Version-2 (Sep-Oct 2015)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Reversible Data Hiding in Encrypted Images using Rhombus Method by RRBE |
Country | : | India |
Authors | : | Jewel Vincent Chittilappilly || Tressa Micheal |
Abstract: Nowadays the data security and data integrity are the two challenging areas for research. Usually, hiding data destroys the host image. However in RDH , if the embedded image is deemed authentic, we are able to reverse it to the precise copy of the initial image before the embedding occurred. Encryption is an effective and popular method to provide confidentiality for images. In the proposed method, the first step is to empty out room by embedding LSBs of some pixels into other pixels by a Rhombus method. Then encrypt the image, so that the positions of these LSBs in the encrypted image can be used to embed data. Later on, data is hidden and the entire image is again encrypted. This method ensures that extraction of data and recovery of image is free of any error.
[1] X. Zhang, "Reversible data hiding in encrypted image", IEEE Signal Process, vol. 18, no. 4, Apr 2011,pp. 255-778.
[2] Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, "A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification", IEEE Transactions on Information Forensics and Security, VOL. 8, NO. 7,July 2013.
[3] J. M. Barton, "Method and Apparatus for Embedding Authentication Information Within Digital Data", U.S. Patent 5 646 997, 1997.
[4] B. Macq, "Lossless multi resolution transform for image authenticating watermarking, in Proc. EUSIPCO", Sept. 2000, pp. 533536.
[5] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Reversible data hiding, in Proc. Int. Conf. Image Processing", vol. II, Sept. 2002, pp. 157160.
[6] S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression", IEEE Trans. Circuits Syst. Video Technol, vol. 17, no. 6, Jun 2007, pp.774-778.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Human and Environmental Impact Assessment of Common Cell Phone- A review |
Country | : | Nigeria |
Authors | : | P.E. Agbo || P.A. Nwofe || F.U. Nweke || S.I. Anyigor |
Abstract: In this study, the effect of common cell phones on humans and on the environment is investigated using open literature survey approach. Many definite risks are posed by radiation from wireless connection, cellular telephones and electronic devices. These risks appear to be minimal but are quite inimical in the long run. Also the unsustainable approach towards management of the discarded phone waste in developing nations is also highlighted. In this paper, radiations from' common phones are studied and the health effects of such radiations are also discussed. Possible recommendations to prevent the effect of these radiations - related health problems were also highlighted.
Keywords – Near-field radiations Cellular, specific absorption rate, radio frequency, unsustainable waste management
[1] O. Osibanjo, I.C. Nnorom, Material flows of mobile phones and accessories in Nigeria; Environmental implications and sound management options, Environmental imoact Assessment Review, 28, 2008, 198-213
[2] A. C., Kasper, G. B., Berselli, B. D., Freitas, J. A., Tenório, A. M., Bernardes, H. M. Veit, Printed wiring boards for mobile phones: characterization and recycling of copper. Waste management, 31(12), 2011, 2536-2545.
[3] B. Y., Wu, Y. C., Chan, A., Middendorf, X., Gu, H. W. Zhong, Assessment of toxicity potential of metallic elements in discarded electronics: a case study of mobile phones in China. Journal of Environmental Sciences, 20(11), 2008, 1403-1408.
[4] P.A., Nwofe, Waste Resources and Climate Change: Implications and Mitigation, International Journal of Science and Research, 3(9), 2014, 1602 – 1606
[5] P.A., Nwofe, Management and Disposal of Municipal Solid Wastes in Abakaliki Metropolis, Ebonyi State, Nigeria, International Journal of Scientific Research in Environmental Sciences, 3(3), 2015, 0107-0118
[6] P.A., Nwofe,. Waste Management and Environmental Sustainability: A case Study of Selected Cities in Ebonyi State, Continental Journal of Environmental Sciences, 7(1), 2013, 20 – 28.
