This paper proposes an enhanced pilot-aided channel estimation algorithm for the second generation of the digital video broadcast for terrestrial (DVB-T2) standard. Two channel estimation techniques are discussed, the first is based on the 3-points averaging technique, while the second is based on studying the frequency domain pattern of the channel response. The second technique leads to a 0.5 dB reduction in the SNR needed to guarantee a specific bit error rate (BER) requirement when compared to the conventional estimation technique recommended by the DVB-T2 implementation guide lines.
{"title":"Modified MIMO-OFDM Channel Estimation Technique for DVB-T2 Systems","authors":"Mona Z. Saleh, M. Sadek, S. E. El Ramly","doi":"10.1109/CICN.2014.57","DOIUrl":"https://doi.org/10.1109/CICN.2014.57","url":null,"abstract":"This paper proposes an enhanced pilot-aided channel estimation algorithm for the second generation of the digital video broadcast for terrestrial (DVB-T2) standard. Two channel estimation techniques are discussed, the first is based on the 3-points averaging technique, while the second is based on studying the frequency domain pattern of the channel response. The second technique leads to a 0.5 dB reduction in the SNR needed to guarantee a specific bit error rate (BER) requirement when compared to the conventional estimation technique recommended by the DVB-T2 implementation guide lines.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"35 1","pages":"212-218"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90683852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A secure smart-card multi-server authentication scheme has been proposed using Diffie-Hellman, Hash-Function and XOR. The scheme made no use of verification table, or encryption techniques, or timestamps to generate a session key to provide secure communication between user and server and resists all possible security attacks, such as Man-in-the-Middle attack, Impersonation attack, Insider attack and many more. The scheme proved to be better when compared to Xie and Chen scheme in terms of security and performance.
{"title":"Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme","authors":"H. Mittal","doi":"10.1109/CICN.2014.173","DOIUrl":"https://doi.org/10.1109/CICN.2014.173","url":null,"abstract":"A secure smart-card multi-server authentication scheme has been proposed using Diffie-Hellman, Hash-Function and XOR. The scheme made no use of verification table, or encryption techniques, or timestamps to generate a session key to provide secure communication between user and server and resists all possible security attacks, such as Man-in-the-Middle attack, Impersonation attack, Insider attack and many more. The scheme proved to be better when compared to Xie and Chen scheme in terms of security and performance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"422 1","pages":"808-812"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84932619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.
{"title":"Structured Signature Scheme for Efficient Dissemination of Tree Structured Data","authors":"V. Waghmare, R. Thool","doi":"10.1109/CICN.2014.186","DOIUrl":"https://doi.org/10.1109/CICN.2014.186","url":null,"abstract":"The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow of extraneous data to a consumer may leak information, even when data is encrypted. Therefore, data sharing among multiple parties require selective and secure dissemination data without any leakage of information. This paper proposes an approach for to solve the problem of different data representation secure and making the data available in efficient manner using structural properties of hierarchical data model and multicast topology. The multicast topology is built dynamically and asynchronously using Publish - Subscribe System.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"21 1","pages":"882-889"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80336406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field. Till now, many approaches has been defined by various researchers to improve the detection rate of intrusions over networks. This paper provides a brief study on significance of evolutionary approach genetic algorithm for intrusion detection to classify and detect intrusions. Methodology of genetic algorithm based intrusion detection systems and review on different approaches introduced in the field has been illustrated with the help of flowcharts for easy interpretation. This paper will provide a helpful review to the promising researchers on the relevant topic.
{"title":"A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications","authors":"Shubhangi Singh, R. S. Kushwah","doi":"10.1109/CICN.2014.162","DOIUrl":"https://doi.org/10.1109/CICN.2014.162","url":null,"abstract":"In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field. Till now, many approaches has been defined by various researchers to improve the detection rate of intrusions over networks. This paper provides a brief study on significance of evolutionary approach genetic algorithm for intrusion detection to classify and detect intrusions. Methodology of genetic algorithm based intrusion detection systems and review on different approaches introduced in the field has been illustrated with the help of flowcharts for easy interpretation. This paper will provide a helpful review to the promising researchers on the relevant topic.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"749-752"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78763263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.
