首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
New Approach for Reversible Data Hiding Using Visual Cryptography 利用可视化密码技术实现可逆数据隐藏的新方法
Shruti M. Rakhunde, A. Nikose
This paper presents a novel scheme for reversible data hiding with lossless recovery of original image. Scheme applies a method for hiding data in an image before encryption and then utilizes a novel method for encrypting the image using visual cryptography. A modified algorithm for reversible data hiding using difference expansion technique is used in this scheme. The proposed scheme thus increases the amount of data that can be hidden in the image which also guarantees the lossless recovery of an image after the extraction phase. The performance of the proposed reversible data hiding scheme is evaluated using different color images and compared with few existing schemes. The results clearly indicate that the proposed scheme can embed more data with less distortion of encoded image and also promises the lossless recovery of original image after data is extracted from decrypted image.
提出了一种无损恢复原始图像的可逆数据隐藏方案。该方案采用了一种在加密前将数据隐藏在图像中的方法,然后利用视觉加密技术对图像进行加密。该方案采用了一种改进的基于差分展开技术的可逆数据隐藏算法。因此,该方案增加了可以隐藏在图像中的数据量,同时保证了图像在提取阶段后的无损恢复。利用不同的彩色图像对所提出的可逆数据隐藏方案的性能进行了评价,并与现有的几种方案进行了比较。实验结果表明,该方案可以嵌入更多的数据,编码后的图像失真较小,并且可以在解密后的图像中提取数据后无损恢复原始图像。
{"title":"New Approach for Reversible Data Hiding Using Visual Cryptography","authors":"Shruti M. Rakhunde, A. Nikose","doi":"10.1109/CICN.2014.180","DOIUrl":"https://doi.org/10.1109/CICN.2014.180","url":null,"abstract":"This paper presents a novel scheme for reversible data hiding with lossless recovery of original image. Scheme applies a method for hiding data in an image before encryption and then utilizes a novel method for encrypting the image using visual cryptography. A modified algorithm for reversible data hiding using difference expansion technique is used in this scheme. The proposed scheme thus increases the amount of data that can be hidden in the image which also guarantees the lossless recovery of an image after the extraction phase. The performance of the proposed reversible data hiding scheme is evaluated using different color images and compared with few existing schemes. The results clearly indicate that the proposed scheme can embed more data with less distortion of encoded image and also promises the lossless recovery of original image after data is extracted from decrypted image.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87410731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Compact Band-Reject Frequency Selective Surface with Stable Response for Wimax Applications Wimax应用中具有稳定响应的紧凑带阻频率选择表面
H. S. Mewara, S. Yadav, Sushila Choudhary
In this letter, a new design of compact band-reject frequency selective surfaces is proposed. Compared to previous compact structures, the FSS proposed has a better compact performance with the dimension of a unit cell only 0.082λ × 0.082λ where λ represents the wavelength of the resonant frequency. Above design rejects Wimax band (3.3-3.8) GHz. Moreover, the proposed design has a stable response with respect to different polarization characteristics and different incident angles of the incident plane wave. The squashed performance can further be improved by changing width of patch. The design is aimed at the rejection of Wimax band.
