Loading [MathJax]/extensions/MathMenu.js
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN) - Conference Table of Contents | IEEE Xplore

International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN)

2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)

DOI: 10.1109/ICE-CCN30406.2013

25-26 March 2013
Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In t...Show More
Video is ever increasingly stimulating in electronics and multimedia applications such as video - telephony, video conferencing and video streaming to mobile phones via internet, in order to use effectively, the video is often compressed for low memory and fast transfer of video and then decompressed for use, so currently video compression a very active research topic, the compression is achieved ...Show More
A Dedicated Memory Controller is of prime importance in applications that do not contain microprocessors (high-end applications). The Memory Controller provides command signals for memory refresh, read and write operation and initialization of SDRAM. Our work will focus on ASIC Design methodology of Double Data Rate (DDR) SDRAM Controller that is located between the DDR SDRAM and Bus Master. The C...Show More
In this paper, a service-oriented reliability model that calculates the reliability of composite web services is designed. This model is based on the real-time reliabilities of the atomic web services of the composition. This manuscript contradicts the fact that the reliability of system is based on the exponential function of error arrival rate. The Reliability rate of composite web services is i...Show More
The following samples of lead free samples (1-x)[Ba0.92Zr0.08TiO3]-(x)[Ba0.92Ca0.08TiO3]. (x=0,0.25,0.5,0.75,1) abbreviated as BZT-BCT were prepared in laboratory by solid state reaction process. The samples were prepared keeping in mind their applications in actuators, sensors. The samples were then tested for their dielectric, piezoelectric, pyroelectric properties and dc resistivity. Each sampl...Show More
Recently digital signal processing has received high attention due to the advancement in multimedia and wireless communication. Accordingly Orthogonal Frequency Division Multiple Access (OFDM) technique based on Time Division Duplex (TDD) is an attractive technology for high data rate wireless access in multichannel communication. The modulation and demodulation of OFDM are done by Fast Fourier Tr...Show More
In this paper theoretical concepts based on analytical models for Single Electron Transistor (SET) are presented. It has been observed that the fabrication technology has reached on its limits for the MOS feature size, beyond which further scaling of the channel is not achievable. Due to which SET is considered as the future of the complex IC fabrication by replacing MOS technology, having small q...Show More
This paper attempts to show the effects of pre-processing in bit error rate of neural network interference cancellation in spread spectrum receivers. Multiple access interference (MAI) which is one of the primary issues in CDMA multiuser detection is combated by interference cancellers. Feed-Forward Neural Networks with back propagation is used for interference cancellers. The works shows that pre...Show More
Nano-size suspended particles in atmosphere like marine salt, volcanic dust, biological debris, soot and industrial dust are collectively called aerosols, which have intense effect on the extinction of solar and terrestrial radiation. The radiation extinguishing property is quantified in terms of optical depth, a key parameter for aerosol size estimation through remote sensing. The present work st...Show More
Interpolation and Decimation is very effective and popular in multirate signal processing applications. This paper proposes a high speed, area and power efficient VLSI architecture for polyphase decimation filter with decimation factor of three (D=3) using BFD (Bypass Feed Direct) multiplier. Various key performance metrics such as number of slices, maximum operating frequency, number of LUT's, in...Show More
Miniaturization of devices has brought a lot of improvements in the healthcare delivery as a result of advancenments in Integrated circuit technologies. As a result, proper and effective way of analyzing various body conditions and diseases can be achieved. When the heart muscles repolarize and depolarize, it generates electrical impulses which could help the doctor or the health professional to d...Show More
Internet users in the current digital age are increasingly using world wide web not only for entertainment but also for accessing information related to different topics. Our system aims at developing a web based environment that brings most of the information required by a user at one place. When a user searches a topic on the web, a lot of results are shown to the user which may or may not be re...Show More
Providing an efficient, robust and low overhead unicast path from source node to destination node in MANETs is a critical issue due to frequent changes in the network topology and mobility of the nodes (which cause frequent break down in radio links). Hence it is necessary to check the node stability with respect to the node mobility during path establishment. This paper proposes a method to find ...Show More
By the arrival of latest video standards viz. MPEG-4 part 10 and H.264/H.26L, the usages of Advanced Video Coding (AVC) especially in the part of Variable Block Size (VBS) Motion Estimation (ME) are rising. A new architecture is developed for variable block size motion estimation using full search algorithm in this paper. There are two calculations carried out in this paper block size, which is va...Show More
A 3×5 planar array of dipoles is analyzed taking mutual coupling into account. Multi-objective fitness function considering the Directivity (D), Half Power Beam Width (HPBW) and Front to Side Lobe Level (FSLL) of the antenna is examined and the Particle Swarm Optimization (PSO) algorithm is employed to optimize the planar array using the obtained fitness value. The array is simulated with self dev...Show More
Most existing fusion techniques such as Principal Component Analysis (PCA), Intensity-Hue-Saturation (IHS), Wavelet Transform (WT) yields color distortion in other words it is also known as spectral distortion problem. When the high resolution panchromatic image unite with low resolution multispectral image results in fused image of high spatial resolution multispectral image. The above said fusio...Show More
It is well known that Genetic Algorithm (GA) uses large number of solutions, instead of a single solution for searching. This brings an important part to the robustness of genetic algorithms. It improves the chance of reaching the global optimum and nearly unbiased optimization techniques for sampling a large solution space. GA adapted in image processing because of this unbiased stochastic sampli...Show More
The robust tracking system for aerial surveillance is one of the important challenge in computer vision due to its large uncertainty. We tackle this problem by providing an approach for automatic vehicle detection and tracking for aerial surveillance. The proposed system includes feature extraction, color transformation, Dynamic Bayesian Network (DBN) and post processing. Support Vector machine is...Show More
Handwritten Tamil character recognition is one of the active areas in research. Due to high variability of writing styles, developing handwritten character recognition system is a big challenge. The concept proposed gives a way to perform classification of handwritten ancient scripts in Tamil, which is one of the oldest languages in India. The approach utilizes Extreme Learning Machine for classif...Show More
In this paper, we introduce new method to segment the moving regions from compressed video by incorporating more features from different previous segmentation methods. Briefly, our method proceeds as follows. First we classify the macroblocks of the compressed video frames into different classes and we perform Global Motion Estimation and Global motion Compensation techniques to remove the influen...Show More
The performance of 25nm Symmetric Extended Source/Drain Schottky Tunneling Transistor (ESD-ST-SOIFET) with different gate structures are investigated through a TCAD modeling study. It is shown that, the doped extension regions adjacent to the source/drain schottky barrier improves the drive current by shrinking the schottky barrier and also the simulation results shows that the increasing doping l...Show More