[7] P.A., Nwofe, Comparative Analysis of Domestic Energy Use in Nigeria- A Review, Continental Journal of Renewable Energy, 4 (1), 2013, 7 – 17
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on DNA Based Cryptography using Differential Encryption and Decryption Algorithm |
Country | : | India |
Authors | : | Hariram S || Dhamodharan R |
Abstract: As modern encryption algorithms are bust to attacks, the world of information security give the impression of being in new directions to protect the data transmission. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new anticipation for unbreakable algorithms. Nowadays Government agencies and the semiconductor industries have raised serious concerns about malicious modifications to the integratedcircuits.The added functionality known as hardware Trojan. DNA cryptography is a new field of cryptography which gives a new hope to detect and overcome the Trojan. This paper gives an overview of cryptography, DNA cryptography and how it's helpful to rectify the Trojan effect.
Keywords: Trojan, DNA, DNA based cryptography, DNA digital coding
[1] Sourabh Chandra,SK Safikul alam,Smita Paisa,Dr.(prof).Goutam Sanyal, "A Comparison survey of symmetric and asymmetric
key cryptography",International conference on Electronics communication and computational Engineering(ICECCE)
[2] William stallings, "cryptography and network security principles and practise", 5th edition 2011
[3] searchsecurity.techtarget.com/definition/Digital-signature-standard
[4] Grasha Jacob,A.Murugan, "DNA based cryptography An overview & analysis", International Journal of emerging science 3(1),(36-
42) march 2013
[5] L.Adleman, "Molecular computation of solutions to combinational problems",science, JSTOR,vol.266,1994,pp -1025-1025.
[6] R.J.Lipton "Using DNA to solve NP-complete problems",science vol.268 pp.542-545,1995
[7] D.Boneh,C.Dunworth and R.Lipton, "Breaking DES using a molecular computer", In proceeding of DIMACS workshop on DNA
computing,1995,pp.37-65
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Annealing Effects and Film Thickness Dependence of Cobalt Selenide Thin Films Grown By the Chemical Bath Deposition Method |
Country | : | Nigeria |
Authors | : | R.A. Chikwenze || P.A. Nwofe || P.E. Agbo || D. A. Famuyibo || A.E. Umahi || S.O. Ngele || S.P.I. Ogah |
Abstract: Thin films of CoSe (cobalt selenide) were prepared using the chemical bath deposition technique. The deposition variables such as the pH, bath temperature, and source to substrate distance were kept constant and the film thickness was varied by varying the concentrations. The films were then annealed at annealing temperatures ≤ 250 oC. The films were characterised using scanning electron microscopy (SEM), energy dispersive x-ray spectroscopy (EDAX), and X-ray Diffractometry (XRD) to investigate the morphological, compositional and structural properties of the as-deposited and annealed layers. The results show that the post-deposition annealing improved the properties of the layers.
[1] K.S. Kumar, C. Manoharan, S. Dhanapandian, A Gowri Manohari, Effect of Sb dopant on the structural, optical and electrical properties of SnS thin films by spray pyrolysis technique, Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy, 115, 2013, 840-844.
[2] P.E. Agbo, F.U. Nweke, P.A. Nwofe, C.N. Ukwu, Effects of concentration on the properties of Zn-doped Cadmium Sulphide thin films, International Journal of Science and Research, 3(11), 2014, 1832 – 1837.
[3] S. Massaccesi, S. Sanchez, J. Vedel, Cathodic deposition of copper selenide films on tin oxide in sulfate solutions. Journal of The Electrochemical Society, 140(9), 1993, 2540-2546.
[4] P.A. Nwofe, pH Dependent Optical Properties of Chemically Deposited Sb2S3 Thin Films, Int. J. Nano.Chem., 1(3), 2015, 111-116.
[5] O. E. Ogah, K. R. Reddy, G. Zoppi, I. Forbes, R.W. Miles, Annealing studies and electrical properties of SnS-based solar cells. Thin Solid Films, 519(21), 2011, 7425-7428.