在这封信中,提出了一种新的紧凑带阻频率选择表面的设计。与以往的紧凑结构相比,所提出的FSS具有更好的紧凑性能,单胞尺寸仅为0.082λ × 0.082λ,其中λ表示谐振频率的波长。上述设计拒绝Wimax频段(3.3-3.8)GHz。此外,该设计对于不同的偏振特性和入射平面波的不同入射角具有稳定的响应。通过改变贴片的宽度,可以进一步提高压缩性能。该设计是针对Wimax频段的抑制。
{"title":"A Compact Band-Reject Frequency Selective Surface with Stable Response for Wimax Applications","authors":"H. S. Mewara, S. Yadav, Sushila Choudhary","doi":"10.1109/CICN.2014.12","DOIUrl":"https://doi.org/10.1109/CICN.2014.12","url":null,"abstract":"In this letter, a new design of compact band-reject frequency selective surfaces is proposed. Compared to previous compact structures, the FSS proposed has a better compact performance with the dimension of a unit cell only 0.082λ × 0.082λ where λ represents the wavelength of the resonant frequency. Above design rejects Wimax band (3.3-3.8) GHz. Moreover, the proposed design has a stable response with respect to different polarization characteristics and different incident angles of the incident plane wave. The squashed performance can further be improved by changing width of patch. The design is aimed at the rejection of Wimax band.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87454134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neural Network Based Method for the Diagnosis of Diabetic Retinopathy 基于神经网络的糖尿病视网膜病变诊断方法
Dipika Gadriye, Gopichand D. Khandale
Diabetic Retinopathy is a severe and wide-spread eye disease, it is the main cause of blindness for the working age population in western countries. For the diagnosis of Diabetic Retinopathy, digital color fundus images are becoming increasingly important. This fact opens the possibility of applying image processing techniques in order to facilitate and improve diagnosis in different ways. As micro aneurysms are earliest sign of DR, therefore an algorithm able to automatically detect the micro aneurysms in fundus image captured is a necessary preprocessing step for a correct diagnosis. Some methods that address this problem can be found in the literature but they have some drawbacks like accuracy or speed. This system aims to develop and test a new method for detecting the micro aneurysms in retina images. Gray level 2D feature based vessel extraction is done using neural network to do preprocessing. The method is evaluated on DRIVE database and prove to be superior than rule based methods. To identify micro aneurysms in an image morphological opening and image enhancement is performed. A MATLAB implementation of the complete algorithm is developed and tests suggest that the diagnosis in an image can be estimated in shorter time than previous techniques with the same or better accuracy.
糖尿病视网膜病变是一种严重而广泛的眼病,是西方国家劳动年龄人群致盲的主要原因。对于糖尿病视网膜病变的诊断,数字彩色眼底图像变得越来越重要。这一事实开启了应用图像处理技术以不同方式促进和改进诊断的可能性。由于微动脉瘤是DR的最早征兆,因此能够自动检测眼底图像中微动脉瘤的算法是正确诊断的必要预处理步骤。一些解决这个问题的方法可以在文献中找到,但它们有一些缺点,如准确性或速度。该系统旨在开发和测试一种检测视网膜图像中微动脉瘤的新方法。基于灰度二维特征的血管提取,采用神经网络进行预处理。在DRIVE数据库上对该方法进行了评价,结果表明该方法优于基于规则的方法。为了识别图像中的微动脉瘤,进行了形态学打开和图像增强。开发了完整算法的MATLAB实现,测试表明,与以前的技术相比,可以在更短的时间内估计图像中的诊断,并且具有相同或更高的精度。
{"title":"Neural Network Based Method for the Diagnosis of Diabetic Retinopathy","authors":"Dipika Gadriye, Gopichand D. Khandale","doi":"10.1109/CICN.2014.225","DOIUrl":"https://doi.org/10.1109/CICN.2014.225","url":null,"abstract":"Diabetic Retinopathy is a severe and wide-spread eye disease, it is the main cause of blindness for the working age population in western countries. For the diagnosis of Diabetic Retinopathy, digital color fundus images are becoming increasingly important. This fact opens the possibility of applying image processing techniques in order to facilitate and improve diagnosis in different ways. As micro aneurysms are earliest sign of DR, therefore an algorithm able to automatically detect the micro aneurysms in fundus image captured is a necessary preprocessing step for a correct diagnosis. Some methods that address this problem can be found in the literature but they have some drawbacks like accuracy or speed. This system aims to develop and test a new method for detecting the micro aneurysms in retina images. Gray level 2D feature based vessel extraction is done using neural network to do preprocessing. The method is evaluated on DRIVE database and prove to be superior than rule based methods. To identify micro aneurysms in an image morphological opening and image enhancement is performed. A MATLAB implementation of the complete algorithm is developed and tests suggest that the diagnosis in an image can be estimated in shorter time than previous techniques with the same or better accuracy.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75991343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Improvement of Outage Users at Cell Edges through Cognitive-Femtocell Deployment over Macrocell Network 认知- femtocell在Macrocell网络上部署对小区边缘断网用户性能的改进
Joydev Ghosh, Sanjay Dhar Roy
This research focuses on the problem of cell edge user coverage in the context of femtocell networks operating within the locality of macro cell border. The macro cell-edge users get assisted by the cognitive-femto base station (FBS) to receive a consistent quality of service (QoS) because of their long distance from the macro base station (MBS). Considering various environment factors such as wall structure, number of walls, distance between macro cell and users, interference effect (i.e., cotier and cross-tier), we compute not only the overall outage probability of single input single output (SISO) system and single input multiple output (SIMO) system users but also based on sub carrier and power allocation the performance of the two tier network is analysed with macro cell throughput as the performance metric. Finally, the effectiveness of the scheme is verified by extensive matlab simulation.
