Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159276
Ashish Singh, Kakali Chatterjee
Day by day users has been adopting remote storage system due to its secure service. But some time it may possible that people comes to know what security policy has been applied in server side. As the result, new security risks and attacks are coming in cloud. So, it is necessary to provide more secured and updated authentication scheme. For any cloud application, in which personal or private information are exchanged, single-tier authentication is not sufficient for authentication. In above situation, multi-tier authentication scheme is much more secured than single-tier authentication scheme. In computing environment, there are various multitier authentication schemes, but they do not provide security against insider attacks and virtualization attacks. In cloud environment, whole authentication control lies in the server side. So, it is hard to trust the third party server in cloud system. This paper proposes a secured and more advanced multi-tier authentication scheme for accessing cloud services.
{"title":"A secure multi-tier authentication scheme in cloud computing environment","authors":"Ashish Singh, Kakali Chatterjee","doi":"10.1109/ICCPCT.2015.7159276","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159276","url":null,"abstract":"Day by day users has been adopting remote storage system due to its secure service. But some time it may possible that people comes to know what security policy has been applied in server side. As the result, new security risks and attacks are coming in cloud. So, it is necessary to provide more secured and updated authentication scheme. For any cloud application, in which personal or private information are exchanged, single-tier authentication is not sufficient for authentication. In above situation, multi-tier authentication scheme is much more secured than single-tier authentication scheme. In computing environment, there are various multitier authentication schemes, but they do not provide security against insider attacks and virtualization attacks. In cloud environment, whole authentication control lies in the server side. So, it is hard to trust the third party server in cloud system. This paper proposes a secured and more advanced multi-tier authentication scheme for accessing cloud services.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"24 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90894775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159171
E. E. Lawrence, R. Latha
Six degrees of separation is a popular theory that is widely accepted by many people, which states any two people on this world can be connected through an average number of six steps. Though there is no solid scientific evidence that the six degrees of separation theory is true, it remains as an area of interest to social researches. With the advent of digital mapping, the theory can now be tested with social networks, but will the theory of six degrees of separation hold for the virtual world? The link between any two people in a graph with number of hops needs to be identified and that can be done efficiently with the help of Ant colony optimization technique (ACO). As ACO algorithms are proved to be efficient with a broad range of NP hard problems such as the traveling salesman problem (TSP) or the quadratic assignment problem (QAP), and is increasingly gaining interest for solving real life engineering and scientific problems, an attempt has been made in this paper to analyze the six degrees of separation in the popular social network Facebook which has over 1.3 billion active users as of June 2014.
{"title":"Analysis of six degrees of separation in Facebook using Ant colony optimization","authors":"E. E. Lawrence, R. Latha","doi":"10.1109/ICCPCT.2015.7159171","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159171","url":null,"abstract":"Six degrees of separation is a popular theory that is widely accepted by many people, which states any two people on this world can be connected through an average number of six steps. Though there is no solid scientific evidence that the six degrees of separation theory is true, it remains as an area of interest to social researches. With the advent of digital mapping, the theory can now be tested with social networks, but will the theory of six degrees of separation hold for the virtual world? The link between any two people in a graph with number of hops needs to be identified and that can be done efficiently with the help of Ant colony optimization technique (ACO). As ACO algorithms are proved to be efficient with a broad range of NP hard problems such as the traveling salesman problem (TSP) or the quadratic assignment problem (QAP), and is increasingly gaining interest for solving real life engineering and scientific problems, an attempt has been made in this paper to analyze the six degrees of separation in the popular social network Facebook which has over 1.3 billion active users as of June 2014.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"152 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159455
D. Chaturvedi, Arvind Kumar, T. Shanmuganantham
In this paper a novel type of resonant antenna based on asymmetric coplanar wave guide structure has been presented. In the defined geometry bandwidth can be increased by introducing resonator ring in composite right/left handed transmission line model. Efficiency as well as gain of the geometry can be improved by incorporating comb drive type of structure which introduces interdigital capacitors and produces one more resonant frequency. Asymmetric ground plane reduced the dimensions up to 38.5×25 mm. Dual band have been obtained covering impedance bandwidth of (2.34-2.55 GHz), 210 MHz in lower band and (3.2-3.8 GHz),600 MHz in higher band corresponds fractional bandwidth of 8.7% and 16.3%. Antenna geometry is highly efficient showing maximum efficiency of 99% and peak gain up to 4.23dBi. Defined antenna is very suitable for WLAN/LTE applications.
