首页 > 最新文献

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
VHDL implementation of UART with BIST capability 具有BIST能力的UART的VHDL实现
Nitin Patel, N. Patel
Manufacturing processes are extremely complex, inducing manufacturers to consider testability as a requirement to assure the reliability and the functionality of each of their designed circuits. One of the most popular test techniques is called Built-In-Self-Test (BIST). A Universal Asynchronous Receive/Transmit (UART) with BIST capability has the objectives of testing the UART on chip itself and no external devices are required to perform the test. This paper focuses on the VHDL implementation of UART with embedded BIST capability using FPGA technology. The paper presents the architecture of UART with BILBO which tests the UART for its correctability. The whole design is synthesized and verified using Xilinx ISE Simulator and Modelsim Simulator.
制造过程极其复杂,促使制造商将可测试性视为确保每个设计电路的可靠性和功能的要求。最流行的测试技术之一被称为内置自测(BIST)。具有BIST功能的通用异步接收/发送(UART)的目标是在芯片本身上测试UART,而不需要外部设备来执行测试。本文重点研究了利用FPGA技术实现具有嵌入式BIST功能的UART的VHDL实现。本文提出了一种基于BILBO的UART体系结构,并对其校正性进行了测试。利用Xilinx ISE模拟器和Modelsim模拟器对整个设计进行了综合和验证。
{"title":"VHDL implementation of UART with BIST capability","authors":"Nitin Patel, N. Patel","doi":"10.1109/ICCCNT.2013.6726476","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726476","url":null,"abstract":"Manufacturing processes are extremely complex, inducing manufacturers to consider testability as a requirement to assure the reliability and the functionality of each of their designed circuits. One of the most popular test techniques is called Built-In-Self-Test (BIST). A Universal Asynchronous Receive/Transmit (UART) with BIST capability has the objectives of testing the UART on chip itself and no external devices are required to perform the test. This paper focuses on the VHDL implementation of UART with embedded BIST capability using FPGA technology. The paper presents the architecture of UART with BILBO which tests the UART for its correctability. The whole design is synthesized and verified using Xilinx ISE Simulator and Modelsim Simulator.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85944407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PLC modem for home automation over three phase powerline 通过三相电力线实现家庭自动化的PLC调制解调器
Nimmy James, Able Eldhose, D. Das Krishna
Powerline Communication is found to be one of the cheapest and easiest communication techniques and electronic companies are looking forward for its applications in home automation, automatic energy reading, broadband etc. In this paper, we propose a new architecture for a PLC modem, which is cost efficient and easy to implement. This paper discusses low voltage narrowband powerline communication for PLC Modem. The proposed PLC modem design transmit and receive data for application such as controlling home equipments, meter reading etc. Proposed PLC modem uses CSMA/CA for error detection and collision.
电力线通信被认为是最便宜和最简单的通信技术之一,电子公司期待着它在家庭自动化、自动抄电、宽带等方面的应用。在本文中,我们提出了一种新的PLC调制解调器结构,它具有成本效益和易于实现。本文讨论了PLC调制解调器的低压窄带电力线通信。提出了PLC调制解调器的设计方案,用于家庭设备控制、抄表等应用。本文提出的PLC调制解调器采用CSMA/CA进行纠错和碰撞检测。
{"title":"PLC modem for home automation over three phase powerline","authors":"Nimmy James, Able Eldhose, D. Das Krishna","doi":"10.1109/ICCCNT.2013.6726836","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726836","url":null,"abstract":"Powerline Communication is found to be one of the cheapest and easiest communication techniques and electronic companies are looking forward for its applications in home automation, automatic energy reading, broadband etc. In this paper, we propose a new architecture for a PLC modem, which is cost efficient and easy to implement. This paper discusses low voltage narrowband powerline communication for PLC Modem. The proposed PLC modem design transmit and receive data for application such as controlling home equipments, meter reading etc. Proposed PLC modem uses CSMA/CA for error detection and collision.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"115 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86032666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A load balancing algorithm for private cloud storage 私有云存储负载均衡算法
B. Prabavathy, K. Priya, C. Babu
Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.