本文主要研究在宏小区边界局域内运行的飞蜂窝网络中小区边缘用户覆盖问题。由于宏蜂窝边缘用户与宏基站的距离较远,因此在认知飞向基站(FBS)的帮助下,宏蜂窝边缘用户获得了一致的服务质量(QoS)。考虑到墙的结构、墙的数目、宏小区与用户之间的距离、干扰效应(即同层和跨层)等各种环境因素,我们不仅计算了单输入单输出(SISO)系统和单输入多输出(SIMO)系统用户的总体中断概率,而且基于子载波和功率分配,以宏小区吞吐量为性能指标分析了两层网络的性能。最后,通过大量的matlab仿真验证了该方案的有效性。
{"title":"Performance Improvement of Outage Users at Cell Edges through Cognitive-Femtocell Deployment over Macrocell Network","authors":"Joydev Ghosh, Sanjay Dhar Roy","doi":"10.1109/CICN.2014.107","DOIUrl":"https://doi.org/10.1109/CICN.2014.107","url":null,"abstract":"This research focuses on the problem of cell edge user coverage in the context of femtocell networks operating within the locality of macro cell border. The macro cell-edge users get assisted by the cognitive-femto base station (FBS) to receive a consistent quality of service (QoS) because of their long distance from the macro base station (MBS). Considering various environment factors such as wall structure, number of walls, distance between macro cell and users, interference effect (i.e., cotier and cross-tier), we compute not only the overall outage probability of single input single output (SISO) system and single input multiple output (SIMO) system users but also based on sub carrier and power allocation the performance of the two tier network is analysed with macro cell throughput as the performance metric. Finally, the effectiveness of the scheme is verified by extensive matlab simulation.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80036302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Anti-theft Cloud Apps for Android Operating System 安卓系统的防盗云应用
A. Wahid, Khaleel Ahmad, Gaurav Tyagi, M. Rizvi
Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on Android operating system. Android OS is the widely used Smartphone operating systems with huge user base. Everyday hundreds and thousands of application are added to the repository of Android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.
