Suhaib Ahmed, A. Mahajan, Swastik Gupta, Ashish Suri
The capability of Wireless Sensor Network to provide real-time monitoring and prediction of events has enabled its use in designing networks for safety critical applications such as Landslide Detection and Monitoring. To prolong the network lifetime, an energy aware clustering approach is necessary. However in a centralized clustering mechanism, the sink node performs the necessary computations of cluster formation after receiving the information from all nodes regarding their location and energy levels. This paper presents an optimal location for sink placement so as to maximize the output parameters such as Throughput, End-to-End Delay, Jitter and Data Received, of various routing protocols and correspondingly select the best routing protocol and sink location.
{"title":"An Optimal Selection of Routing Protocol for Different Sink Placements in a Wireless Sensor Network for Landslide Detection System","authors":"Suhaib Ahmed, A. Mahajan, Swastik Gupta, Ashish Suri","doi":"10.1109/CICN.2014.87","DOIUrl":"https://doi.org/10.1109/CICN.2014.87","url":null,"abstract":"The capability of Wireless Sensor Network to provide real-time monitoring and prediction of events has enabled its use in designing networks for safety critical applications such as Landslide Detection and Monitoring. To prolong the network lifetime, an energy aware clustering approach is necessary. However in a centralized clustering mechanism, the sink node performs the necessary computations of cluster formation after receiving the information from all nodes regarding their location and energy levels. This paper presents an optimal location for sink placement so as to maximize the output parameters such as Throughput, End-to-End Delay, Jitter and Data Received, of various routing protocols and correspondingly select the best routing protocol and sink location.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"358-363"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78925100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a small square monopole antenna with dual band-notched function which works for UWB applications. In this antenna there is a square radiating patch with an E-shaped slot, and a C-shaped slot at the middle of the patch and two L-shaped slot and one V-shaped strip in the ground plane which gives a wide fractional bandwidth of more than 140% (3.4-20 GHz) is consisted. The presented antenna has been successfully simulated, and shows the bandwidth for the voltage standing wave ratio 2 with two notched bands. The presented antenna has a small size of 10× 12 mm2. This antenna gives good radiation behavior within the UWB frequency band it is shown by simulated results.
{"title":"Dual Band Notched Small Square Monopole UWB Antenna with Enhanced Bandwidth","authors":"A. Singh, Krishna Rathore, P. Sharma, R. K. Raj","doi":"10.1109/CICN.2014.26","DOIUrl":"https://doi.org/10.1109/CICN.2014.26","url":null,"abstract":"This paper presents a small square monopole antenna with dual band-notched function which works for UWB applications. In this antenna there is a square radiating patch with an E-shaped slot, and a C-shaped slot at the middle of the patch and two L-shaped slot and one V-shaped strip in the ground plane which gives a wide fractional bandwidth of more than 140% (3.4-20 GHz) is consisted. The presented antenna has been successfully simulated, and shows the bandwidth for the voltage standing wave ratio 2 with two notched bands. The presented antenna has a small size of 10× 12 mm2. This antenna gives good radiation behavior within the UWB frequency band it is shown by simulated results.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"163 1","pages":"64-68"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75960981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is observed that covert channels can be easily implemented in TCP/IP stack. It is easily achieved by embedding the covert message in the various header fields seemingly filled with "Random" data such as TCP Sequence Number (SQN), IP Identification (ID) etc. Such manipulation of these fields which seems "random" at first sight but might be detected with the help of various techniques. In this research paper we are proposing Sequence Number Reference Model as a Proof-of-Concept for sending the covert message using TCP Sequence Number (SQN) field without changing the semantics of its header field. Covert message in the packet cannot be detected by the conventional covert channel detection techniques since not a single bit of this header field is modified. We are providing a mechanism by which sender can send the covert message and receiver can interpret the same in spite of the fact that the actual covert message will not be carried by the sequence number field of TCP header.