{"title":"Vehicular Mechanical Condition Determination and On Road Traffic Density Estimation Using Audio Signals","authors":"Minal Bhandarkar, Tejashri Waykole","doi":"10.1109/CICN.2014.94","DOIUrl":"https://doi.org/10.1109/CICN.2014.94","url":null,"abstract":"In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we will use SVM and ANN classifiers. In ANN, we are going to use Feed Forword Network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"56 1","pages":"395-401"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76612167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.
{"title":"Improved Genetic Algorithm for Intrusion Detection System","authors":"Dheeraj Pal, A. Parashar","doi":"10.1109/CICN.2014.178","DOIUrl":"https://doi.org/10.1109/CICN.2014.178","url":null,"abstract":"Intrusion detection is one of the important security constraints for maintaining the integrity of information. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an intrusion detection system (IDS), by modifying the genetic algorithm to network intrusion detection system. As we have applied attribute subset reduction on the basis of Information gain. So the training time and complexity reduced considerably. Moreover, we embedded a soft computing approach in rule generation makes the rule more efficient than hard computing approach used in existing genetic algorithm. Generated rule can detect attack with more efficiency. This model was verified using KDD'99 data set. Empirical result clearly shows the higher detection rates and low false positive rates.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"157 1","pages":"835-839"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.
{"title":"10-T Full Subtraction Logic Using GDI Technique","authors":"Haramardeep Singh, R. Kumar","doi":"10.1109/CICN.2014.202","DOIUrl":"https://doi.org/10.1109/CICN.2014.202","url":null,"abstract":"Circuit designing using CMOS logic is the promising field for VLSI engineers, but with demand of small and portable devices, new techniques for low power are emerging. This paper proposed four different 10-T subtraction logic using Gate Diffusion Index (a new technique for low power design). Simulation results are performed using 180nm technology using Cadence Virtuoso. Complete verification for performance of proposed subtraction logic is carried and circuit with least power and delay has been reported. Layout design for the best optimum ciruit is designed using Cadence Layout XL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"110 1","pages":"956-960"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73411285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.
{"title":"A Code Analysis Base Regression Test Selection Technique for D Programming Language","authors":"Nitesh Chouhan, M. Dutta, Mayank Singh","doi":"10.1109/CICN.2014.232","DOIUrl":"https://doi.org/10.1109/CICN.2014.232","url":null,"abstract":"D is a new programming language. This is an object-oriented, imperative, multi-paradigm system programming language. Regression testing on D programming language still untouched by researchers. Our research attempts to bridge this gap by introducing a techniques to revalidate D programs. A framework is proposed which automates both the regression test selection and regression testing processes for D programming language. As part of this approach, special consideration is given to the analysis of the source code of D language. In our approach system dependence graph representation will be used for regression test selection for analyzing and comparing the code changes of original and modified program. First we construct a system dependence graph of the original program from the source code. When some modification is executed in a program, the constructed graph is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents the dependencies arising from object-relations. The test cases that exercise the affected model elements in the program model are selected for regression testing. Empirical studies carried out by us show that our technique selects on an average of 26.36. % more fault-revealing test cases compared to a UML based technique while incurring about 37.34% increase in regression test suite size.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"1106-1112"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74321366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.
{"title":"Design and Implementation for Medical Information Service Open Platform","authors":"Jianfeng Shan, Yu Fang","doi":"10.1109/CICN.2014.144","DOIUrl":"https://doi.org/10.1109/CICN.2014.144","url":null,"abstract":"In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes the sharing of medical information resources, reduces the cost of service development and promotes the development of medical institutions. In this paper, we focus on the key technologies of the medical information open platform, as well as how to build one.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"646-651"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75208686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.
{"title":"Image Signcryption Using ECC","authors":"Reenu Saini, K. S. Vaisla","doi":"10.1109/CICN.2014.177","DOIUrl":"https://doi.org/10.1109/CICN.2014.177","url":null,"abstract":"The demand of mobile devices is increasing day by day because of their portability and many worldwide applications, but more power consumption and high band width, becomes a problem for this and makes uneasy to use it, this problem is solved by signcryption, which provides both authenticity and privacy. Signcryption is the process that combines the functionality of encryption and digital signature in a single logical step. In the literature of signcryption only text data is signcrypted. In this paper we have extended the concept of signcryption to image data, it is so difficult task to extract information form an image, specially signcrypted image, so in this paper we use a technique named as image signcryption.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"53 1","pages":"829-834"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}