云计算支持按需网络访问可配置计算资源(如服务器、存储和应用程序)的共享池。这些共享资源可以快速供应给消费者,前提是只需为消费者使用的资源付费。云存储是指将存储资源通过互联网交付给消费者。私有云存储仅限于特定的组织,与公共云存储相比,数据安全风险更小。因此,私有云存储是通过利用组织内的商用机器来构建的,重要的数据存储在其中。当此类私有云存储的利用率增加时,存储需求也会随之增加。导致云存储扩容,增加存储节点。在扩容过程中,云存储中存储节点的负载需要均衡。为了维持跨多个存储节点的负载,需要跨存储节点进行数据迁移。数据迁移会占用较多的网络带宽。本文的核心思想是开发一种动态负载均衡算法,在私有云存储扩展过程中实现存储节点间的负载均衡。
{"title":"A load balancing algorithm for private cloud storage","authors":"B. Prabavathy, K. Priya, C. Babu","doi":"10.1109/ICCCNT.2013.6726585","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726585","url":null,"abstract":"Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81958833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comprehensive study on MANETs network layer attacks manet网络层攻击的综合研究
G. Garg, S. Kaushal, Akashdeep Sharma
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security solutions that achieve both broad protection and desirable network performance. This paper presents a review on the various network layer attacks, i.e. wormhole attack, blackhole attack and greyhole attack and existing ways to mitigate them.
移动自组织网络(MANET)是无线移动节点的集合,以分散的方式组成临时网络。为了在MANET的敌对环境中在移动节点之间提供受保护的通信,安全性已经成为主要关注的问题,这对安全设计提出了许多重要的挑战,这些挑战显然需要构建多围栏安全解决方案,以实现广泛的保护和理想的网络性能。本文综述了各种网络层攻击,即虫洞攻击、黑洞攻击和灰洞攻击,以及现有的缓解方法。
{"title":"Comprehensive study on MANETs network layer attacks","authors":"G. Garg, S. Kaushal, Akashdeep Sharma","doi":"10.1109/ICCCNT.2013.6726853","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726853","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security solutions that achieve both broad protection and desirable network performance. This paper presents a review on the various network layer attacks, i.e. wormhole attack, blackhole attack and greyhole attack and existing ways to mitigate them.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81959653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security for wireless sensor networks in military operations 军事行动中无线传感器网络的安全性
Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta
The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.
军事通信对于指挥、后勤信息和各单位的正常运作至关重要。必须有一个安全的通道,通过该通道实时交换关键信息,并维护信息的隐私。无线传感器网络可用于军事应用,用于监视军事活动,如跟踪敌人和部队保护。无线传感器网络是一组分布的传感器节点,这些节点之间相互连接。这些传感器节点低功耗,低成本,体积小,可以做有限的计算量。但无线传感器网络容易受到节点捕获、通信链路窃听、中间人或回复消息等各种攻击。为了确保安全,来自无线传感器网络的信息必须加密。为了保证安全,已经提出了许多密钥协议方案,但大多数方案都相当复杂。本文通过在传感器网络的一组节点之间建立安全的密钥排列,提出了军事通信中公钥加密的预密钥分发方案。这将在内存使用、资源消耗、针对节点捕获的弹性、可伸缩性、针对节点复制的抵抗力和信息共享中的安全性方面提高性能。
{"title":"Security for wireless sensor networks in military operations","authors":"Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta","doi":"10.1109/ICCCNT.2013.6726654","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726654","url":null,"abstract":"The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78881375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds 基于HEFT的混合云成本限期优化工作流调度算法
Nitish Chopra, Sarbjeet Singh
Cloud computing nowadays is playing major role in storage and processing huge tasks with scalability options. Deadline based scheduling is the main focus when we process the tasks using available resources. Private cloud is owned by an organization and resources are free for user whereas public clouds charge users using pay-as-you-go model. When the private cloud is not enough for processing user tasks, resources can be acquired from public cloud. The combination of a public cloud and a private cloud gives rise to hybrid cloud. In hybrid clouds, task scheduling is a complex process as tasks can be allocated resources of either the private cloud or the public cloud. This paper presents an algorithm that decides which resources should be taken on lease from public cloud to complete the workflow execution within deadline and with minimum monetary cost for user. A hybrid scheduling algorithm has been proposed which uses a new concept of sub-deadline for rescheduling and allocation of resources in public cloud. The algorithm helps in finding best resources on public cloud for cost saving and complete workflow execution within deadlines. Three rescheduling policies have been evaluated in this paper. For performance analysis, we have compared the HEFT (Heterogeneous Earliest Finish Time) based hybrid scheduling algorithm with greedy approach and min-min approach. Results have shown that the proposed algorithm optimizes a large amount of cost compared to greedy and min-min approaches and completes all tasks within deadline.