[6] P.E. Agbo, P.A. Nwofe, V. Anigbogu, Synthesis and Characterisation of Nanocrystalline ZnO-Core Shell Thin Films, J. Chem. Bio. Phy. Sci. Sec. C., 5(3), 2015, 2926 – 2929.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on SAR Reduction Methods Used For Mobile Application |
Country | : | India |
Authors | : | Dhanesh.P || Jayesh George. M || Anoop.B.K |
Abstract: This paper presents a study of different methods used for specific absorption rate (SAR) reduction and factors depending on the SAR value for mobile application. The presented studies provide useful information for future design of mobile handset antennas. The Size, position of the antenna, material used and some other parameters also decides SAR value. According to standardization regulation committee in different region SAR value should be maintained in any mobile phones. So that SAR value is a crucial point in antenna design.
Key terms: Specific Absorption Rate (SAR), Meta materials, SRRs, Compensation method.
[1] "Bandwidth, sar, and efficiency of internal mobile phone antennas" outi kivekäs, jani ollikainen, member, ieee, tuukka lehtiniemi, and pertti vainikainen, ieee transactions on electromagnetic compatibility, vol. 46, no. 1, february 2004.
[2] "The age-dependence of microwave dielectric parameters of biological tissues" mimoza ibrani, luan ahma and enver hamiti, intech.
[3] "Evaluation of sar reduction for mobile phones using RF shields" l.k. ragha, m.s. bhatia,2010 international journal of computer applications (0975 – 8887) volume 1 no. 3.
[4] Minseok jung, bomson lee, "evaluation of sar reduction for mobile communication hand sets", ieee aps, vol.1, pp 444-448, 2002.
[5] " Reduction of specific absorption rate (sar) in the human head with ferrite material and metamaterial " m. T. Islam,m. R. I. Faruque, progress in electromagnetics research c, vol. 9, 47–58, 2009.
[6] "Handset antennas and humans at ka-band:the importance of directional antennas" kang w. Kim and yahya rahmat-samii ieee transactions on antennas and propagation,vol.46,no.6june1998
[7] "SAR reduction in human head from mobile phone radiation using single negative meta- materials " m. B. Manapati and r. S. Kshetrimayum j. Of electromagn. Waves and appl., vol. 23, 1385–1395, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review on Recent Ternds and Developments in the Design and Application of Yagi Uda Antenna |
Country | : | India |
Authors | : | Hemjith M || Anoop Bk || Manoj Kc |
Abstract: The basic components of any communication system that act as connecting links between the transmitter and free space or free space and the receiver are called antennas .There are many type of antennas. Yagi Uda antenna is an important type of antenna.Yagi Uda antenna has many advantages over other conventional antennas and thus they have a wide range of applications. This paper gives a review about the recent trends and developments in the area of Yagi Uda antenna design ,simulation and development. Key terms: Antenna, Yagi Uda antenna, Simulation, Design
[1] S. S. Khade, Suvarna Talatule, S. L. Badjate,"Compact Planar Directive Yagi Antenna For WlanApplication" ,International Journal Of Electrical, Electronics And Data Communication, Issn (P): 2320-2084, Volume-1, Issue-2, April-2013 [2] B.-H. Sun, S.-G. Zhou, Y.-F. Wei, And Q.-Z. Liu "Modified Two-Element Yagi-Uda Antenna With Tunable Beams", Progress In Electromagnetics Research, Pier 100, 175{187, 2010
[3] Pavel V. Nikitin And K. V. S. Rao "Compact Yagi Antenna For Handheld Uhf Rfid Reader", Intermec Technologies, Everett, Wa 98203, Www.Intermec.Com [4] Vincent N. Omollo Dr. L. Kibet "High Bandwidth Yagi-Uda Antenna for Dedicated Short Range Communications",International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (3), 2015, 393-398 [5] Shun-Sheng Hsu, Cheng-Ying Hsu, "A 60-Ghz Millimeter-Wave Cpw-Fed Yagi Antenna Fabricated By Using 0.18-Μm Cmos Technology" IEEE Electron Device Letters, Vol. 29, No. 6, June 2008 625.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Vibration Analysis: A Literature Review |
Country | : | India |
Authors | : | Vishnu Kv || Anoop Bk || Adarsh Ks |
Abstract: This paper covers the basic idea behind the vibration analysis and uses that information to reduce failures and thus save resources. This paper gives an idea on why vibration monitoring is important, How vibration is described? and, How to measure these vibration?.The extend of vibration analysis depends on the purpose of carrying out vibration analysis. keywords: vibration , monitoring , analysis.