{"title":"Asymmetric coplanar waveguide-fed CRLH-TL based antenna for WLAN/LTE applications","authors":"D. Chaturvedi, Arvind Kumar, T. Shanmuganantham","doi":"10.1109/ICCPCT.2015.7159455","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159455","url":null,"abstract":"In this paper a novel type of resonant antenna based on asymmetric coplanar wave guide structure has been presented. In the defined geometry bandwidth can be increased by introducing resonator ring in composite right/left handed transmission line model. Efficiency as well as gain of the geometry can be improved by incorporating comb drive type of structure which introduces interdigital capacitors and produces one more resonant frequency. Asymmetric ground plane reduced the dimensions up to 38.5×25 mm. Dual band have been obtained covering impedance bandwidth of (2.34-2.55 GHz), 210 MHz in lower band and (3.2-3.8 GHz),600 MHz in higher band corresponds fractional bandwidth of 8.7% and 16.3%. Antenna geometry is highly efficient showing maximum efficiency of 99% and peak gain up to 4.23dBi. Defined antenna is very suitable for WLAN/LTE applications.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"31 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78330591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159452
S. Narang
Transistor ageing has been a major problem as far as nanometre technology is concerned which leads to performance degradation and reliability issues. Ageing in pMOS transistor takes place due to Negative bias temperature instability (NBTI) which is a major threat in reliability as Iscale down the transistor geometries aggressively in our quest for low power and high performance. Overcoming ageing effect requires additional power expense, which in turn aggravates the power and heating problem. I propose an adaptive supply voltage (ASV) scheme as an arguably power efficient approach for variation resilience since it attempts to allocate power resources only where the negative effect of ageing is strong. Upon implementing the proposed approach on a host of domino logic circuits which include Current comparison domino (CCD) Ihave mitigated the rise in delay problem by suitably allocating a supply voltage so that the delay specifications are continuously met even after a lifespan of 10 years of operation at the expense of very low power headroom. Simulations have been performed using the BSIM4v4.7 model & 32 nm predictive technology model in SILVACO EDA tool at a frequency of 2 GHz and nominal supply voltage of 0.9V. The proposed approach has been implemented on 32 bit & 64 bit OR gates and also on 32 bit comparator and the results have been noteworthy.
{"title":"Circuit level technique for mitigating effects of NBTI for wide fan-in domino logic circuits using supply voltage tuning","authors":"S. Narang","doi":"10.1109/ICCPCT.2015.7159452","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159452","url":null,"abstract":"Transistor ageing has been a major problem as far as nanometre technology is concerned which leads to performance degradation and reliability issues. Ageing in pMOS transistor takes place due to Negative bias temperature instability (NBTI) which is a major threat in reliability as Iscale down the transistor geometries aggressively in our quest for low power and high performance. Overcoming ageing effect requires additional power expense, which in turn aggravates the power and heating problem. I propose an adaptive supply voltage (ASV) scheme as an arguably power efficient approach for variation resilience since it attempts to allocate power resources only where the negative effect of ageing is strong. Upon implementing the proposed approach on a host of domino logic circuits which include Current comparison domino (CCD) Ihave mitigated the rise in delay problem by suitably allocating a supply voltage so that the delay specifications are continuously met even after a lifespan of 10 years of operation at the expense of very low power headroom. Simulations have been performed using the BSIM4v4.7 model & 32 nm predictive technology model in SILVACO EDA tool at a frequency of 2 GHz and nominal supply voltage of 0.9V. The proposed approach has been implemented on 32 bit & 64 bit OR gates and also on 32 bit comparator and the results have been noteworthy.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85424160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159299
Masahiro Aono, K. Takei
We are developing new radio architecture for applying a wireless communication system to controlling and monitoring systems in industrial infrastructure systems. Using polarization angle diversity, we can achieve reliable communication in a non line-of-sight situation. To realize polarization angle diversity, we use a rotating polarized radio wave. When we use polarization angle diversity, we need to control radio frequencies more easily. New software radio architecture create radio frequency in a digital circuit directly. It has a possibility to control a rotating polarization radio wave. And by experiment, I show a result of basic communication test and confirm its functions.
