By Topic

Radar, Communication and Computing (ICRCC), 2012 International Conference on

Date 21-22 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 83
  • [Front cover]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1838 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (294 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): iii
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Advisory committee

    Publication Year: 2012, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Organising committee

    Publication Year: 2012, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Sub-committees

    Publication Year: 2012, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s):xi - xiv
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • BER performance improvement for secure wireless communication systems based on CSK- STBC techniques

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing VoIP networks via signaling protocol layer

    Publication Year: 2012, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. Since SIP is the predominant protocol used for signaling to create, manage, monitor and tear down the VOIP sessions, this paper will focus on building a strong defense system around the signaling protocol layer. In this paper, we examine and investigate the concerns and requirements of VoIP security. After a detail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Huddle based tenable data communication in wireless mesh networks

    Publication Year: 2012, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Wireless mesh networks (WMNs) can be sequenced by itself and adapt themselves to the nodes in the network in order to maintain the default mesh connectivity. WMN compromises of mesh router which is the backbone of the mesh network and mesh client gives access for both mesh and conventional networks. Transaction of data between wireless mesh node results in privacy transgresses. We propose privacy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and development of a health monitoring systems based on mobile node

    Publication Year: 2012, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    We propose to design and develop awireless based continuous health monitoring system for old age people and kindergarten children. The vital parameters such as body temperature, heart pulse rate data is transmitted and monitored through wireless sensor network(WSN). WSN consists of a large number of low-cost, low-power, multifunctional sensor nodes to monitor physical conditions, such as temperatu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient position based routing protocol for mobile ad hoc networks

    Publication Year: 2012, Page(s):18 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    A MANET is a collection of mobile nodes communicating and cooperating with each other to route a packet from the source to their destinations. A MANET is proposed to support dynamic routing strategies in absence of wired infrastructure and centralized administration. In such networks, limited power in mobile nodes is a big challenge. So energy efficient techniques should be implemented with existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-sensor data fusion in cognitive radio from its perspective

    Publication Year: 2012, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    In recent days, the intelligent transportation system (ITS) become one of the major thrust areas in the field of electronics and communication engineering. Here an architecture of multi-channel cognitive radio (CR) has been proposed to encounter the challenges in ITS. Spectrum sensing, decision and data fusion are the three major activities performed by the CR. A novel model, using dynamic Bayesia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A double layered additive space sequenced Audio Steganography Technique for mobile network

    Publication Year: 2012, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    This paper presents a double layered secure data transfer technique using Cryptography and Audio Steganography for mobile network. Firstly, the characters of secret text message are converted to bit values and are encrypted by XOR operation using a Symmetric key. Then using a secret key-box, it is again scrambled and then divided into 2bit blocks. These blocks from MSB are replaced by the Left Sig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to packet combining in cooperative relay network using soft bit maximal ratio combining technique

    Publication Year: 2012, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Relays can be classified into digital and analog relays. Analog relays amplify and-forward (AF) the received signal without any decoding while digital relays fully decode and forward (DF) a regenerated version of the received signal. Here we are using digital relays as it is the focus of most of the next generation wireless networks standards such as IEEE 802.16j/m [2] and LTE-Advanced. The single... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contemporary and efficient shared area network in Peer-to-Peer Communication

    Publication Year: 2012, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    This paper proposes Peer-to-Peer (P2P) Communication to share the resources in fast manner with the help of large area communication between the nodes in the network. The big size and good stability properties of P2P files in network give rise to the use of highly effective capacity planning and topology matching techniques as a promising solution to manage P2P communications in shared area networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nanocommunication using QCA: A data path selector cum router for efficient channel utilization

    Publication Year: 2012, Page(s):43 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    Quantum-Dot Cellular Automata (QCA) is being considered by researchers as a possible alternative to Complementary Metal Oxide Semiconductor (CMOS) technology for implementing digital circuits. With the decrease of feature size in CMOS integrated circuits, problems like quantum effects arise. QCA is developed on the basis of these quantum phenomena that rise due to interaction of electrons within q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User centric framework of power schemes for minimizing energy consumption by computer systems

    Publication Year: 2012, Page(s):48 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Recently, a lot of work has been carried out on the subject of “Green Computing”, which represents an environmentally responsible way for reducing the energy consumption, and also addresses the various environmental related issues, like waste management, greenhouse gases, and so on. Green computing which is also known as sustainable computing also represents the sustainable architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agriculture change detection model using remote sensing images and GIS: Study area Vellore

    Publication Year: 2012, Page(s):54 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    Changes in the vegetation of any geographic area is seen constantly. In order to ensure the preservation of these agricultural characteristics, the changes are detected to build knowledge base. This research aims at calculating the agricultural changes near Vellore district using LANDSAT and images taken from 2003-2009. SVM classification is the method used for obtaining the results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Land use identification model by using remote sensing images

    Publication Year: 2012, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    The land cover of a certain geographical region keeps on changing with time. So it is essential to keep a track of the changes occurring there for development purposes. This research aims at calculating the land cover changes near Vellore district using LANDSAT images taken from 2003-2009. Image processing techniques are applied for getting the results like K means clustering and L*a*b color segme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis on data aggregation in Wireless Sensor Networks

    Publication Year: 2012, Page(s):62 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Wireless Sensor network has emerged as a promising technique that revolutionizes the way of sensing information. Dense deployed sensor nodes at a specific region are likely to transfer redundant data to the base station. This increase the communicational overhead and affects network lifetime. Since energy conservation is the key issue in WSNs, data aggregation should be incorporated in order to sa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion adaptive multipath routing protocol for multi-radio Wireless Mesh Networks

    Publication Year: 2012, Page(s):72 - 76
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    In this paper, we propose congestion-aware multipath routing protocol called MAOMDV-LB for multi-radio Wireless Mesh Networks (WMN's). The protocol calculates the occurrence of congestion by monitoring and reporting average queue utilization thresholds of multiple interfaces as QoS parameter and uses multiple paths to balance the load during the periods of congestion to improve quality of service.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.