[1]. Beginners Guide to Machine Vibration, Commtest Instruments Ltd. [2]. Vibration Analysis: What does it mean? by Chuck Yung The Electrical Apparatus Service Association, Inc.(EASA). [3]. Introduction To Vibration Technology by Dennis H. Shreve Director of Marketing IRD Mechanalysis, Inc.Columbus, Ohio 43229 November 1994 [4]. Fundamentals of Vibration Measurement and Analysis Explained by Peter Brown [5]. Detailed Vibration Analysis of Pnion Gear with Time-Frequency Methods by Marianne Mosher, Anna H. Pryor, David G. Lewicki, National Aeronautics and space Administration, Ames Research Center ,2003. [6]. Review of Vibration Analysis Methods of Gear Box Diagnostics and Prognostics by Mitchell Lebold, Katherine McClintic, Robert Campbell, Carl Byington and Kenneth Maynard, Proceedings of the 54th Meeting of the Society for Machinery Failure Prevention Technology. Vol. 634. 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV |
Country | : | India |
Authors | : | Mrs. Nidhi Jain |
Abstract: Mobile Ad-hoc Networks are autonomously self-organized networks without infrastructure support. To provide communication within the network a routing protocol is used to discover routes between nodes. The main aim of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Routing in the MANETs is a challenging task which has led to development of many different routing protocols for MANETs. The recent years have witnessed a tremendous growth in the number of mobile internet users and the need for mobility support is indispensable for seamless internet connectivity.
[1]. Khaleel Ur Rahman Khan, Rafi U Zaman, A Venugopal Reddy. "A Hierarchical Approach of Integrating Mobile Ad Hoc Network and the Internet" 2008 IEEE.
[2]. Fekri M. Abduljalil and Shrikant K. Bodhe "A survey of integrating IP mobility protocols and mobile adhoc network" IEEE Communications Surveys & Tutorials, 2007. www.comsoc.org/pubs/surveys
[3]. Jonsson Fredrik Alriksson, Tonny Larsson, Johansson, Gerald Q. magurie Jr. "MIPMANET : mobile IP for Mobile ad hoc network" IEEE 2000
[4]. Harpreet Kaur Sandhu Roopali Garg, "Evaluation of routing protocols in the integrated MANET internet scenario" International Journal Of Advances In Computing And Information Technology. April 2012
[5]. Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade "Mobile Ad Hoc Networking: Imperatives and Challenges" IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobile AntNet Routing for Mobile Ad hoc Network |
Country | : | Nigeria |
Authors | : | Javeed Basha Haroon || Abdulkadir Ahmed || Olalekan Ogunbiyi |
Abstract: Routing in a Mobile Ad hoc Network (MANET) still pose great challenges which need to be addressed. Whenever a routing algorithm is developed, it should address the need of improving the quality of service (QoS) requirements, these requirements ranges from throughput, less overhead, packet loss, security etc. This paper focus on designing a nature inspired routing algorithm called the Mobile AntNet for Mobile Ad hoc network. Much of the previous implementations of this algorithm have been revolving around the fixed networks and improving the QoS for fixed networks.
[1] R. Bruno, M. Conti, and E. Gregori: Body, Personal and Local Ad Hoc Wireless Networks, The Handbook of AdHoc Wireless Networks, pp. 13-34, 2003
[2] K. Van Dam, S. Pitchers, and M. Barnard.: Body Area Networks: Towards a Wearable Future, Proc. Wireless World Research Forum, Munich, March 2001.
[3] K. Pahlavan and P. Krishnamurthy: Principles of Wireless Networks - A Unified Approach Prentice Hall, 2002.
[4] M. Conti and S. Giordano: Mobile Ad Hoc Networking, Cluster Computing Journal, Vol. 5, No. 2, April 2002
[5] T. G. Zimmerman: Personal Area Networks: Near-field intra body communication, IBM Systems Journal, 1996.