{"title":"Polarization angle diversity and new digital software radio architecture","authors":"Masahiro Aono, K. Takei","doi":"10.1109/ICCPCT.2015.7159299","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159299","url":null,"abstract":"We are developing new radio architecture for applying a wireless communication system to controlling and monitoring systems in industrial infrastructure systems. Using polarization angle diversity, we can achieve reliable communication in a non line-of-sight situation. To realize polarization angle diversity, we use a rotating polarized radio wave. When we use polarization angle diversity, we need to control radio frequencies more easily. New software radio architecture create radio frequency in a digital circuit directly. It has a possibility to control a rotating polarization radio wave. And by experiment, I show a result of basic communication test and confirm its functions.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"44 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84902565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159412
Abhijeet Suryatali, V. B. Dharmadhikari
Many highway toll collection systems have already been developed and are widely used in India. Some of these include Manual toll collection, RF tags, Barcodes, Number plate recognition. All these systems have disadvantages that lead to some errors in the corresponding system. This paper presents a brief review of toll collection systems present in India, their advantages and disadvantages and also aims to design and develop a new efficient toll collection system which will be a good low cost alternative among all other systems. The system is based on Computer Vision vehicle detection using OpenCV library in Embedded Linux platform. The system is designed using Embedded Linux development kit (Raspberry pi). In this system, a camera captures images of vehicles passing through toll booth thus a vehicle is detected through camera. Depending on the area occupied by the vehicle, classification of vehicles as light and heavy is done. Further this information is passed to the Raspberry pi which is having web server set up on it. When raspberry pi comes to know the vehicle, then it access the web server information and according to the type of the vehicle, appropriate toll is charged. This system can also made to count moving vehicles from pre-recorded videos or stored videos by using the same algorithm and procedure that we follow in this paper.
{"title":"Computer vision based vehicle detection for toll collection system using embedded Linux","authors":"Abhijeet Suryatali, V. B. Dharmadhikari","doi":"10.1109/ICCPCT.2015.7159412","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159412","url":null,"abstract":"Many highway toll collection systems have already been developed and are widely used in India. Some of these include Manual toll collection, RF tags, Barcodes, Number plate recognition. All these systems have disadvantages that lead to some errors in the corresponding system. This paper presents a brief review of toll collection systems present in India, their advantages and disadvantages and also aims to design and develop a new efficient toll collection system which will be a good low cost alternative among all other systems. The system is based on Computer Vision vehicle detection using OpenCV library in Embedded Linux platform. The system is designed using Embedded Linux development kit (Raspberry pi). In this system, a camera captures images of vehicles passing through toll booth thus a vehicle is detected through camera. Depending on the area occupied by the vehicle, classification of vehicles as light and heavy is done. Further this information is passed to the Raspberry pi which is having web server set up on it. When raspberry pi comes to know the vehicle, then it access the web server information and according to the type of the vehicle, appropriate toll is charged. This system can also made to count moving vehicles from pre-recorded videos or stored videos by using the same algorithm and procedure that we follow in this paper.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87389944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159402
S. Ganesh, H. Raj
The goal of inventing new software metric for SQA is to analyze the brilliance of the software. Certifying the proposed metric as valid should also be considered as equal to the invention since it describes how good the proposed metric is, how it could be practically implemented, and how useful is it for the technical fraternity and so on. This work is divided into a three-step framework, where in the first step the MALCOM metric is analytically evaluated against a formal list of Weyuker's properties and in the second step we compare MALCOM with its base metric LCOM. The metric complexity is also applied to ANOVA test to analyze the complexity variance in the third step. The results have proven that the metric is valid and satisfies all the necessary conditions of the framework.
