首页 > 最新文献

2017 2nd International Conference on Computing and Communications Technologies (ICCCT)最新文献

英文 中文
A computational model for monitoring the hexose monophosphate (HMP) shunt pathway 一种监测单磷酸己糖(HMP)分流途径的计算模型
F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar
A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency, which can lead to varying degrees of hemolysis. The manifestation of this study is the building of a machine that is used for the improvement of NADPH and ribose sugars. More over, it is necessary to know the mechanism that occurs during such operation. The computational complexity in such an attempt is applied to HMP shunt pathway. As this pathway is active in rapidly dividing cells and in tissues where there is more requirement of NADPH, it is shown that nondeterministic finite automata accept HMP shunt pathway.
本文介绍了一种用不确定有限自动机实现单磷酸己糖分流通路过程计算装置的新方法。它的目的是观察己糖单磷酸分流途径代谢沿着接受和排斥的情况下。红细胞在非确定性有限自动机中的排斥状态是葡萄糖-6-磷酸脱氢酶缺乏,这可能导致不同程度的溶血。这项研究的表现是建立了一个用于改善NADPH和核糖糖的机器。此外,有必要了解在这种操作过程中发生的机制。将这种方法的计算复杂度应用于HMP分流路径。由于该途径在快速分裂细胞和对NADPH需求较多的组织中活跃,研究表明不确定性有限自动机接受HMP分流途径。
{"title":"A computational model for monitoring the hexose monophosphate (HMP) shunt pathway","authors":"F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar","doi":"10.1109/ICCCT2.2017.7972270","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972270","url":null,"abstract":"A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency, which can lead to varying degrees of hemolysis. The manifestation of this study is the building of a machine that is used for the improvement of NADPH and ribose sugars. More over, it is necessary to know the mechanism that occurs during such operation. The computational complexity in such an attempt is applied to HMP shunt pathway. As this pathway is active in rapidly dividing cells and in tissues where there is more requirement of NADPH, it is shown that nondeterministic finite automata accept HMP shunt pathway.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tool development for formalizing the requirement for the safety critical software engineering process 用于形式化安全关键软件工程过程需求的工具开发
V. Madhan, V. Kalaiselvi, Donald J.P
This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness of the requirements using the FASTEST tool for the derived z specifications.
本文描述了一种用于形式化软件需求的工具证据。这种形式化是基于z语言的。该工具将非正式的z语言转换为正式的z语言。为此,非正式的需求写在定义良好的模板中。该工具关注需求并自动将其转换为z规范。生成测试用例是为了使用用于衍生z规格说明的FASTEST工具来表达需求的正确性和完整性。
{"title":"Tool development for formalizing the requirement for the safety critical software engineering process","authors":"V. Madhan, V. Kalaiselvi, Donald J.P","doi":"10.1109/ICCCT2.2017.7972273","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972273","url":null,"abstract":"This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness of the requirements using the FASTEST tool for the derived z specifications.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Frequency reconfigurable bandpass filter for IMT-A applications 频率可重构带通滤波器的IMT-A应用
Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra
A spiral resonator reconfigurable microstrip band pass filter is presented in this manuscript. The filter provides control variation in resonance frequency (ƒc). The variation in center frequency of the proposed design is noted from 3.40 – 3.77 GHz. The filter is designed to work at LTE-42 band to support IMT-A applications. The size of the proposed spiral structure is 14.6 × 5.5 mm2.
本文提出了一种螺旋谐振腔可重构微带带通滤波器。滤波器提供了控制变化的谐振频率(ƒc)。所提设计的中心频率在3.40 - 3.77 GHz范围内发生变化。该滤波器设计用于LTE-42频段,以支持IMT-A应用。拟议的螺旋结构的尺寸为14.6 × 5.5 mm2。
{"title":"Frequency reconfigurable bandpass filter for IMT-A applications","authors":"Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra","doi":"10.1109/ICCCT2.2017.7972242","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972242","url":null,"abstract":"A spiral resonator reconfigurable microstrip band pass filter is presented in this manuscript. The filter provides control variation in resonance frequency (ƒc). The variation in center frequency of the proposed design is noted from 3.40 – 3.77 GHz. The filter is designed to work at LTE-42 band to support IMT-A applications. The size of the proposed spiral structure is 14.6 × 5.5 mm2.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web page design optimisation based on segment analytics 基于分段分析的网页设计优化
S. Gomathi, V. R., S. R, S. Dheeksha
In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage.
