time to the foot of the pulse (PTTf) and Pulse amplitude (AMP) between the recovered PPG signal and different levels of wavelet based de-noised recovered PPG signal is done. Telecardiology is achieved by successful transmission of the watermarked PPG signal with reversibility of watermark to avoid discrepancies in data to deliver precise treatment.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409197
S. Singh, C. Goel, G. Sachdeva
Mobile Ad-hoc network is a decentralized, self-organizing network. At present trend the MANET become one of the most important wireless communication mechanisms among all other. Unlike traditional network, MANET does not have any fixed infrastructure. Every single node in the network work as both a receiver as well as transmitter and node can communicate without any access point However, due to the mobile infrastructure MANET suffer from the variety of attacks. These attacks occur due to the misbehaviour/selfish nodes which can degrade the network performance. To develop a strong security scheme, the secure route selection is analyzed under varying degree of misbehavior nodes. Eventually AODV(Ad-Hoc on Demand Distance Vector), GRP(Gathering based routing protocol) and OLSR(Optimized Link State Routing) protocol meets the above scheme at different WLAN(Wireless Local Area Network) parameter physical characteristics 802.11a Orthogonal Frequency Division Multiplexing(OFDM) and 802.11g (extended rate PHY) over a range of scenario we analyzed or tested the performance.
移动自组织网络是一种分散的、自组织的网络。在目前的发展趋势中,无线局域网已成为最重要的无线通信机制之一。与传统网络不同,MANET没有任何固定的基础设施。网络中的每个节点既可以作为接收端,也可以作为发送端,在没有接入点的情况下也可以进行通信。然而,由于移动基础设施的存在,MANET受到各种攻击。这些攻击是由于错误行为/自私节点导致的,这会降低网络性能。为了开发一种强安全方案,分析了不同程度错误行为节点下的安全路由选择。最终AODV(Ad-Hoc on Demand Distance Vector)、GRP(Gathering based routing protocol)和OLSR(Optimized Link State routing)协议满足上述方案在不同WLAN(无线局域网)参数物理特性下的802.11a正交频分复用(OFDM)和802.11g(扩展速率PHY)的一系列场景下进行了性能分析或测试。
{"title":"Performance analysis of routing protocols under varying degree of misbehaviour in MANET","authors":"S. Singh, C. Goel, G. Sachdeva","doi":"10.1109/WICT.2012.6409197","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409197","url":null,"abstract":"Mobile Ad-hoc network is a decentralized, self-organizing network. At present trend the MANET become one of the most important wireless communication mechanisms among all other. Unlike traditional network, MANET does not have any fixed infrastructure. Every single node in the network work as both a receiver as well as transmitter and node can communicate without any access point However, due to the mobile infrastructure MANET suffer from the variety of attacks. These attacks occur due to the misbehaviour/selfish nodes which can degrade the network performance. To develop a strong security scheme, the secure route selection is analyzed under varying degree of misbehavior nodes. Eventually AODV(Ad-Hoc on Demand Distance Vector), GRP(Gathering based routing protocol) and OLSR(Optimized Link State Routing) protocol meets the above scheme at different WLAN(Wireless Local Area Network) parameter physical characteristics 802.11a Orthogonal Frequency Division Multiplexing(OFDM) and 802.11g (extended rate PHY) over a range of scenario we analyzed or tested the performance.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409091
M. Gurve, J. Sarup
With the development of remote sensing imaging technology, the satellite information includes more abundant data, and the quality of satellite cloud image had achieved great progress. The satellite cloud images contain the valuable information for weather forecasting and early prediction of different atmospheric disturbances such as typhoons, hurricanes etc. The processing of content-based satellite cloud image has become one of the most important tasks for using the satellite cloud image information for continuous research. Content-based satellite cloud image processing and information retrieval is a very important problem in image processing and analysis field. In this research, a Content-Based Image Retrieval (CBIR) system has been developed using color, texture and shape as retrieval features from the satellite image repository. To extract the grey level/color properties of an image, histogram values have been used. Four functions of texture features have used such as (Entropy, Energy, correlation and contrast) and the shape features (area, perimeter and metric) have been extracted using the morphological operations. The images and the extracted feature vectors were stored in the database. Results obtained from the processing demonstrate the usability of proposed system.