云计算是在计算机科学和信息技术领域得到广泛应用的主要技术之一。云计算已经改变了企业开展业务的方式,特别是企业内部的数据管理、检索和存储。通过使用云计算提供不同的服务/应用程序,智能手机的使用与云计算同步迅速增长。大多数智能手机都运行Android操作系统。Android操作系统是广泛使用的智能手机操作系统,拥有庞大的用户基础。每天都有成千上万的应用程序被不同的供应商添加到Android的存储库中,并且可以很容易地为Android用户安装。由于大多数应用程序是由第三方开发的,因此可能存在漏洞,从而对数据的安全和隐私造成不同的威胁。当用户在智能手机设备上使用云存储或服务时,这些威胁是至关重要的,如果设备被盗,可能会导致未经授权的用户访问信息。这种未经授权的信息访问可能会被滥用,从而在android设备上的云计算用户之间产生不信任。本文提出了一种利用android云应用程序保护数据和信息免受未经授权访问的方法。
{"title":"Anti-theft Cloud Apps for Android Operating System","authors":"A. Wahid, Khaleel Ahmad, Gaurav Tyagi, M. Rizvi","doi":"10.1109/CICN.2014.165","DOIUrl":"https://doi.org/10.1109/CICN.2014.165","url":null,"abstract":"Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on Android operating system. Android OS is the widely used Smartphone operating systems with huge user base. Everyday hundreds and thousands of application are added to the repository of Android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86145578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Designing Approach of Different Synchronous Cyclic Code Counters by Sequential Circuit Elements of a Novel Reversible Gate 一种新型可逆门的顺序电路元件设计不同同步循环码计数器的有效方法
Shefali Mamataj, B. Das
Reversible logic is widely being considered as the probable logic design style for implementation in modern nanotechnology, optical computing and quantum computing with least impact on physical entropy as because of its less power dissipation as well as distinct output assignment for each distinct input. A reversible circuit maps each output vector into a unique input vector, and vice versa. This paper proposes a new reversible gate. This paper represents various classical operations of this proposed reversible gate. It also represents different sequential circuit elements of reversible gate and its application in designing different synchronous cyclic code counters. The proposed reversible gate is better for designing reversible counter compared to those gates reported in the literature in terms of garbage output, quantum cost and complexity of gates. These synchronous reversible counters give the initial threshold to construct the more complex structure having reversible sequential circuits as a primary component and which can implement more complex operations using quantum computers. Since the output of a sequential circuit depends not only on the present inputs but also on the past input conditions, the construction of sequential elements using reversible logic gates is quite complex than that of a combinational circuit. This paper proposes reversible D flip flop, JK flip flop, T flip flop and also represents two types of 4 bit synchronous cyclic code decade counter (SCCDC) and a 4 bit synchronous gray cyclic code counter (SGCCC) using proposed reversible T flip flop. A comparison between these designs in terms of garbage output, number of gates, constant input and total logical calculation also has been made.
可逆逻辑被广泛认为是现代纳米技术、光学计算和量子计算中对物理熵影响最小的逻辑设计风格,因为它的功耗更小,并且每个不同的输入都有不同的输出分配。可逆电路将每个输出矢量映射为唯一的输入矢量,反之亦然。本文提出了一种新的可逆栅极。本文给出了该可逆门的各种经典运算。介绍了可逆门的不同顺序电路元件及其在不同同步循环码计数器设计中的应用。在垃圾输出、量子成本和门的复杂性方面,与文献中报道的可逆门相比,本文提出的可逆门更适合设计可逆计数器。这些同步可逆计数器为构建以可逆顺序电路为主要组件的更复杂结构提供了初始阈值,并且可以使用量子计算机实现更复杂的操作。由于顺序电路的输出不仅取决于当前的输入,而且取决于过去的输入条件,因此使用可逆逻辑门构建顺序元件要比组合电路复杂得多。本文提出了可逆D触发器、JK触发器、T触发器,并给出了两种使用可逆T触发器的4位同步循环码十进制计数器(SCCDC)和4位同步灰色循环码计数器(SGCCC)。从垃圾输出、门数、常数输入和总逻辑计算等方面对两种设计进行了比较。
{"title":"Efficient Designing Approach of Different Synchronous Cyclic Code Counters by Sequential Circuit Elements of a Novel Reversible Gate","authors":"Shefali Mamataj, B. Das","doi":"10.1109/CICN.2014.217","DOIUrl":"https://doi.org/10.1109/CICN.2014.217","url":null,"abstract":"Reversible logic is widely being considered as the probable logic design style for implementation in modern nanotechnology, optical computing and quantum computing with least impact on physical entropy as because of its less power dissipation as well as distinct output assignment for each distinct input. A reversible circuit maps each output vector into a unique input vector, and vice versa. This paper proposes a new reversible gate. This paper represents various classical operations of this proposed reversible gate. It also represents different sequential circuit elements of reversible gate and its application in designing different synchronous cyclic code counters. The proposed reversible gate is better for designing reversible counter compared to those gates reported in the literature in terms of garbage output, quantum cost and complexity of gates. These synchronous reversible counters give the initial threshold to construct the more complex structure having reversible sequential circuits as a primary component