{"title":"The Implementation of TCP Sequence Number Reference Model in Linux Kernel","authors":"Dr. Dhananjay M Dakhane, P. Deshmukh","doi":"10.1109/CICN.2014.104","DOIUrl":"https://doi.org/10.1109/CICN.2014.104","url":null,"abstract":"It is observed that covert channels can be easily implemented in TCP/IP stack. It is easily achieved by embedding the covert message in the various header fields seemingly filled with \"Random\" data such as TCP Sequence Number (SQN), IP Identification (ID) etc. Such manipulation of these fields which seems \"random\" at first sight but might be detected with the help of various techniques. In this research paper we are proposing Sequence Number Reference Model as a Proof-of-Concept for sending the covert message using TCP Sequence Number (SQN) field without changing the semantics of its header field. Covert message in the packet cannot be detected by the conventional covert channel detection techniques since not a single bit of this header field is modified. We are providing a mechanism by which sender can send the covert message and receiver can interpret the same in spite of the fact that the actual covert message will not be carried by the sequence number field of TCP header.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"23 1","pages":"444-447"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73439675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current research presents a predicate logic based framework for formalizing various entities participating in Agent based Simulations. In the proposed technique the properties and actions of basic entities of Agent based Simulation (ABS) are represented using the axioms of Situation Calculus theory. The proposed framework has been used for the formalization of Agent based Simulation of Fire Emergency Response, and subsequently checked using SWI PROLOG SHELL.
{"title":"Formalization of Entities for Agent Based Simulation Using Situation Calculus: A Specific Case Study of Fire Emergency Response","authors":"Mainak Bandyopadhyay, Varun Singh","doi":"10.1109/CICN.2014.248","DOIUrl":"https://doi.org/10.1109/CICN.2014.248","url":null,"abstract":"The current research presents a predicate logic based framework for formalizing various entities participating in Agent based Simulations. In the proposed technique the properties and actions of basic entities of Agent based Simulation (ABS) are represented using the axioms of Situation Calculus theory. The proposed framework has been used for the formalization of Agent based Simulation of Fire Emergency Response, and subsequently checked using SWI PROLOG SHELL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"38 1","pages":"1188-1194"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86830848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research paper an extensive literature survey on different types of feature extraction techniques is reported. To provide an extensive survey, we not only categorize existing feature extraction techniques but also provide detailed descriptions of representative approaches within each category. These techniques are simply classified into four major categories, namely, feature based approach, appearance based approach, template-based and part-based approaches. The aim of this paper is to report an illustrative and comparative study of most popular feature extraction methods which are generally used in face recognition problems. This paper provides an up-to-date comprehensive survey of existing face recognition researches. We are motivated by the lack of direct and detailed independent comparisons of all possible algorithm implementations in available literature. After extensive research on these feature extraction techniques we found that different feature extraction techniques yield prominent results for different image processing applications.
{"title":"An Extensive Survey on Feature Extraction Techniques for Facial Image Processing","authors":"Vivek Pali, S. Goswami, L. Bhaiya","doi":"10.1109/CICN.2014.43","DOIUrl":"https://doi.org/10.1109/CICN.2014.43","url":null,"abstract":"In this research paper an extensive literature survey on different types of feature extraction techniques is reported. To provide an extensive survey, we not only categorize existing feature extraction techniques but also provide detailed descriptions of representative approaches within each category. These techniques are simply classified into four major categories, namely, feature based approach, appearance based approach, template-based and part-based approaches. The aim of this paper is to report an illustrative and comparative study of most popular feature extraction methods which are generally used in face recognition problems. This paper provides an up-to-date comprehensive survey of existing face recognition researches. We are motivated by the lack of direct and detailed independent comparisons of all possible algorithm implementations in available literature. After extensive research on these feature extraction techniques we found that different feature extraction techniques yield prominent results for different image processing applications.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"24 1","pages":"142-148"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87653294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Tao, Yechun Jiang, Junda Ye, Cheng Jing, Huamin Qu
This paper proposes a model-based software safety analysis method for flight control software. Firstly, the AADL architecture model and error model of flight control software are constructed separately. Then we convert the AADL model of flight control software into extended Markov chain model. We can evaluate safety of software component by calculate the probability of component state in different hazardous levels with the extended Markov chain model. Finally, safety of entire flight control software system can be calculated according to AADL error states composition relation, which can avoid states explosion problem of Markov chain model.