{"title":"Satellite cloud image processing and information retrieval system","authors":"M. Gurve, J. Sarup","doi":"10.1109/WICT.2012.6409091","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409091","url":null,"abstract":"With the development of remote sensing imaging technology, the satellite information includes more abundant data, and the quality of satellite cloud image had achieved great progress. The satellite cloud images contain the valuable information for weather forecasting and early prediction of different atmospheric disturbances such as typhoons, hurricanes etc. The processing of content-based satellite cloud image has become one of the most important tasks for using the satellite cloud image information for continuous research. Content-based satellite cloud image processing and information retrieval is a very important problem in image processing and analysis field. In this research, a Content-Based Image Retrieval (CBIR) system has been developed using color, texture and shape as retrieval features from the satellite image repository. To extract the grey level/color properties of an image, histogram values have been used. Four functions of texture features have used such as (Entropy, Energy, correlation and contrast) and the shape features (area, perimeter and metric) have been extracted using the morphological operations. The images and the extracted feature vectors were stored in the database. Results obtained from the processing demonstrate the usability of proposed system.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409179
S. K. Sana, Joydeep Rakshit, R. Kar, D. Mandai, S. Ghoshal
In this paper a global heuristic search evolutionary optimization technique called craziness based particle swarm optimization (CRPSO) is used for the design of 8th order infinite impulse response (IIR) band stop (BS) digital filter. The proposed CRPSO based approach has closely mimicked the particle's behaviour in a swarm which results in better exploration and exploitation in multidimensional search space. Performance of the proposed optimization technique is compared with some well accepted evolutionary algorithms such as PSO and real coded genetic algorithm (RGA). From the simulation study it is demonstrated that the proposed optimization technique CRPSO surmounts RGA and PSO, in terms of better quality output response, faster convergence speed and stability.
{"title":"Optimal digital stable IIR band stop filter optimization using craziness based particle swarm optimization technique","authors":"S. K. Sana, Joydeep Rakshit, R. Kar, D. Mandai, S. Ghoshal","doi":"10.1109/WICT.2012.6409179","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409179","url":null,"abstract":"In this paper a global heuristic search evolutionary optimization technique called craziness based particle swarm optimization (CRPSO) is used for the design of 8th order infinite impulse response (IIR) band stop (BS) digital filter. The proposed CRPSO based approach has closely mimicked the particle's behaviour in a swarm which results in better exploration and exploitation in multidimensional search space. Performance of the proposed optimization technique is compared with some well accepted evolutionary algorithms such as PSO and real coded genetic algorithm (RGA). From the simulation study it is demonstrated that the proposed optimization technique CRPSO surmounts RGA and PSO, in terms of better quality output response, faster convergence speed and stability.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409137
S. S. Rout, B. Misra, S. Samanta
Mapping the competency of personnel with different level of expertise, skill set, and experience in professional fields is a tough, complex but essential task. In this work, we have considered an Engineering College with moderate number of faculties with different level of experience, expertise and research exposure. Here we have considered the load assignment to the faculties at the beginning of a semester as the competency mapping task. Each faculty having capabilities of teaching different subjects out of the total set of papers needs to take about two theory papers with or without laboratory component. The decisive factors for subject assignment may be depth of knowledge, sincerity, class management, contribution towards research, text book publication. Further preference of the faculty member should be considered with top priority unless there are some valid constraints. Again the teaching personnel in a department hold different designations and different administrative responsibility, therefore each of them cannot be assigned equal hours of teaching load. The decisive factors are considered as objectives to be optimized and multi-objective particle Swarm optimization (MOPSO) is employed to perform the competency mapping task. The simulation results show the effectiveness of this approach.
{"title":"Competency mapping in academic environment: A multi objective approach","authors":"S. S. Rout, B. Misra, S. Samanta","doi":"10.1109/WICT.2012.6409137","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409137","url":null,"abstract":"Mapping the competency of personnel with different level of expertise, skill set, and experience in professional fields is a tough, complex but essential task. In this work, we have considered an Engineering College with moderate number of faculties with different level of experience, expertise and research exposure. Here we have considered the load assignment to the faculties at the beginning of a semester as the competency mapping task. Each faculty having capabilities of teaching different subjects out of the total set of papers needs to take about two theory papers with or without laboratory component. The decisive factors for subject assignment may be depth of knowledge, sincerity, class management, contribution towards research, text book publication. Further preference of the faculty member should be considered with top priority unless there are some valid constraints. Again the teaching personnel in a department hold different designations and different administrative responsibility, therefore each of them cannot be assigned equal hours of teaching load. The decisive factors are considered as objectives to be optimized and multi-objective particle Swarm optimization (MOPSO) is employed to perform the competency mapping task. The simulation results show the effectiveness of this approach.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114195001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409164
R. Pérez-Torres, C. Torres-Huitzil
Nowadays mobile devices, represented mainly by smartphones, are used by million of people around the world. These smartphones include a large set of hardware capabilities and sensors which allow to improve the user interaction and content delivery. The sensors allow to gather extra information about the user situation and therefore to create location & context aware mobile apps. However, sensors usage involves energy consumption, which is also one of the smartphone's biggest limitations; in addition, these devices also have storage and memory constraints, and slow processors compared to a conventional computer. Recently, there is an emerging tendency consisting in lessen these limitations by implementing the complex computations and data storage in external entities such as cloud computing. This article presents the fundamentals for developing an energy-aware middleware for the support of context & location aware mobile apps with cloud computing interaction. This middleware can increase up to three times the smartphone battery performance when using the GPS receiver, and in the cloud can perform the extraction of places of interest from a list of GPS fixes uploaded by the smartphone.