[6] G. Pei, M. Gerla, X. Hong, and C.-C. Chiang: A wireless hierarchical routing protocol with group mobility. In Proceedings of IEEE WCNC'99, Sep 1999
[7] Di Caro G. A., Dorigo M.: AntNet: Distributed Stigmergetic Control for Communications Networks, Journal of Artificial Intelligence Research (JAIR), Vol. 9, Pg. 317-365, 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Improvements of the Umts Systems for Messages Transfer |
Country | : | Sudan |
Authors | : | TarigShawgiAbdelrahman || Amin Babiker A. Mustafa || Ismail El-Azhary |
Abstract: This paper addresses the improvement of the Universal Mobile Telecommunication System (UMTS) performance in the transmission of short messages over Random Access Channel and dedicated channel. In addition to call origination and registration messages,Random Access Channel (RACH)can carry traffic including short message service packets. Throughput for message data transmission is evaluated as a function of the offered network load.
[1]. ManjuSarvagya and Ratnam V. Raja Kumar, "Performance analysis of the UMTS system for packet data transfer over dedicated channels,"
[2]. Ivan N Vukovic and TylerBrown,"Performance analysis of the Random Access channel in WCDMA" IEEE2001.
[3]. GPP TS 25.331 "Radio Resource Control Protocol Specifications," (Release 2004).
[4]. 3GPP TS 25.214 "Physical layer procedure," (FDD) (Release 2004).
[5]. Ivan N Vukovic. "Throughput Comparison of Random Access Schemes in 3GPP
[6]. Hideagi Takagi, Leonard Kleinrock, "Throughput Analysis for Persistent CSMA Systems", IEEE Transactions on communications, July 1985.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Sensor Networks for Structural Health Monitoring |
Country | : | India |
Authors | : | Jishna.S || Lekshmy.S || Jerrin Yomas |
Abstract: The use of different sensing technologies within the structural systems for monitoring their health is of increasing interest now-a-days. Wireless sensors and sensor networks are now considered as substitutes for traditional wired monitoring systems. The main advantage of wireless structural monitoring systems is that they are inexpensive to install because extensive wiring is not required between the data acquisition system and the sensors. Wireless sensors play an important role in the processing of structural response data. This paper presents a study on the existing wireless sensor networks that can be employed for monitoring the structural systems and also their hardware and software platforms.
Index terms: Sensing platform, Snowfort, Structural health monitoring, Wireless sensor networks
[1] Yizheng Liao, Mark Mollineaux, Richard Hsu, Rebekah Bartlett," SnowFort: An Open Source Wireless Sensor Network for Data Analytics in Infrastructure and Environmental Monitoring", IEEE Sensors Journal, vol. 14, no. 12, December 2014
[2] J. P. Lynch and K. J. Loh, "A summary review of wireless sensors and sensor networks for structural health monitoring," Shock Vibration Dig.,vol. 38, no. 2, pp. 91–128, Mar. 2006
[3] J. P. Lynch, K. H. Law, A. S. Kiremidjian, T. W. Kenny, and E. Carryer, "A wireless modular monitoring system for civil structures," in Proc. 20th Int. Modal Anal. Conf. (IMAC XX), pp. 1–6, 2002.
[4] A. Rowe et al., "Sensor Andrew: Large-scale campus-wide sensing and actuation," IBM J. Res. Develop., vol. 55, nos. 1–2, pp. 6:1–6:14, Jan./Mar. 2011.
[5] T. Nagayama and B. F. Spencer, Jr., "Structural health monitoring using smart sensors," Dept. Civil Environ. Eng., Univ. Illinois at Urbana-Champaign, Urbana, IL, USA, Tech. Rep. NSEL-001, 2007.