{"title":"Performance based analysis on MALCOM — A software metric","authors":"S. Ganesh, H. Raj","doi":"10.1109/ICCPCT.2015.7159402","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159402","url":null,"abstract":"The goal of inventing new software metric for SQA is to analyze the brilliance of the software. Certifying the proposed metric as valid should also be considered as equal to the invention since it describes how good the proposed metric is, how it could be practically implemented, and how useful is it for the technical fraternity and so on. This work is divided into a three-step framework, where in the first step the MALCOM metric is analytically evaluated against a formal list of Weyuker's properties and in the second step we compare MALCOM with its base metric LCOM. The metric complexity is also applied to ANOVA test to analyze the complexity variance in the third step. The results have proven that the metric is valid and satisfies all the necessary conditions of the framework.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86221620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159277
S. Jahan, S. Rajan, T. Rakesh, Assistant Professor
In the present scenario, the modern microelectronic devices are demanding supply with multiple voltages from a power-efficient and miniaturized platform. Unfortunately, the power inductors used in magnetic-based switching converters are bulky and difficult to integrate. The aim of this paper is to develop Single-Input Multiple-Output (SIMO) converter for Thermoelectric Generator (TEG) which is used as the source for supplying the load. The SIMO converter is used to boost the low input voltage of TEG to a middle voltage and high voltage with the help of the coupled-inductor. The middle and high voltage output terminals can be used for supplying power to power sources like batteries. The converter uses only one switch to obtain the various output voltages of different levels which is the main objective of this study. This study is carried out by PI controller and MPPT techniques. The MPPT technique used for this study is Incremental Conductance. The proposed SIMO converter has been modelled and simulated using PSIM software for obtaining higher efficiency. The conversion efficiency of about 96.5% can be achieved and has been reported in this paper.
{"title":"Performance evaluation of high efficiency thermoelectric SIMO converter","authors":"S. Jahan, S. Rajan, T. Rakesh, Assistant Professor","doi":"10.1109/ICCPCT.2015.7159277","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159277","url":null,"abstract":"In the present scenario, the modern microelectronic devices are demanding supply with multiple voltages from a power-efficient and miniaturized platform. Unfortunately, the power inductors used in magnetic-based switching converters are bulky and difficult to integrate. The aim of this paper is to develop Single-Input Multiple-Output (SIMO) converter for Thermoelectric Generator (TEG) which is used as the source for supplying the load. The SIMO converter is used to boost the low input voltage of TEG to a middle voltage and high voltage with the help of the coupled-inductor. The middle and high voltage output terminals can be used for supplying power to power sources like batteries. The converter uses only one switch to obtain the various output voltages of different levels which is the main objective of this study. This study is carried out by PI controller and MPPT techniques. The MPPT technique used for this study is Incremental Conductance. The proposed SIMO converter has been modelled and simulated using PSIM software for obtaining higher efficiency. The conversion efficiency of about 96.5% can be achieved and has been reported in this paper.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"17 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82838506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159284
M. Vijayakumari, D. Sundararajan
In recent times, due to the increased use of the reactive power, it is important to bill the electrical power consumption based on both the active and reactive power components. Reactive power is a very significant factor in electric power systems since it affects the efficiency of these systems. For this reason, the measurement of reactive energy is also important. Several methods are used to measure reactive power. Reactive energy meters provide accurate measurement only if the input is fundamental, because meters are constructed for operating under sinusoidal conditions. Due to the widespread use of nonlinear loads and natural disturbances such as lightning, the power quality of the waveforms is considerably deteriorated. As the corrupted waveforms are composed of nonstationary components also, in order to estimate the true reactive power of the power system fundamental component, a time-frequency analysis is required. Therefore, in this paper, a DWT based algorithm is proposed to effectively estimate the reactive power component of the power system.