{"title":"A power-aware middleware for location & context aware mobile apps with cloud computing interaction","authors":"R. Pérez-Torres, C. Torres-Huitzil","doi":"10.1109/WICT.2012.6409164","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409164","url":null,"abstract":"Nowadays mobile devices, represented mainly by smartphones, are used by million of people around the world. These smartphones include a large set of hardware capabilities and sensors which allow to improve the user interaction and content delivery. The sensors allow to gather extra information about the user situation and therefore to create location & context aware mobile apps. However, sensors usage involves energy consumption, which is also one of the smartphone's biggest limitations; in addition, these devices also have storage and memory constraints, and slow processors compared to a conventional computer. Recently, there is an emerging tendency consisting in lessen these limitations by implementing the complex computations and data storage in external entities such as cloud computing. This article presents the fundamentals for developing an energy-aware middleware for the support of context & location aware mobile apps with cloud computing interaction. This middleware can increase up to three times the smartphone battery performance when using the GPS receiver, and in the cloud can perform the extraction of places of interest from a list of GPS fixes uploaded by the smartphone.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409253
Xue Dasheng, Hao Shenglan
Common cost estimation methods focus on subjective experience, but fuzzy Neural Network Technology makes relatively accurate estimates because it collects the respective advantages of the fuzzy theory and neural networks. This research constructs a model of neural networks and fuzzy neural network model comparing with mature COCOMO II model, and concludes that fuzzy neural network in software cost estimation is superior to neural network model. It is a good estimation model. The experimental calculation shows that the software cost estimation model constructed by fuzzy neural networks combines multiple advantages. It can be used for real estate information management system quickly and efficiently, and provides a basis for the development and maintenance of similar projects in the future.
{"title":"Estimation of project costs based on fuzzy neural network","authors":"Xue Dasheng, Hao Shenglan","doi":"10.1109/WICT.2012.6409253","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409253","url":null,"abstract":"Common cost estimation methods focus on subjective experience, but fuzzy Neural Network Technology makes relatively accurate estimates because it collects the respective advantages of the fuzzy theory and neural networks. This research constructs a model of neural networks and fuzzy neural network model comparing with mature COCOMO II model, and concludes that fuzzy neural network in software cost estimation is superior to neural network model. It is a good estimation model. The experimental calculation shows that the software cost estimation model constructed by fuzzy neural networks combines multiple advantages. It can be used for real estate information management system quickly and efficiently, and provides a basis for the development and maintenance of similar projects in the future.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409144
R. Nallusamy, V. Varadharajan, S. K. Vuppala
Wireless Sensor Network (WSN) based systems are becoming mainstream and are getting deployed in critical business environments. Thus, any failure of such a system due to potential security attacks would have serious business implications for an enterprise. So far the community has looked into the security of WSN in isolation and to our knowledge there is no study looking into end-to-end security issues of a WSN based business solution, such as, datacenter monitoring. This paper provides an insight into the security issues in the deployment of WSN based solutions and briefly outlines the possible security measures that can be applied.
{"title":"Securing Wireless Sensor Network based solutions","authors":"R. Nallusamy, V. Varadharajan, S. K. Vuppala","doi":"10.1109/WICT.2012.6409144","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409144","url":null,"abstract":"Wireless Sensor Network (WSN) based systems are becoming mainstream and are getting deployed in critical business environments. Thus, any failure of such a system due to potential security attacks would have serious business implications for an enterprise. So far the community has looked into the security of WSN in isolation and to our knowledge there is no study looking into end-to-end security issues of a WSN based business solution, such as, datacenter monitoring. This paper provides an insight into the security issues in the deployment of WSN based solutions and briefly outlines the possible security measures that can be applied.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134635885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}