如今,云计算在存储和处理具有可伸缩性选项的大型任务方面发挥着重要作用。当我们使用可用资源处理任务时,基于截止日期的调度是主要焦点。私有云由组织所有,资源对用户免费,而公共云使用即用即付模式向用户收费。当私有云无法处理用户任务时,可以从公有云获取资源。公共云和私有云的结合产生了混合云。在混合云中,任务调度是一个复杂的过程,因为任务可以分配私有云或公共云的资源。本文提出了一种算法来决定哪些资源应该从公共云中租用,以在最后期限内完成工作流的执行,并且用户的货币成本最小。提出了一种混合调度算法,该算法采用子截止日期的新概念对公共云中的资源进行重新调度和分配。该算法有助于在公共云上找到最佳资源,以节省成本并在最后期限内完成工作流执行。本文对三种重调度策略进行了评价。为了进行性能分析,我们将基于HEFT(异构最早完成时间)的混合调度算法与贪心方法和最小最小方法进行了比较。结果表明,与贪心算法和最小最小算法相比,该算法优化了大量的成本,并在限期内完成了所有任务。
{"title":"HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds","authors":"Nitish Chopra, Sarbjeet Singh","doi":"10.1109/ICCCNT.2013.6726627","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726627","url":null,"abstract":"Cloud computing nowadays is playing major role in storage and processing huge tasks with scalability options. Deadline based scheduling is the main focus when we process the tasks using available resources. Private cloud is owned by an organization and resources are free for user whereas public clouds charge users using pay-as-you-go model. When the private cloud is not enough for processing user tasks, resources can be acquired from public cloud. The combination of a public cloud and a private cloud gives rise to hybrid cloud. In hybrid clouds, task scheduling is a complex process as tasks can be allocated resources of either the private cloud or the public cloud. This paper presents an algorithm that decides which resources should be taken on lease from public cloud to complete the workflow execution within deadline and with minimum monetary cost for user. A hybrid scheduling algorithm has been proposed which uses a new concept of sub-deadline for rescheduling and allocation of resources in public cloud. The algorithm helps in finding best resources on public cloud for cost saving and complete workflow execution within deadlines. Three rescheduling policies have been evaluated in this paper. For performance analysis, we have compared the HEFT (Heterogeneous Earliest Finish Time) based hybrid scheduling algorithm with greedy approach and min-min approach. Results have shown that the proposed algorithm optimizes a large amount of cost compared to greedy and min-min approaches and completes all tasks within deadline.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83728586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Smooth query processing in spatial database 空间数据库的平滑查询处理
Tukaram Gawali, R. B. Wagh
Spatial database is a database that is optimized to store and query data. In order to process spatial database a set of functions are needed to process spatial data types called geometry or feature. These set of function are designed by spatial database query framework called Open Geospatial Consortium (OGC). In this paper we have designed Open Geospatial Consortium that will process spatial and non-spatial queries. Open Geospatial Consortium will have simple features specification and set of standards for adding spatial functionality to database systems. The main purpose of this framework is to adapt SQL queries and provide the best result among the available techniques of spatial query processing. The experimental result shows that our framework can process spatial and non-spatial queries with optimal cost. The performance of the queries is measured in the terms of Estimated CPU Cost, Estimated Subtree Cost, Estimated Number of Rows, Estimated Rows Size and Cached plan size.
