By Topic

Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on

Date 14-15 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 59
  • Front cover

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | PDF file iconPDF (34 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2011 , Page(s): 1 - 4
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (47 KB)  

    The following topics are dealt with: video signal processing; traffic engineering computing; field programmable gate array; medical computing; MANET; computer network security; image processing; remote sensing; cryptography; signal processing; multipliers; cloud computing; wireless sensor network; and natural language processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network based approach for MPEG video traffic prediction

    Publication Year: 2011 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1182 KB)  

    In the near future, video is going to be the major Internet traffic and the most popular standard used to transport and view video is MPEG. The MPEG traffic is VBR (variable bit rate) traffic & in the form of a time-series representing frame/VOP (video object planes) sizes. Video traffic prediction and modeling is important in enhancing the reliable operation over these networks. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Wormhole attacks in Wireless Sensor Network

    Publication Year: 2011 , Page(s): 7 - 14
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (639 KB)  

    The Wireless Sensor Networks are typically deployed in ubiquitous and pervasive applications that make them susceptible to various forms of security attacks. In addition, the limited battery, processing and memory powered sensor nodes make it difficult to devise the security protocols that are inherently resource intensive. One of the potent forms of attacks is the Wormhole attacks a Denial of Ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA realization of spectrum sensing based on Bayesian framework for cognitive radio network

    Publication Year: 2011 , Page(s): 15 - 19
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1140 KB)  

    In this paper, spectrum sensing is based on Energy detection in the frequency domain with Bayesian criterion. The sensing performance is analyzed using Monte-Carlo methods. In practice, the performance of the single node degrades due to noise effects in the channel such as fading, shadowing, and the receiver uncertainty. So, we have mitigated these effects using cooperative sensing and compare the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eigen values and vectors computations on Virtex-5 FPGA platform cyclic Jacobi's Algorithm using systolic array architecture

    Publication Year: 2011 , Page(s): 20 - 24
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (998 KB)  

    The parallel iterative algorithms are the major advancements in the field of computing. These algorithms lead to efficient usage of hardware as well as obtaining faster results. In this paper, we describe architecture to compute eigen values and eigen vectors of a matrix having dimensions up to 50 × 50 using cyclic Jacobi's Algorithm. Systolic array architecture is used to apply it to matri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 16nm SRAM design for low power and high read stability

    Publication Year: 2011 , Page(s): 25 - 31
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1003 KB)  

    SRAM memory design in nanoscale regime has become increasingly challenging due to the reducing noise margins and increased sensitivity to threshold voltage variations. To overcome these challenges, different memory cells have been proposed for SRAMs with different transistor structures. These designs improve the cell stability in the subthreshold regime but suffer from bitline leakage noise, placi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new technique to solve minimum spanning tree (MST) problem using Modified Shuffled Frog-Leaping Algorithm (MSFLA) with GA cross-over

    Publication Year: 2011 , Page(s): 32 - 35
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (120 KB)  

    A minimum spanning tree (MST) of a connected, weighted (non-negative), undirected graph G = (V,E) is such that vertices of the graph G is connected by edges which have minimum weight and it forms a tree. Finding the MST from a graph is a NP-hard problem. In this paper a new technique is proposed to solve MST problem using Modified Shuffled Frog- Leaping Algorithm (MSFLA) with Genetic Algorithm (GA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigation of voltage sags and voltage swells by Dynamic Voltage Restorer

    Publication Year: 2011 , Page(s): 36 - 40
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1388 KB)  

    Modern industrial processes are based on a large amount of electronic devices such as programmable logic controllers and adjustable speed drives. Unfortunately, electronic devices are sensitive to disturbances, and thus, industrial loads become less tolerant to power quality problems such as voltage sags, voltage swells, and harmonics. The dynamic voltage restorer (DVR) has become popular as a cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • De-noising of EEG signals using Bayes Shrink based on Coiflet Transform

    Publication Year: 2011 , Page(s): 41 - 46
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (712 KB)  

    The Electroencephalogram (EEG) is a biological signal that represents the electrical activity of the brain. However, the presence of artifacts like Electro-oculogram (EOG), Electrocardiogram (ECG), Electromyogram (EMG) and power-line noise in the EEG signal is a major problem in the study of brain potentials. Hence, these superfluous signals are needed to be removed. There are various methods for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of coded- OFDM with ICI due to frequency offset

    Publication Year: 2011 , Page(s): 47 - 50
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (832 KB)  

    In wireless communication, parallel transmission of symbols using multi carriers is applied to achieve high efficiency in terms of throughput and better transmission quality. Orthogonal Frequency Division Multiplexing (OFDM) is one of the techniques for parallel transmission, hi multipath environment the performance of orthogonal frequency division multiplexing (OFDM) is improved by introducing so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of carbon nanotube based device and interconnect using Verilog-AMS

    Publication Year: 2011 , Page(s): 51 - 55
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1199 KB)  

    As the scaling of Si MOSFET approaches its limit, new alternatives are being explored to overcome these limitations. Carbon nanotube field-effect transistor (CNTFET) and carbon nanotube (CNT) interconnects are the most promising candidates for post-silicon era of integrated circuits. This paper deals with the circuit- compatible modeling of ambipolar CNTFET which demonstrates p-type or n-type swit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast Routing in MANET using Multiple reliable Rings backbone

    Publication Year: 2011 , Page(s): 56 - 61
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (569 KB)  

