首页 > 最新文献

2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

英文 中文
AWGN and impulsive noise removal by turbo audio enhancement technique AWGN与脉冲噪声的turbo音频增强技术
Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju
This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.
本文比较了双共振非线性(DRNL)和信号相关秩次均值(SD-ROM)的turbo音频信号增强方法的性能。这项工作的显著特点是探索使用涡轮增压方法来增强元音和辅音等信号,这是以前没有做过的。元音和辅音是任何语言的基础,为这项工作提供了不同的维度。通过比较,可以确定哪种音频信号增强技术对人工耳蜗的信号处理部分最有用。由于turbo方法的迭代特性,使其具有较好的信号增强效果。对不同噪声(AWGN和脉冲噪声)干扰的声音进行了分析。基于相关系数、对数谱失真(LSD)、片段信噪比(SSNR)和处理后信号之间的均方误差(MSE)来评估增强效果。仿真结果表明,turbo对被AWGN干扰的信号有较好的增强作用。Turbo方法对脉冲噪声具有信号增强作用,而SD-ROM方法对脉冲噪声的处理效果更好。DRNL有助于信号增强,而不是作为一个独立的滤波器,但当组合使用形成turbo。
{"title":"AWGN and impulsive noise removal by turbo audio enhancement technique","authors":"Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju","doi":"10.1109/ICCICCT.2014.6993153","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993153","url":null,"abstract":"This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"45 1","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88101209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors 具有智能传感器的协调多用途机器人系统的设计、概念分析与实现
I. Rohit, M. Dev Anand, D. Jackson
This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.
本文试图对智能传感器协同多用途机器人系统的设计、概念分析和实现进行概述。本文的目的是展示如何将各种传感器设计和集成在一个模块中,并创建一个可以作为黑匣子和调查设备的数据检索系统。
{"title":"Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors","authors":"I. Rohit, M. Dev Anand, D. Jackson","doi":"10.1109/ICCICCT.2014.6992956","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992956","url":null,"abstract":"This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"8 1","pages":"195-201"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82887419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A learning based approach to self modeling robots 基于学习的机器人自建模方法
Michael J. Mathew, Rachit Sapra, S. Majumder
Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.
机器人系统的性能取决于机器人软件中编程的数学模型。通常机器人的数学模型是由设计者计算出来的,并在运行过程中重新校准。机器人模型是机器人软件进行智能操作的基础。赋予机器人自我建模的能力,可以帮助机器人在操作过程中发生轻微损伤时重新修正模型并自我修复。这也避免了重新校准的需要,因为模型通过更多的迭代得到了改进。这项工作试图制造一个机器人系统,其中机器人试图通过利用一些基本的先验信息来建立自己的模型,并通过视觉观察其对环境的行为结果来获得所需的其余信息。本文讨论的方法适用于机械臂,并通过使用Invenscience ARM 2.0和Point Grey立体摄像机进行实验验证。
{"title":"A learning based approach to self modeling robots","authors":"Michael J. Mathew, Rachit Sapra, S. Majumder","doi":"10.1109/ICCICCT.2014.6993060","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993060","url":null,"abstract":"Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2016 1","pages":"758-762"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86633030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network 移动Ad-Hoc网络中有效路由的自拥塞预测算法
G. Kamatam, P. Srinivas, K. C. Sekharaiah
Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.
移动自组网(MANET)中的拥塞控制与传统网络中的拥塞控制有较大的不同。由于资源和带宽的限制,标准的TCP拥塞控制方法不能很好地适应MANET的动态特性,这给路由管理带来了很多挑战。本文提出了一种用于拥塞预测的自拥塞预测(SCP)算法,并用SCP对AODV进行改进,提出了一种新的a -SCP协议,以缓解拥塞和高效路由。该算法的目标是在不破坏网络的情况下最小化网络开销和提高吞吐量。为了评估该方案,我们在不同的随机移动和可扩展网络环境中进行了模拟,结果表明,该方案在分组传输方面具有即兴性,并且控制开销和端到端延迟有所下降。
{"title":"Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network","authors":"G. Kamatam, P. Srinivas, K. C. Sekharaiah","doi":"10.1109/ICCICCT.2014.6993058","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993058","url":null,"abstract":"Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"141 1","pages":"745-750"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology 利用MVT方法的概念,设计了一种低功耗、高速度和节能的45纳米3晶体管异或门
Krishnendu Dhar
This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.
本文利用混合阈值电压(MVT)方法的概念,提出了一种低功耗、高速度、高能效的45纳米技术3个晶体管的异或门的设计。与传统CMOS晶体管、传输门和互补通管逻辑(CPL)相比,所提出的设计在平均功耗(Pavg)、峰值功耗(Ppeak)、延迟时间、功率延迟积(PDP)和能量延迟积(EDP)方面分别显示出大量的衰减。已经发现,Pavg最小为6.72×10-11 W,而Ppeak最小为1.11×10-6 W。进一步计算发现,延迟时间低至1.05皮秒,因此在0.9伏电源下,PDP小至7.07×10-23焦耳,而EDP小至7.45×10-35 j。除此之外,由于晶体管数量的减少,表面积也显著减少。所提出的设计已在Tanner S PICE中进行了仿真,并在Microwind中调制了布局。
{"title":"Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology","authors":"Krishnendu Dhar","doi":"10.1109/ICCICCT.2014.6992931","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992931","url":null,"abstract":"This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"48 1","pages":"66-70"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey of vision and speech stimulation for cerebral palsy rehabilitation 脑性麻痹康复中视觉言语刺激的研究
G. Sumathy, A. Renjith
This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.