在网络分析中,对信息的传递和网络的使用进行优化,对数据进行分析。分析是对网页数据的测量、收集和分析。页面统计和用户指标是大多数web分析工具中的重要因素。这是现有工具的局限性。它不提供优化信息的设计输入。本文旨在为网页分析的范围提供扩展,以提供网页的每个部分的分析和统计。
{"title":"Web page design optimisation based on segment analytics","authors":"S. Gomathi, V. R., S. R, S. Dheeksha","doi":"10.1109/ICCCT2.2017.7972310","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972310","url":null,"abstract":"In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage enhancement using fuzzy logic in a distributed Wireless sensor network 基于模糊逻辑的分布式无线传感器网络覆盖增强
K. Joshitha, S. Jayashri
The work deals with the healing of the coverage hole identified in a location unaware network using fuzzy logic. The hole identification is done based on the Delaunay Triangulation method and the Empty circle concept. The main contribution here is that the healing of the coverage hole is done on a location unaware network based on the energy, angle and distance of the nodes involved in the healing process using the fuzzy rule set. Only the partial location information like the distance between the nodes is used. Redundant nodes are identified using the depth of angle formed between any two nodes. The boundary nodes of the hole along with their one hop neighbors take part in the healing process. This fastens the healing process with reduced energy consumption.
利用模糊逻辑对位置不感知网络中识别出的覆盖洞进行修复。基于Delaunay三角剖分法和空圆概念进行孔识别。这里的主要贡献是,覆盖洞的修复是在一个不知道位置的网络上完成的,该网络基于愈合过程中涉及的节点的能量、角度和距离,使用模糊规则集。只使用部分位置信息,如节点之间的距离。使用任意两个节点之间形成的角度深度来识别冗余节点。洞的边界节点和它们的单跳邻居一起参与了愈合过程。这加快了愈合过程,减少了能量消耗。
{"title":"Coverage enhancement using fuzzy logic in a distributed Wireless sensor network","authors":"K. Joshitha, S. Jayashri","doi":"10.1109/ICCCT2.2017.7972290","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972290","url":null,"abstract":"The work deals with the healing of the coverage hole identified in a location unaware network using fuzzy logic. The hole identification is done based on the Delaunay Triangulation method and the Empty circle concept. The main contribution here is that the healing of the coverage hole is done on a location unaware network based on the energy, angle and distance of the nodes involved in the healing process using the fuzzy rule set. Only the partial location information like the distance between the nodes is used. Redundant nodes are identified using the depth of angle formed between any two nodes. The boundary nodes of the hole along with their one hop neighbors take part in the healing process. This fastens the healing process with reduced energy consumption.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption 基于模糊逻辑的无线传感器网络不平等聚类算法
K. Sundaran, V. Ganapathy, Priyanka Sudhakara
Energy consumption and lifetime of WSN are the most important research challenges to be resolved. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. Farther sensor nodes data are aggregated by cluster heads and send to the base station. This leads to a heavy traffic and faster depletion of energy to the nodes that are nearer to the sink. To enhance the energy conservation, for suppressing hot spot problem and for load balance achievement, we propose an algorithm namely as ECUCF (Energy Conserved Unequal Clusters with Fuzzy logic). Based on the distances of the nodes from the base station, the network is divided into three different sectors. For designing unequal clusters in each sector, a fuzzy logic approach is followed. The cluster heads that are nearer to the base station are designed to be of smaller sizes whereas the cluster heads that are situated farther away from the sink to have higher cluster sizes. The proposed algorithm ECUCF is simulated using MATLAB environment. The performances obtained are compared with the performances of other clustering schemes like LEACH (equal clustering algorithm) and FBUC (unequal clustering algorithm). From the simulated results, it is found that the performances of ECUCF are much improved as compared to LEACH and FBUC in maximizing the number of clusters, increasing the number of live nodes in the network and extending the lifetime of nodes on each round of operation.