Mitigation of jamming attacks in wireless networks

R. Dorus;P. Vinoth

Publication Year: 2013,Page(s):168 - 171
Cited by: Papers (1)
Wireless networks, intentional interference can be used as a launch pad for mounting Denial-of-Service in the network. Intentional interference (jamming) attacks can be performed by absorption of packets and discard them or drop the packets. Intrusion Detection System can be used to mitigate and prevent the jamming attack and the addition of cryptographic primitive used to preserve integrity of th...Show More
With the ever increasing growth of services and the corresponding demand for Quality of Service requirements that are placed on IP-based networks, the essential aspects network planning will be critical in the coming years. A wide number of problems must be faced in order for the next generation IP networks to meet their expected performance. One of the best solutions for meeting the Next Generati...Show More
This paper presents the detection of architectural distortion a common classification of cancer, using countourlet transform and the phase portrait methods. The architectural distortion is a very important finding in interpreting breast cancers as well as microcalcification and mass on mammograms. However, it is more difficult for physicians to detect architectural distortion than microcalcificati...Show More
One of the main objective of wireless sensor network is to forward the events to the destination in a fast and reliable manner. There are several methods are existing for packet forwarding. Some researchers use single node to forward event packet and some researchers use all nodes (nodes in event region) to forward event packet. In this paper we proposing a technique named as Reliable Event Transm...Show More