空间数据库是为存储和查询数据而优化的数据库。为了处理空间数据库,需要一组函数来处理称为几何或特征的空间数据类型。这些功能集是由开放地理空间联盟(OGC)空间数据库查询框架设计的。在本文中,我们设计了Open Geospatial Consortium来处理空间和非空间查询。开放地理空间联盟将有简单的特性规范和一套标准,用于向数据库系统添加空间功能。该框架的主要目的是调整SQL查询,并在可用的空间查询处理技术中提供最佳结果。实验结果表明,该框架能够以最优的代价处理空间和非空间查询。查询的性能是根据估计的CPU成本、估计的子树成本、估计的行数、估计的行大小和缓存计划大小来衡量的。
{"title":"Smooth query processing in spatial database","authors":"Tukaram Gawali, R. B. Wagh","doi":"10.1109/ICCCNT.2013.6726541","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726541","url":null,"abstract":"Spatial database is a database that is optimized to store and query data. In order to process spatial database a set of functions are needed to process spatial data types called geometry or feature. These set of function are designed by spatial database query framework called Open Geospatial Consortium (OGC). In this paper we have designed Open Geospatial Consortium that will process spatial and non-spatial queries. Open Geospatial Consortium will have simple features specification and set of standards for adding spatial functionality to database systems. The main purpose of this framework is to adapt SQL queries and provide the best result among the available techniques of spatial query processing. The experimental result shows that our framework can process spatial and non-spatial queries with optimal cost. The performance of the queries is measured in the terms of Estimated CPU Cost, Estimated Subtree Cost, Estimated Number of Rows, Estimated Rows Size and Cached plan size.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84728519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved modified fast Haar Wavelet transformation [MFHWT] based visible watermarking 基于改进的快速Haar小波变换的可见水印
Shefaly Sharma, J. Kaur, Shipra Gupta
With the explosive growth of internet technology, many innovative applications requiring exchange of large amount of data have become feasible and hence security of data have become a critical issue. In this paper, a robust and secure visible image watermarking algorithm is purposed. This purposed algorithm is based on Multi Wavelets with Modified fast Haar Wavelet transform [MFHWT]. MFHWT is the latest technique used for wavelets transformation which is used to perform image analysis at faster rate than previous techniques. The main idea of the purposed algorithm is to decompose the original image into fine scale sub bands using MFHWT according to the size of the Watermark. In this algorithm, the obtained watermarked image. In this algorithm has very high Peak Signal to Noise Ratio [PSNR].
随着互联网技术的爆炸式发展,许多需要交换大量数据的创新应用已经成为可能,因此数据的安全性成为一个关键问题。本文提出了一种鲁棒、安全的可见图像水印算法。该算法基于多小波和改进的快速Haar小波变换[MFHWT]。MFHWT是用于小波变换的最新技术,用于比以前的技术更快地执行图像分析。该算法的主要思想是根据水印的大小,利用MFHWT将原始图像分解成小尺度的子带。在该算法中,得到的水印图像。该算法具有很高的峰值信噪比(PSNR)。
{"title":"Improved modified fast Haar Wavelet transformation [MFHWT] based visible watermarking","authors":"Shefaly Sharma, J. Kaur, Shipra Gupta","doi":"10.1109/ICCCNT.2013.6726609","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726609","url":null,"abstract":"With the explosive growth of internet technology, many innovative applications requiring exchange of large amount of data have become feasible and hence security of data have become a critical issue. In this paper, a robust and secure visible image watermarking algorithm is purposed. This purposed algorithm is based on Multi Wavelets with Modified fast Haar Wavelet transform [MFHWT]. MFHWT is the latest technique used for wavelets transformation which is used to perform image analysis at faster rate than previous techniques. The main idea of the purposed algorithm is to decompose the original image into fine scale sub bands using MFHWT according to the size of the Watermark. In this algorithm, the obtained watermarked image. In this algorithm has very high Peak Signal to Noise Ratio [PSNR].","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88063684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on wireless LAN internal roaming protocols 无线局域网内部漫游协议综述
Amit Kumar, Prabhat Kumar, M. Singh
Wireless LANs (WLANs) are complex systems with many access points (APs) and thousands of clients. The rising amount of roaming users and broadband Internet services have created a very strong demand for fast, efficient, secure, and seamless roaming protocols. A handover roaming protocol allows an user to connect to another access point of same server with proper authentication establishing a session key in such a way that new AP recognizes it as legitimate user of the current network. This paper illustrates brief state-of-the-art survey of existing L2 type handover protocols and discusses pitfall of these protocols in detail. We have also presented briefly, the key challenges and future perspective of the existing wireless roaming protocols.