无线传感器网络的能量消耗和寿命是需要解决的最重要的研究难题。为了在网络中实现负载均衡和高效的数据收集,使用了集群。每个簇中的传感器将数据发送到相应的簇头。集群头执行数据聚合并将聚合的数据传输到基站。更远的传感器节点数据由簇头聚合并发送到基站。这将导致繁忙的交通和更快的能量消耗到更靠近接收器的节点。为了提高能量节约,抑制热点问题,实现负载均衡,我们提出了一种基于模糊逻辑的能量守恒不等簇(ECUCF)算法。根据节点到基站的距离,网络被分为三个不同的扇区。采用模糊逻辑方法设计各扇区的不等聚类。离基站较近的簇头被设计成较小的尺寸,而离接收器较远的簇头则具有较大的簇大小。在MATLAB环境下对该算法进行了仿真。将所得的性能与LEACH(等聚类算法)和FBUC(不等聚类算法)等其他聚类方案的性能进行了比较。仿真结果表明,与LEACH和FBUC相比,ECUCF在最大化集群数量、增加网络中活动节点数量和延长每轮操作节点的生命周期方面的性能有很大提高。
{"title":"Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption","authors":"K. Sundaran, V. Ganapathy, Priyanka Sudhakara","doi":"10.1109/ICCCT2.2017.7972283","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972283","url":null,"abstract":"Energy consumption and lifetime of WSN are the most important research challenges to be resolved. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. Farther sensor nodes data are aggregated by cluster heads and send to the base station. This leads to a heavy traffic and faster depletion of energy to the nodes that are nearer to the sink. To enhance the energy conservation, for suppressing hot spot problem and for load balance achievement, we propose an algorithm namely as ECUCF (Energy Conserved Unequal Clusters with Fuzzy logic). Based on the distances of the nodes from the base station, the network is divided into three different sectors. For designing unequal clusters in each sector, a fuzzy logic approach is followed. The cluster heads that are nearer to the base station are designed to be of smaller sizes whereas the cluster heads that are situated farther away from the sink to have higher cluster sizes. The proposed algorithm ECUCF is simulated using MATLAB environment. The performances obtained are compared with the performances of other clustering schemes like LEACH (equal clustering algorithm) and FBUC (unequal clustering algorithm). From the simulated results, it is found that the performances of ECUCF are much improved as compared to LEACH and FBUC in maximizing the number of clusters, increasing the number of live nodes in the network and extending the lifetime of nodes on each round of operation.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An integrated game theoretical approach to detect misbehaving nodes in MANETs 一种集成博弈论方法检测manet中的不良行为节点
C. Vijayakumaran, T. A. Macriga
Mobile Ad-hoc Networks are dynamic in nature and do not have fixed infrastructure to control nodes in the networks. The challenge lies ahead in coordinating among such dynamically moving nodes. Over a due course, nodes might become selfish and may refrain from packet forwarding because of the heavy dynamism. This selfish behavior might also result as an impact of malicious nodes in the neighborhood. Therefore, trust and reputation based mechanisms are required to keep the mobile neighbors intact. Assigning or altering the trust highly depends on the node behavior. Game theoretical approaches are more suitable in deciding upon the reward mechanisms for which the mobile nodes operate upon. Rewards or penalties have to be decided by ensuring a clean and healthy MANET environment. Not every time the same reward schemes are to be followed since this might result in malicious nodes attacking the rewarding scheme as well. Therefore, a non-routine yet surprise alterations are well required in place in deciding suitable and safe reward strategies. This work focuses on integrating a misbehavior node detection scheme and an incentive based reputation scheme with game theoretical approach called Supervisory Game to analyze the selfish behavior of nodes in the MANETs environment. The proposed work significantly reduces the cost of detecting misbehavior nodes in the network.