{"title":"An AADL Model-Based Safety Analysis Method for Flight Control Software","authors":"Zhang Tao, Yechun Jiang, Junda Ye, Cheng Jing, Huamin Qu","doi":"10.1109/CICN.2014.240","DOIUrl":"https://doi.org/10.1109/CICN.2014.240","url":null,"abstract":"This paper proposes a model-based software safety analysis method for flight control software. Firstly, the AADL architecture model and error model of flight control software are constructed separately. Then we convert the AADL model of flight control software into extended Markov chain model. We can evaluate safety of software component by calculate the probability of component state in different hazardous levels with the extended Markov chain model. Finally, safety of entire flight control software system can be calculated according to AADL error states composition relation, which can avoid states explosion problem of Markov chain model.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"38 3 1","pages":"1148-1152"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87674313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In wireless sensor network (WSN), data collecting from the environment and sending that data to be processed and evaluated is the most important issues. Hence performance evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed or very with various parameters such as speed, seed time, pause time, number of node, and traffic scenario (network topology). In this paper routing protocol AODV, AOMDV, DSR and DSDV has been analyzed by comparing the different performance matrices such as packet delivery ratio (PDR), loss packet ratio (LPR), and average end to end delay (Average End to End) with varying pause time and number of node under TCP & CBR connection via network simulator NS2.35 for wireless sensor network.
在无线传感器网络(WSN)中,从环境中采集数据并发送数据进行处理和评估是最重要的问题。因此,需要对路由协议进行性能评估和比较,因为任何路由协议的性能都可能随着速度、种子时间、暂停时间、节点数量和流量场景(网络拓扑)等各种参数而发生变化。本文通过网络模拟器NS2.35对无线传感器网络在TCP & CBR连接下不同暂停时间和节点数下的路由协议AODV、AOMDV、DSR和DSDV的不同性能矩阵进行了分析,如包投递率(PDR)、丢包率(LPR)和平均端到端时延(average end to end)。
{"title":"Analysis of AOMDV, AODV, DSR, and DSDV Routing Protocols for Wireless Sensor Network","authors":"Bijan Paul, K. A. Bhuiyan, K. Fatema, P. Das","doi":"10.1109/CICN.2014.88","DOIUrl":"https://doi.org/10.1109/CICN.2014.88","url":null,"abstract":"In wireless sensor network (WSN), data collecting from the environment and sending that data to be processed and evaluated is the most important issues. Hence performance evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed or very with various parameters such as speed, seed time, pause time, number of node, and traffic scenario (network topology). In this paper routing protocol AODV, AOMDV, DSR and DSDV has been analyzed by comparing the different performance matrices such as packet delivery ratio (PDR), loss packet ratio (LPR), and average end to end delay (Average End to End) with varying pause time and number of node under TCP & CBR connection via network simulator NS2.35 for wireless sensor network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"6 1","pages":"364-369"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85080401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The accurate estimation of ultrasonic Time-Of-Flight (TOF) is essential in ultrasonic non-destructive testing (NDT). In this paper, a new method for TOF estimation through envelope is proposed. Firstly, the Hilbert transform (HT) is used in ultrasonic signal processing in order to extract the envelope of the echo and to reduce the computational burden. Then, the wavelet denoising technique is applied to the extracted noisy envelope to improve the estimation accuracy. Finally, the Space Alternating Generalized Expectation-Maximization (SAGE) algorithm is adopted to estimate the parameters of M-superimposed echoes. Numerical simulation and experimental results have been carried out to show the performances of the proposed method in estimating TOF of ultrasonic signal.
{"title":"Estimating Time-of-Flight of Multi-superimposed Ultrasonic Echo Signal through Envelope","authors":"Zhenkun Lu","doi":"10.1109/CICN.2014.74","DOIUrl":"https://doi.org/10.1109/CICN.2014.74","url":null,"abstract":"The accurate estimation of ultrasonic Time-Of-Flight (TOF) is essential in ultrasonic non-destructive testing (NDT). In this paper, a new method for TOF estimation through envelope is proposed. Firstly, the Hilbert transform (HT) is used in ultrasonic signal processing in order to extract the envelope of the echo and to reduce the computational burden. Then, the wavelet denoising technique is applied to the extracted noisy envelope to improve the estimation accuracy. Finally, the Space Alternating Generalized Expectation-Maximization (SAGE) algorithm is adopted to estimate the parameters of M-superimposed echoes. Numerical simulation and experimental results have been carried out to show the performances of the proposed method in estimating TOF of ultrasonic signal.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"30 1","pages":"300-303"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88430907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To study the basis and power source of the evolution of IOT (Internet of Things) industry chain, according to the synergy theory, a co-evolution dynamic model which is multivariable and nonlinear is established by using gray system modeling method. It is approved that telecom operator is the order parameter of IOT industry chain, leading and dominating the whole industry chain's evolution. Furthermore, two kinds of co evolution modes in which telecom operators act as the kernel are proposed. It provides a theoretical basis for the IOT industry chain's both integration and upgrade.