    In this paper, we propose Multicast Routing scheme in MANET using Multiple relaible Rings backbone (MRMR) that constructs the boundary of MANET with the help of a convex hull algorithm. Multiple rings are constructed at an appropriate distance between the centroid of convex hull and the boundary. Mesh of multicast routes are established by a path that comprises of following segments: a source and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure scan design with Isomorphic registers

    Publication Year: 2011 , Page(s): 62 - 66
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (808 KB)  

    In this paper, we first introduce Isomorphic Redundancy concept. Two functionally equivalent shift registers can be Isomorphic to each other. They can be equivalent to each other by simple permutation of states m state tables. Two Isomorphically redundant circuits can be used to prevent two bit change insertion attack. In, addition we also propose a new model with the help of functionally equivale... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible masking: A novel fault-diagnosed

    Publication Year: 2011 , Page(s): 67 - 71
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (692 KB)  

    This paper suggests a novel design of reversible masking circuit for Quantum Cryptography. Quantum computation uses quantum properties to represent data and perform reversible operations on data. In this paper, we proposed to design a reversible masking logic and implement the masking logic using basic quantum gates. The masking expression is thus transformed into a Positive Polarity Reed Muller E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DEEPAV2: A DNS monitor tool for prevention of public IP DNS rebinding attack

    Publication Year: 2011 , Page(s): 72 - 77
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (402 KB)  

    Domain Name Systems (DNS) play a vital role in the proper functioning of the internet Almost all internet applications rely on DNS for the name resolutions. The existing DNS infrastructure has a number of security vulnerabilities and it is prone to attacks such as DNS Cache Poisoning attack, DNS Rebinding attack. Flooding attack, etc. If a DNS server is compromised, it affects all the users of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized architecture for trace transform based CBIR system

    Publication Year: 2011 , Page(s): 78 - 85
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1175 KB)  

    The rapid growth of internet technology combined with affordable storage capabilities has lead to many challenges for efficient retrieval of information especially images for real time applications. One way of supplementing the software approaches is to provide hardware support to the system architecture. We propose an algorithm and architecture to implement trace transform based CBIR system. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced low power interconnect signaling schemes

    Publication Year: 2011 , Page(s): 86 - 90
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (839 KB)  

    In this paper a number of low-swing on-chip interconnect schemes will be reviewed and their effectiveness and limitations will be analysed, especially on power dissipation, delay and area. This paper describes the design of interconnect scheme (mj- lc) and (mj-c) for driving signals on the global interconnect lines. The proposed signaling schemes is implemented on 1.0 V 0.13 μ m CMOS techno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal implementation of digital steganography in an true color images for the secrete communication

    Publication Year: 2011 , Page(s): 91 - 95
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (800 KB)  

    A Real life requirement motivated this case study for secure the digital communication. Hiding data with security is the highly challenging and desirable task. The purpose of this research work is to develop a secure and optimal data hiding technique in 24 bit hue color image .My proposed method is flexible on size of secret message bits and allows us to embed a large amount of secret messages as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computations of electromagnetic forces and fields in Double Sided Linear Induction Motor (DLIM) using Finite Element Method

    Publication Year: 2011 , Page(s): 96 - 100
    Cited by:  Papers (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1067 KB)  

    This paper aims to present the material aspects of Linear Motion Induction Motor. The Electromagnetic Characteristics of Linear Induction Motor (LIM) are more complex than other rotating type induction motors[1]. It is very significant to evaluate Magnetic Field parameters for the design of an optimized model for various applications. In this present work. Double Sided Linear Induction Motor (DLIM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time car theft decline system using ARM processor

    Publication Year: 2011 , Page(s): 101 - 105
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (889 KB)  

    Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibilities for taking steps to ensure the authorization for the owners and also inbuilt the anti theft system to prevent the car from theft. The existing system was. Car alarm techniques are used to prevent the car theft with the help of different type ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PIFA with improved characteristic for wireless communication

    Publication Year: 2011 , Page(s): 106 - 111
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1349 KB)  

    In this paper, a Planar Inverter F antenna with improved characteristics has been presented. Planar Inverted F Antenna (PIFA) is used for wireless communication mainly in mobile communication. The PIFA generally have low efficiency, gain and bandwidth when mounted on normal conductive ground plane but when it is placed on defective ground structure (periodically spaced holes on ground plane), it m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topology scalability and routing in homogeneous and heterogeneous access networks

    Publication Year: 2011 , Page(s): 112 - 116
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (248 KB)  

    The growth in the different technologies has made us to think of integrating them, for more flexibility, efficiency, user convenient usage and still more to list. Technologies are evolving towards broadband information access across multiple networking platforms in order to provide continuous connection of multimedia services and applications. In such technologies the heterogeneous networks access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting object in the dynamic background from the noisy image in visual surveillance

    Publication Year: 2011 , Page(s): 117 - 121
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (624 KB)  

    Detecting an object from a dynamic background is a challenging process m computer vision and pattern matching research. The proposed algorithm identifies moving objects from the sequence of video frames which contains dynamically changing backgrounds in the noisy environment. In connection with our previous work, here we have proposed a methodology to perform background subtraction and modernized ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and ASIC implementation of 2-D DWT IDWT

    Publication Year: 2011 , Page(s): 122 - 127
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1138 KB)  

    In this paper, high-efficient lifting-based architectures for the 5/3 discrete wavelet transform (DWT) are proposed. Filter coefficients of the biorthogonal 5/3 wavelet low-pass filter are quantized before implementation in the high-speed computation hardware. In the proposed architecture, all multiplications are performed using less shifts and additions. The digital signal represented in time-sca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.