本文综述了脑瘫婴儿视力和语言改善的多种理论和方法。一些研究小组利用计算机辅助系统和电子设备,采用不同的技术对脑瘫患者进行视觉和语言刺激。电电极装置使用复杂,可靠性不足,无法提供导致部分输出恢复的视觉和语言刺激。调查材料分为四个部分。1)视觉发展概述2)视觉刺激技术。3)低视力;4)语言刺激技术综述。这项调查的研究领域包括计算机科学、神经网络、电子工程和心理学。它包含了有用的指导方针,以构建新的视觉和语言刺激工具,以支持年幼和视觉不集中的儿童。
{"title":"A survey of vision and speech stimulation for cerebral palsy rehabilitation","authors":"G. Sumathy, A. Renjith","doi":"10.1109/ICCICCT.2014.6993164","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993164","url":null,"abstract":"This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"21 1","pages":"1315-1319"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of a FIR filter model using reversible Fredkin Gate 利用可逆弗雷德金门实现FIR滤波器模型
K. Joy, B. Mathew
Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.
从石器时代到超音速时代,人类在自己的种族中创造了奇迹。这些奇迹可以从现代技术中理解。技术进步正在成为这个世界不可分割的一部分。越来越多的具有许多特点和优势的技术出现了。可逆逻辑就是这样一个新兴概念。可逆电路的主要特点之一是功耗低。随着技术的进步,封装在芯片上的元件数量和晶体管数量也在增加。这会导致电力消耗的增加。因此,可逆逻辑概念所主张的降低功耗在当前情况下具有足够的重要性。可逆逻辑在低功耗VLSI电路中有着广泛的应用。本文的目的是推广可逆逻辑的概念,通过实现一个模型的FIR滤波器使用可逆弗雷德金门。
{"title":"Implementation of a FIR filter model using reversible Fredkin Gate","authors":"K. Joy, B. Mathew","doi":"10.1109/ICCICCT.2014.6993048","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993048","url":null,"abstract":"Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2 1","pages":"690-694"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89946678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A model to secure e-commerce transaction using hybrid encryption 一个使用混合加密保护电子商务交易的模型
D. S. Solanki, S. Shiwani
The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.
电子商务的核心部分是数据库中的数据。在分析用户注册和密码检索过程的基础上,阐述了传统电子商务数据库中存在的安全问题。采用单一加密技术的电子商务系统安全性难以保证。引入非对称加密和对称加密等技术,将组合思想向前推进,形成混合加密。该方法可用于修改电子商务流程,从而提高电子商务数据库的安全性。
{"title":"A model to secure e-commerce transaction using hybrid encryption","authors":"D. S. Solanki, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993040","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993040","url":null,"abstract":"The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"642-645"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89962290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and development of multi-parameter patient monitoring system with wireless communication to PC 无线通信多参数病人监护系统的设计与开发
Abhishek Ekhare, U. Chaskar
The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.
生物医学技术和无线通信的融合给医生和病人都带来了极大的舒适。利用无线技术,患者的重要参数可以在远程位置传输。此外,对患者进行定期家庭检查的替代方案是远程患者监测。本文介绍了一种无线多生命参数监护系统的设计与开发。患者监护模块通过无线通信模块将采集到的生命体征传输到多台个人计算机。患者监护模块采用可重构硬件,通过无线技术传输心电图(ECG)、心率(HR)、血氧饱和度(SpO2)、无创血压(NIBP)和体温等几个选定参数,实现患者远程监护。通过技术验证、临床试验和用户调查对系统进行了评价。该系统在Medion医疗保健有限公司研发实验室进行了测试。本文介绍了这些试验的结果。
{"title":"Design and development of multi-parameter patient monitoring system with wireless communication to PC","authors":"Abhishek Ekhare, U. Chaskar","doi":"10.1109/ICCICCT.2014.6992923","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992923","url":null,"abstract":"The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89728131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A honeypots based anti-phishing framework 一个基于蜜罐的反网络钓鱼框架
Shubhika Chauhan, S. Shiwani
Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.
蜜罐作为一种非常强大的反网络钓鱼工具,被IT安全专家和金融机构广泛用于收集网络钓鱼类的虚假邮件。这有助于安全服务提供商检测新的网络钓鱼网站并迅速关闭它们。蜜罐还用于收集涉及网络钓鱼的人员活动的关键信息,帮助生成统计数据,以帮助以后的安全研究和法医调查。最近,主动向钓鱼者提供蜂蜜令牌也被提议作为一种主动的安全机制,符合“将战争带到他们家里”的方法。在本文中,我们详细阐述了目前使用的基于蜜罐的反网络钓鱼解决方案存在的一些问题。我们建议通过将真实的网上银行系统改造成一个配备蜜令牌的大型蜜罐来最大限度地减少或克服这些限制/问题。这个大蜜罐将支持一些额外的蜜罐,使其更强大。一种名为PhishDetekt的网络钓鱼尝试检测算法被用来自动感知可疑的网络钓鱼者从受害者的银行账户中窃取资金的出价。该系统要求潜在受害者对可疑交易进行再次确认。这导致了一种新的基于蜜罐的反网络钓鱼框架的开发。作为该框架的重要组成部分,我们还建议使用虚拟蜜罐模拟代理来模拟真实用户定期访问网上银行系统的行为。这些代理的主要目标是向网络钓鱼恶意软件提交蜜糖令牌,并将与网络钓鱼者的斗争带到他们自己的领域。
{"title":"A honeypots based anti-phishing framework","authors":"Shubhika Chauhan, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993036","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993036","url":null,"abstract":"Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"618-625"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87185877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1