移动自组织网络本质上是动态的,没有固定的基础设施来控制网络中的节点。挑战在于如何在这些动态移动的节点之间进行协调。在适当的时候,节点可能会变得自私,并且可能会因为高度动态而避免转发数据包。这种自私的行为也可能导致邻居中恶意节点的影响。因此,需要基于信任和声誉的机制来保持移动邻居的完整性。分配或更改信任高度依赖于节点的行为。博弈论方法更适合于决定移动节点所依据的奖励机制。奖励或处罚必须通过确保清洁和健康的MANET环境来决定。并非每次都遵循相同的奖励方案,因为这可能导致恶意节点也攻击奖励方案。因此,在决定合适和安全的奖励策略时,非常规但出人意料的改变是非常必要的。本研究将一种不当行为节点检测方案和一种基于激励的声誉方案与博弈论方法(监督博弈)相结合,分析了MANETs环境下节点的自私行为。所提出的工作显著降低了网络中检测错误行为节点的成本。
{"title":"An integrated game theoretical approach to detect misbehaving nodes in MANETs","authors":"C. Vijayakumaran, T. A. Macriga","doi":"10.1109/ICCCT2.2017.7972268","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972268","url":null,"abstract":"Mobile Ad-hoc Networks are dynamic in nature and do not have fixed infrastructure to control nodes in the networks. The challenge lies ahead in coordinating among such dynamically moving nodes. Over a due course, nodes might become selfish and may refrain from packet forwarding because of the heavy dynamism. This selfish behavior might also result as an impact of malicious nodes in the neighborhood. Therefore, trust and reputation based mechanisms are required to keep the mobile neighbors intact. Assigning or altering the trust highly depends on the node behavior. Game theoretical approaches are more suitable in deciding upon the reward mechanisms for which the mobile nodes operate upon. Rewards or penalties have to be decided by ensuring a clean and healthy MANET environment. Not every time the same reward schemes are to be followed since this might result in malicious nodes attacking the rewarding scheme as well. Therefore, a non-routine yet surprise alterations are well required in place in deciding suitable and safe reward strategies. This work focuses on integrating a misbehavior node detection scheme and an incentive based reputation scheme with game theoretical approach called Supervisory Game to analyze the selfish behavior of nodes in the MANETs environment. The proposed work significantly reduces the cost of detecting misbehavior nodes in the network.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Antenna sensor for deterioration assesment in mechanical contraption 用于机械装置退化评估的天线传感器
G. Indumathi, G.Praveen Koodalingam
In this paper the design of an antenna sensor for deterioration in mechanical contraption at high frequency to attain more sensitivity and high gain is proposed. The design & simulation of a wireless antenna sensor for deterioration assessment in mechanical contraption is presented. Here the length of a patch antenna governs the antenna's resonance frequency and a patch antenna bonded to a structural surface can be used to measure mechanical deterioration propagation by interrogating resonance frequency shift due to antenna length change. In comparison with existing approaches such as radio frequency identification, the frequency doubling scheme is proposed as a new signal modulation approach for the antenna sensor. A circular patch receiving and transmitting antenna sensor is designed using Advanced Design System (ADS) software. And both the patch antennas are coupled using a matching network to form a frequency doubling antenna sensor. A split ring resonator is designed and simulated using Advanced Design System (ADS). The theoretical analysis of resonant frequency with and without stress is also represented in detail, to know about the performance of the resonator.
本文提出了一种用于机械装置高频退化的天线传感器的设计,以获得更高的灵敏度和高增益。介绍了一种用于机械装置退化评估的无线天线传感器的设计与仿真。在这里,贴片天线的长度决定了天线的谐振频率,贴片天线连接到结构表面,可以通过询问由于天线长度变化引起的谐振频移来测量机械劣化传播。通过与现有射频识别方法的比较,提出了一种新的天线传感器信号调制方法。利用先进设计系统(ADS)软件设计了一种圆形贴片收发天线传感器。两个贴片天线采用匹配网络进行耦合,形成倍频天线传感器。利用先进设计系统(ADS)设计并仿真了一种分环谐振器。并对有应力和无应力时的谐振频率进行了详细的理论分析,以了解谐振器的性能。
{"title":"Antenna sensor for deterioration assesment in mechanical contraption","authors":"G. Indumathi, G.Praveen Koodalingam","doi":"10.1109/ICCCT2.2017.7972285","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972285","url":null,"abstract":"In this paper the design of an antenna sensor for deterioration in mechanical contraption at high frequency to attain more sensitivity and high gain is proposed. The design & simulation of a wireless antenna sensor for deterioration assessment in mechanical contraption is presented. Here the length of a patch antenna governs the antenna's resonance frequency and a patch antenna bonded to a structural surface can be used to measure mechanical deterioration propagation by interrogating resonance frequency shift due to antenna length change. In comparison with existing approaches such as radio frequency identification, the frequency doubling scheme is proposed as a new signal modulation approach for the antenna sensor. A circular patch receiving and transmitting antenna sensor is designed using Advanced Design System (ADS) software. And both the patch antennas are coupled using a matching network to form a frequency doubling antenna sensor. A split ring resonator is designed and simulated using Advanced Design System (ADS). The theoretical analysis of resonant frequency with and without stress is also represented in detail, to know about the performance of the resonator.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on wireless networks attacks 关于无线网络攻击的调查
S. Surya, G. A. Magrica
Wireless network has gained popularity as the users want connectivity irrespective of their geographic position to perform their tasks. Wireless networks have many benefits over the wired networks in terms of mobility, flexibility and cost. Though there are several advantages of wireless networks, they are prone to security issues which generally fall under the following three categories they are confidentiality, integrity and availability. A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.