and which can implement more complex operations using quantum computers. Since the output of a sequential circuit depends not only on the present inputs but also on the past input conditions, the construction of sequential elements using reversible logic gates is quite complex than that of a combinational circuit. This paper proposes reversible D flip flop, JK flip flop, T flip flop and also represents two types of 4 bit synchronous cyclic code decade counter (SCCDC) and a 4 bit synchronous gray cyclic code counter (SGCCC) using proposed reversible T flip flop. A comparison between these designs in terms of garbage output, number of gates, constant input and total logical calculation also has been made.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88392730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-objective Optimization for VLSI Circuits VLSI电路的多目标优化
Jitesh R. Shinde, S. Salankar
Area, Speed and power are the basic design constraints which affects the performance of VLSI circuits. The main hurdle in the VLSI implementation of digital circuits is that either the design can be area efficient or power efficient or speed efficient; but not all area-time-speed efficient simultaneously. Optimizing one parameter affects the other. In this paper, an optimal multi-objective approach for VLSI implementation of digital circuit has been suggested; wherein digital low pass symmetric finite impulse response (FIR) filter has been selected as case study. Simulation results with gscl 45 nm tech file on Synopsis Design Vision Tool and Xilinx tool shows that the proposed modification in existing direct form FIR filter structure has reduced area up to 96.52 %, power by 97.44 % and can also improve the circuit latency (or speed) considerably, compared to the existing direct form digital FIR filter structure, and also modified direct form FIR filter structure is efficient than transposed direct form FIR filter structure.
面积、速度和功率是影响超大规模集成电路性能的基本设计约束。VLSI实现数字电路的主要障碍是设计可以是面积效率、功率效率或速度效率;但并非所有的区域-时间-速度同时有效。优化一个参数会影响另一个参数。本文提出了一种数字电路VLSI实现的多目标优化方法;其中选择数字低通对称有限脉冲响应(FIR)滤波器作为案例研究。在概要设计视觉工具和Xilinx工具上使用gscl 45 nm技术文件进行仿真结果表明,与现有的直接形式数字FIR滤波器结构相比,本文提出的改进方案可将现有直接形式FIR滤波器结构的面积减少96.52%,功耗降低97.44%,并可显着提高电路延迟(或速度),并且改进的直接形式FIR滤波器结构比转置的直接形式FIR滤波器结构更有效。
{"title":"Multi-objective Optimization for VLSI Circuits","authors":"Jitesh R. Shinde, S. Salankar","doi":"10.1109/CICN.2014.218","DOIUrl":"https://doi.org/10.1109/CICN.2014.218","url":null,"abstract":"Area, Speed and power are the basic design constraints which affects the performance of VLSI circuits. The main hurdle in the VLSI implementation of digital circuits is that either the design can be area efficient or power efficient or speed efficient; but not all area-time-speed efficient simultaneously. Optimizing one parameter affects the other. In this paper, an optimal multi-objective approach for VLSI implementation of digital circuit has been suggested; wherein digital low pass symmetric finite impulse response (FIR) filter has been selected as case study. Simulation results with gscl 45 nm tech file on Synopsis Design Vision Tool and Xilinx tool shows that the proposed modification in existing direct form FIR filter structure has reduced area up to 96.52 %, power by 97.44 % and can also improve the circuit latency (or speed) considerably, compared to the existing direct form digital FIR filter structure, and also modified direct form FIR filter structure is efficient than transposed direct form FIR filter structure.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88742103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An All-Optical New Universal Gate Using Mach-Zehnder Interferometer 一种基于马赫-曾德尔干涉仪的新型全光通用门
A. K. Mandal, G. Maity
From the seventies of the last century the all-optical universal logic gate has formed as an unconventional form of computing. It is very new relatively in the area of extensive applications in low power CMOS, quantum computing, DNA computing, digital signal processing (DSP), nanotechnology, communication, computer graphics, etc. Here we present and configure a new universal gate (AG gate) in all-optical domain and also in this paper we have explained their principle of operations and used a theoretical model to fulfil this task, finally supporting through numerical simulations. In the field of ultra-fast all-optical signal processing Mach-Zehnder interferometer (MZI), semiconductor optical amplifier (SOA) -based, has an important function. The different logical (realization of Boolean function) operations can be executed by designed circuits with AG gate in the domain of reversible logic-based information processing.