{"title":"Estimation of the reactive power of corrupted waveforms using the DWT","authors":"M. Vijayakumari, D. Sundararajan","doi":"10.1109/ICCPCT.2015.7159284","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159284","url":null,"abstract":"In recent times, due to the increased use of the reactive power, it is important to bill the electrical power consumption based on both the active and reactive power components. Reactive power is a very significant factor in electric power systems since it affects the efficiency of these systems. For this reason, the measurement of reactive energy is also important. Several methods are used to measure reactive power. Reactive energy meters provide accurate measurement only if the input is fundamental, because meters are constructed for operating under sinusoidal conditions. Due to the widespread use of nonlinear loads and natural disturbances such as lightning, the power quality of the waveforms is considerably deteriorated. As the corrupted waveforms are composed of nonstationary components also, in order to estimate the true reactive power of the power system fundamental component, a time-frequency analysis is required. Therefore, in this paper, a DWT based algorithm is proposed to effectively estimate the reactive power component of the power system.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87663303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-19DOI: 10.1109/ICCPCT.2015.7159384
R. Baskaran, M. S. Saleem Basha, J. Amudhavel, K. P. Kumar, D. A. Kumar, V. Vijayakumar
Vehicular Ad-Hoc Network (VANET) [1] which is a sub-type of the mobile ad-hoc networks provides wireless communication between the vehicles and to the Road Side Units (RSU) [2]. In VANET, the communication between the vehicles is used for various purposes like safety, comfort and entertainment. We use the vehicles as the portable nodes to create the mobile network. The VANET uses all the vehicles in the nearby distance as a wireless router or node to form a network. The vehicles can dynamically come in or drop out of the network as they move. The working of the VANET depends on how the routing of data is done in the network. In the recent years, the number of accidents has been increased to a greater count. In order to eradicate this, the implementation of VANET technology is being used in various modes of transportation. Even though VANET has been proposed to be a successful network model, it has some issues to overcome. The most major issues are the connectivity and the signal fading issue. We can overcome some of the issues in VANET by using the Artificial Bee Colony Algorithm (ABC) [3]. The proposed use of the algorithm in VANET may resolve some of the issues effectively.
车辆自组网(Vehicular Ad-Hoc Network, VANET)[1]是移动自组网的一个子类型,提供车辆与路旁单元(Road Side Units, RSU)之间的无线通信[2]。在VANET中,车辆之间的通信用于各种目的,如安全,舒适和娱乐。我们使用车辆作为便携式节点来创建移动网络。VANET使用附近的所有车辆作为无线路由器或节点形成网络。车辆可以在行驶过程中动态地进入或退出网络。VANET的工作取决于网络中的数据路由是如何完成的。近年来,事故的数量已经增加到一个更大的数字。为了消除这种情况,VANET技术的实施正在各种运输方式中使用。尽管VANET已被认为是一个成功的网络模型,但它仍有一些问题需要克服。最主要的问题是连通性和信号衰落问题。我们可以通过使用人工蜂群算法(ABC)来克服VANET中的一些问题[3]。在VANET中使用该算法可以有效地解决一些问题。
{"title":"A bio-inspired artificial bee colony approach for dynamic independent connectivity patterns in VANET","authors":"R. Baskaran, M. S. Saleem Basha, J. Amudhavel, K. P. Kumar, D. A. Kumar, V. Vijayakumar","doi":"10.1109/ICCPCT.2015.7159384","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159384","url":null,"abstract":"Vehicular Ad-Hoc Network (VANET) [1] which is a sub-type of the mobile ad-hoc networks provides wireless communication between the vehicles and to the Road Side Units (RSU) [2]. In VANET, the communication between the vehicles is used for various purposes like safety, comfort and entertainment. We use the vehicles as the portable nodes to create the mobile network. The VANET uses all the vehicles in the nearby distance as a wireless router or node to form a network. The vehicles can dynamically come in or drop out of the network as they move. The working of the VANET depends on how the routing of data is done in the network. In the recent years, the number of accidents has been increased to a greater count. In order to eradicate this, the implementation of VANET technology is being used in various modes of transportation. Even though VANET has been proposed to be a successful network model, it has some issues to overcome. The most major issues are the connectivity and the signal fading issue. We can overcome some of the issues in VANET by using the Artificial Bee Colony Algorithm (ABC) [3]. The proposed use of the algorithm in VANET may resolve some of the issues effectively.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90931827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}