无线网络越来越受欢迎,因为用户需要连接,无论他们的地理位置如何,都可以执行任务。无线网络在移动性、灵活性和成本方面比有线网络有许多优点。虽然无线网络有几个优点,但它们容易出现安全问题,这些问题通常分为以下三类:保密性、完整性和可用性。对无线网络攻击的研究现状进行了综述,讨论了防范不同类型攻击的各种安全方法,并指出了今后需要重点研究的领域。
{"title":"A survey on wireless networks attacks","authors":"S. Surya, G. A. Magrica","doi":"10.1109/ICCCT2.2017.7972278","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972278","url":null,"abstract":"Wireless network has gained popularity as the users want connectivity irrespective of their geographic position to perform their tasks. Wireless networks have many benefits over the wired networks in terms of mobility, flexibility and cost. Though there are several advantages of wireless networks, they are prone to security issues which generally fall under the following three categories they are confidentiality, integrity and availability. A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart waste management using Internet-of-Things (IoT) 利用物联网(IoT)进行智能废物管理
G. Shyam, S. Manvi, P. Bharti
To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and technology providers have a role to play in working with governments to enable smart solutions. But, building such solutions on an open, standards-based communications platform that can be continuously used is a challenge. We present a waste collection management solution based on providing intelligence to wastebins, using an IoT prototype with sensors. It can read, collect, and transmit huge volume of data over the Internet. Such data, when put into a spatio-temporal context and processed by intelligent and optimized algorithms, can be used to dynamically manage waste collection mechanism. Simulations for several cases are carried out to investigate the benefits of such system over a traditional system. We try to replicate the scenario using Open Data from the city of Pune, India stressing on the opportunities created by this type of initiatives for several parties to innovate and contribute to the development of Smart waste management solutions.
为了使城市更环保、更安全、更高效,物联网(IoT)可以发挥重要作用。通过连接城市周围的设备、车辆和基础设施,可以提高安全和生活质量。在智慧城市中,通过让不同的利益相关者共同努力,可以实现最佳的技术解决方案[5][6][7]。系统集成商、网络运营商和技术提供商在与政府合作实现智能解决方案方面可以发挥作用。但是,在一个开放的、基于标准的、可以持续使用的通信平台上构建这样的解决方案是一个挑战。我们提出了一种基于为垃圾箱提供智能的废物收集管理解决方案,使用带有传感器的物联网原型。它可以通过互联网读取、收集和传输大量数据。将这些数据置于时空背景下,通过智能优化算法处理后,可以对垃圾收集机制进行动态管理。对几个案例进行了仿真,以研究这种系统相对于传统系统的优势。我们尝试使用来自印度浦那市的开放数据来复制这一场景,强调这类倡议为多方创新创造的机会,并为智能废物管理解决方案的发展做出贡献。
{"title":"Smart waste management using Internet-of-Things (IoT)","authors":"G. Shyam, S. Manvi, P. Bharti","doi":"10.1109/ICCCT2.2017.7972276","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972276","url":null,"abstract":"To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and technology providers have a role to play in working with governments to enable smart solutions. But, building such solutions on an open, standards-based communications platform that can be continuously used is a challenge. We present a waste collection management solution based on providing intelligence to wastebins, using an IoT prototype with sensors. It can read, collect, and transmit huge volume of data over the Internet. Such data, when put into a spatio-temporal context and processed by intelligent and optimized algorithms, can be used to dynamically manage waste collection mechanism. Simulations for several cases are carried out to investigate the benefits of such system over a traditional system. We try to replicate the scenario using Open Data from the city of Pune, India stressing on the opportunities created by this type of initiatives for several parties to innovate and contribute to the development of Smart waste management solutions.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"168 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
期刊
2017 2nd International Conference on Computing and Communications Technologies (ICCCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1