从上世纪70年代开始,全光通用逻辑门作为一种非常规的计算形式已经形成。在低功耗CMOS、量子计算、DNA计算、数字信号处理(DSP)、纳米技术、通信、计算机图形学等领域有着广泛的应用。本文提出并配置了一种全光领域的新型通用栅极(AG栅极),阐述了其工作原理,并利用理论模型实现了这一任务,最后通过数值模拟进行了支持。在超快全光信号处理领域,马赫-曾德尔干涉仪(MZI)以半导体光放大器(SOA)为基础,具有重要的作用。在基于可逆逻辑的信息处理领域,设计的AG门电路可以执行不同的逻辑(布尔函数的实现)运算。
{"title":"An All-Optical New Universal Gate Using Mach-Zehnder Interferometer","authors":"A. K. Mandal, G. Maity","doi":"10.1109/CICN.2014.219","DOIUrl":"https://doi.org/10.1109/CICN.2014.219","url":null,"abstract":"From the seventies of the last century the all-optical universal logic gate has formed as an unconventional form of computing. It is very new relatively in the area of extensive applications in low power CMOS, quantum computing, DNA computing, digital signal processing (DSP), nanotechnology, communication, computer graphics, etc. Here we present and configure a new universal gate (AG gate) in all-optical domain and also in this paper we have explained their principle of operations and used a theoretical model to fulfil this task, finally supporting through numerical simulations. In the field of ultra-fast all-optical signal processing Mach-Zehnder interferometer (MZI), semiconductor optical amplifier (SOA) -based, has an important function. The different logical (realization of Boolean function) operations can be executed by designed circuits with AG gate in the domain of reversible logic-based information processing.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77526967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Experimental Security Analysis for SAODV vs SZRP in Ad-Hoc Networks Ad-Hoc网络中SAODV与SZRP的安全性实验分析
M. Yadav, S. Gupta, R. K. Saket
Ad-hoc network, due to its fundamental characteristics like open environment operation, random topology and capability limitation, is mostly at risk from security point of view. There may be malicious threats during data transmission from one user to another user, which leads to affect the system performance and causing insecurity in data transmission. Many routing protocols consider these security issues as major point of consideration and hence try to overcome the security threats in ad-hoc networks. In this article, a scenario is set up for simulation to evaluate the performance and security issue of two secure routing protocols that are secure ad-hoc on demand vector (SAODV) and secure zone routing protocol (SZRP). In this paper, simulation has been done for number of times with different values of pause time ranging from 0 to 800 seconds for both protocols. And finally, simulation has been done for malicious environment with different numbers of malicious nodes ranging from 2 to 18 nodes for both protocols. Our analysis has been done under two performance metrics-one is packet delivery ratio and second is end to end delay. Experimental results have been obtained using NS-2 (version 2.34) mainly. We have prepared excel graphs from. Tr (trace) files. Based on experimental outcomes paper concluded, that SZRP outperforms SAODV for real time applications.