{"title":"Study on the Evolution of Internet of Things Industry Chain Based on Synergy Theory","authors":"Shi-hai Tian, Lei Sun","doi":"10.1109/CICN.2014.140","DOIUrl":"https://doi.org/10.1109/CICN.2014.140","url":null,"abstract":"To study the basis and power source of the evolution of IOT (Internet of Things) industry chain, according to the synergy theory, a co-evolution dynamic model which is multivariable and nonlinear is established by using gray system modeling method. It is approved that telecom operator is the order parameter of IOT industry chain, leading and dominating the whole industry chain's evolution. Furthermore, two kinds of co evolution modes in which telecom operators act as the kernel are proposed. It provides a theoretical basis for the IOT industry chain's both integration and upgrade.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"46 1","pages":"628-632"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90905524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we are integrating thermal aware design approach in energy efficient Vedic multiplier on FPGA. In the beginning of this universe, Veda describes heat receiving from the Sun god as Suryamrit (Surya i.e. Sun +Amrit i.e. Nectar= Suryamrit i.e. Nectar coming from the Sun God). Now, whole world is feeling anxious about temperature. How our thinking pattern is changing with evolution of mankind? This paper deals with that question and the whole work is going in direction to get solution of this problem with mechanism of ambient (room) temperature scaling and energy efficient LVCMOS I/O standard. LVCMOS is an acronym for low voltage complementary metal oxide semiconductor. In this Vedic multiplier, we are using three LVCMOS I/O standard. LVCMOS12 is available only in 65nm and 40nm FPGA. Rest LVCMOS18 and LVCMOS25 is available among 40nm, 65nm and 90nm FPGA. In order to test the thermal sustainability of our Vedic multiplier, we are testing it in three different room temperature 20°C, 30°C, and 40°C. Using LVCMOS25, there is 12.99%, 19.23% and 10.28% reduction in power dissipation on 90nm, 65nm and 40nm respectively. For LVCMOS25, when our Vedic multiplier design is migrated from 40nm design to 90nm design, there is 87.72% reduction in power dissipation of Vedic multiplier when temperature is constant 20°C.
{"title":"LVCMOS Based Thermal Aware Energy Efficient Vedic Multiplier Design on FPGA","authors":"Kavita Goswami, B. Pandey","doi":"10.1109/CICN.2014.194","DOIUrl":"https://doi.org/10.1109/CICN.2014.194","url":null,"abstract":"In this work, we are integrating thermal aware design approach in energy efficient Vedic multiplier on FPGA. In the beginning of this universe, Veda describes heat receiving from the Sun god as Suryamrit (Surya i.e. Sun +Amrit i.e. Nectar= Suryamrit i.e. Nectar coming from the Sun God). Now, whole world is feeling anxious about temperature. How our thinking pattern is changing with evolution of mankind? This paper deals with that question and the whole work is going in direction to get solution of this problem with mechanism of ambient (room) temperature scaling and energy efficient LVCMOS I/O standard. LVCMOS is an acronym for low voltage complementary metal oxide semiconductor. In this Vedic multiplier, we are using three LVCMOS I/O standard. LVCMOS12 is available only in 65nm and 40nm FPGA. Rest LVCMOS18 and LVCMOS25 is available among 40nm, 65nm and 90nm FPGA. In order to test the thermal sustainability of our Vedic multiplier, we are testing it in three different room temperature 20°C, 30°C, and 40°C. Using LVCMOS25, there is 12.99%, 19.23% and 10.28% reduction in power dissipation on 90nm, 65nm and 40nm respectively. For LVCMOS25, when our Vedic multiplier design is migrated from 40nm design to 90nm design, there is 87.72% reduction in power dissipation of Vedic multiplier when temperature is constant 20°C.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"24 1","pages":"921-924"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90995549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}