无线局域网(wlan)是具有许多接入点(ap)和数千个客户端的复杂系统。随着漫游用户和宽带互联网服务的不断增加,对快速、高效、安全和无缝的漫游协议产生了非常强烈的需求。切换漫游协议允许用户通过适当的身份验证连接到同一服务器的另一个接入点,建立会话密钥,以使新AP将其识别为当前网络的合法用户。本文简要介绍了现有L2类型切换协议的发展概况,并详细讨论了这些协议的缺陷。我们还简要介绍了现有无线漫游协议的主要挑战和未来展望。
{"title":"A survey on wireless LAN internal roaming protocols","authors":"Amit Kumar, Prabhat Kumar, M. Singh","doi":"10.1109/ICCCNT.2013.6726785","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726785","url":null,"abstract":"Wireless LANs (WLANs) are complex systems with many access points (APs) and thousands of clients. The rising amount of roaming users and broadband Internet services have created a very strong demand for fast, efficient, secure, and seamless roaming protocols. A handover roaming protocol allows an user to connect to another access point of same server with proper authentication establishing a session key in such a way that new AP recognizes it as legitimate user of the current network. This paper illustrates brief state-of-the-art survey of existing L2 type handover protocols and discusses pitfall of these protocols in detail. We have also presented briefly, the key challenges and future perspective of the existing wireless roaming protocols.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87288170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real time visual SLAM using cloud computing 使用云计算的实时可视化SLAM
Kumar Ayush, N. Agarwal
Simultaneous localization and map-building (SLAM) continues to draw considerable attention in the robotics community due to the advantages it can offer in building autonomous robots. However, few approaches to this problem scale up to handle a large number of landmarks present in real environments. The processing resource requirement to carry out SLAM in real time can be quite high. In this paper we present a novel system which employs resources provided by infrastructure as a service (IaaS) and parallelism for effective processing. Using private cloud infrastructure employing virtualized resources based on MPI the task of global map building is performed in real time simultaneously carrying out loop detection and bundle adjustment for indoor environments. Through implementation in various challenging environments with moving obstacles, visually homogeneous areas having few features, regions with large changes in lighting and relatively fast camera motion we demonstrate our system to be one which is effective as well as robust.
同时定位和地图构建(SLAM)在机器人社区中继续引起相当大的关注,因为它可以在构建自主机器人方面提供优势。然而,很少有解决这个问题的方法可以扩展到处理现实环境中存在的大量地标。实时执行SLAM对处理资源的要求非常高。本文提出了一种利用基础设施即服务(IaaS)提供的资源和并行性进行有效处理的新系统。利用私有云基础设施,利用基于MPI的虚拟化资源,实时完成全局地图构建任务,同时对室内环境进行环检测和束调整。通过在各种具有挑战性的环境中实现移动障碍物,视觉上均匀的区域几乎没有特征,照明变化很大的区域和相对较快的相机运动,我们证明了我们的系统是有效的,也是健壮的。
{"title":"Real time visual SLAM using cloud computing","authors":"Kumar Ayush, N. Agarwal","doi":"10.1109/ICCCNT.2013.6726744","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726744","url":null,"abstract":"Simultaneous localization and map-building (SLAM) continues to draw considerable attention in the robotics community due to the advantages it can offer in building autonomous robots. However, few approaches to this problem scale up to handle a large number of landmarks present in real environments. The processing resource requirement to carry out SLAM in real time can be quite high. In this paper we present a novel system which employs resources provided by infrastructure as a service (IaaS) and parallelism for effective processing. Using private cloud infrastructure employing virtualized resources based on MPI the task of global map building is performed in real time simultaneously carrying out loop detection and bundle adjustment for indoor environments. Through implementation in various challenging environments with moving obstacles, visually homogeneous areas having few features, regions with large changes in lighting and relatively fast camera motion we demonstrate our system to be one which is effective as well as robust.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"111 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89274992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1