Ad-hoc网络由于其运行环境开放、拓扑结构随机、能力有限等基本特点,从安全角度看存在很大的风险。数据从一个用户传输到另一个用户的过程中,可能存在恶意威胁,从而影响系统性能,造成数据传输的不安全性。许多路由协议将这些安全问题作为主要考虑点,因此试图克服ad-hoc网络中的安全威胁。在本文中,设置了一个场景进行模拟,以评估两种安全路由协议的性能和安全性问题,这两种协议分别是安全随需应变向量(SAODV)和安全区域路由协议(SZRP)。在本文中,对两种协议进行了多次模拟,暂停时间从0到800秒不等。最后,对两种协议进行了恶意节点数为2 ~ 18的恶意环境仿真。我们的分析是在两个性能指标下完成的——一个是数据包传送率,第二个是端到端延迟。实验结果主要是用NS-2(2.34版)得到的。我们准备了excel图表从。Tr(跟踪)文件。实验结果表明,SZRP在实时应用中优于SAODV。
{"title":"Experimental Security Analysis for SAODV vs SZRP in Ad-Hoc Networks","authors":"M. Yadav, S. Gupta, R. K. Saket","doi":"10.1109/CICN.2014.175","DOIUrl":"https://doi.org/10.1109/CICN.2014.175","url":null,"abstract":"Ad-hoc network, due to its fundamental characteristics like open environment operation, random topology and capability limitation, is mostly at risk from security point of view. There may be malicious threats during data transmission from one user to another user, which leads to affect the system performance and causing insecurity in data transmission. Many routing protocols consider these security issues as major point of consideration and hence try to overcome the security threats in ad-hoc networks. In this article, a scenario is set up for simulation to evaluate the performance and security issue of two secure routing protocols that are secure ad-hoc on demand vector (SAODV) and secure zone routing protocol (SZRP). In this paper, simulation has been done for number of times with different values of pause time ranging from 0 to 800 seconds for both protocols. And finally, simulation has been done for malicious environment with different numbers of malicious nodes ranging from 2 to 18 nodes for both protocols. Our analysis has been done under two performance metrics-one is packet delivery ratio and second is end to end delay. Experimental results have been obtained using NS-2 (version 2.34) mainly. We have prepared excel graphs from. Tr (trace) files. Based on experimental outcomes paper concluded, that SZRP outperforms SAODV for real time applications.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91537222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Analysis of Polarization Maintaining Ultrahigh Birefringent, Dispersion Flattened Photonic Crystal Fiber Having Low Confinement Loss 保偏超高双折射色散扁平低约束损耗光子晶体光纤设计与分析
R. Dhaka
Design and analysis of ultrahigh birefringent photonic crystal fiber having low confinement loss and nearly zero dispersion characteristics has been presented. The suggested design has phosphate glass rectangular slab surrounded by rectangular array of four air holes in core region and circular air holes in the cladding region. Photonic crystal fiber structure is designed, simulated and analyzed by using opti FDTD simulation software. The proposed design shows ultrahigh birefringence (~0.023) and low confinement loss at 1.55μm. Such high value of birefringence eliminates fluctuation in polarization state.
介绍了具有低约束损耗和近零色散特性的超高双折射光子晶体光纤的设计与分析。建议的设计是在磷酸盐玻璃矩形板的核心区域被四个空气孔的矩形阵列包围,在包层区域被圆形空气孔包围。利用opti FDTD仿真软件对光子晶体光纤结构进行了设计、仿真和分析。该设计具有超高双折射(~0.023)和低约束损耗(1.55μm)。如此高的双折射值消除了偏振态的波动。
{"title":"Design and Analysis of Polarization Maintaining Ultrahigh Birefringent, Dispersion Flattened Photonic Crystal Fiber Having Low Confinement Loss","authors":"R. Dhaka","doi":"10.1109/CICN.2014.47","DOIUrl":"https://doi.org/10.1109/CICN.2014.47","url":null,"abstract":"Design and analysis of ultrahigh birefringent photonic crystal fiber having low confinement loss and nearly zero dispersion characteristics has been presented. The suggested design has phosphate glass rectangular slab surrounded by rectangular array of four air holes in core region and circular air holes in the cladding region. Photonic crystal fiber structure is designed, simulated and analyzed by using opti FDTD simulation software. The proposed design shows ultrahigh birefringence (~0.023) and low confinement loss at 1.55μm. Such high value of birefringence eliminates fluctuation in polarization state.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91551430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1