[6] H. Jo et al., "Hybrid wireless smart sensor network for full-scale structural health monitoring of a cable-stayed bridge," Proc. SPIE Smart Struct., vol. 7981, pp. 798105-1–798105-15, Apr. 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Micro-controller Based Touch Switch |
Country | : | Bangladesh |
Authors | : | Sairatun Nesa Soheli || Md. Saidur Rahman |
Abstract: This paper presents about the micro-controller based touch switch using micro-controller chip ATMega8 based on C language and the name of this program is AVR Studio. This proposed micro-controller based touch switch is a digital switch. This system is more reliable than others. Index Item: Introduction, Block Diagram, Circuit Diagram, Circuit Description.
[1]. http://www.atmel.com/devices/ATMEGA8. aspx
[2]. http://www.ijettjournal.org/volume-4/issue-4/IJETT-V4I4P346.pdf
[3]. http://www.digikey.com/en/articles/techzone/2013/ jul/microcontrollers-with-a-touch-sensing-interface
[4]. http://www.eeweb.com/blog/circuit_projects/touch-sensor-project-with-avr-microcontroller
[5]. https://intranet.ee.ic.ac.uk/t.clarke/ee2lab/handouts/ ARM/ARM_handout.pdf
[6]. http://www.circuitstoday.com/touch-switch-circuit-using-ne-555
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | ANALYSIS OF MULTIPATH FADING PROFILE PROVISION IN MULTIPLE ACCESS SYSTEM GRIDS |
Country | : | India |
Authors | : | Gayatri Mantri || A.Vamsidhar |
Abstract: Orthogonal frequency division multiple access (OFDMA) systems exploit multiuser diversity and frequency selectivity to achieve high spectral efficiencies. However, they require considerable feedback for scheduling and rate adaptation, and are sensitive to feedback delays. We develop a comprehensive analysis of the OFDMA system throughput as a function of the feedback scheme, frequency-domain scheduler, and discrete rate adaptation rule in the presence of feedback delays. Previous allocation methods have been iterative nonlinear methods suitable for offline optimization.
[1]. P. Y. Glorennec, "Fuzzy Q-learning and dynamical fuzzy Q-learning," in Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference, 1994, pp. 474-479 vol.1.
[2]. Y. Nagayuki, S. Ishii, and K. Doya, "Multi-agent reinforcement learning: an approach based on the other agent's internal model," in MultiAgent Systems, 2000. Proceedings. Fourth International Conference, 2000, pp. 215-221.
[3]. D. Manstretta, N. Laurenti, and R. Castello, "A Reconfigurable Narrow-Band MBOFDM UWB Receiver Architecture," Circuits and Systems II: Express Briefs, IEEE Transactions, vol. 55, pp. 324-328, 2008.
[4]. V. Shah, N. B. Mandayam, and D. J. Goodman, "Power Control for Wireless Data Based on Utility and Pricing," in Personal, Indoor and Mobile RadioCommunications, 1998. The Ninth IEEE International Symposium on, 1998, pp. 1427- 1432 vol.3.
[5]. H. Wymeersch, S. Marano, W. M. Gifford, and M. Z. Win, "A Machine Learning Approach to Ranging Error Mitigation for UWB Localization,"Communications, IEEE Transactions, vol. 60, pp. 1719-1728, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Likelihood of Intruder Detection in Uniform, Gaussian and Cohesive Network Distribution by Single and Multiple Sensing Models |
Country | : | India |
Authors | : | Ms. Samidha Davari || Prof. U. A Patil |
Abstract: This paper analyzes the problem of intrusion detection in a Uniform, Gaussian and cohesive distributed WSN bycharacterizing the detection probability with respect to the application requirements and the network parameters under both singlesensingdetection and multiple-sensing detection model. Effects of different network parameters and sensing range on the likelihood of intruder detectionareexamined. Furthermore, performance of the network cohesive distributed WSNs is compared with uniformly and Gaussian distributed WSNs. This work gives guidelines for likelihood of intruder detection in a wireless sensor network for selecting an appropriatedeployment strategy and determining network parameters.
Keywords: Gaussian distribution, intrusion detection, network deployment, uniform distribution, sensing range, wireless sensor Network
[1]. Yun Wang, Weihuang Fu, and Dharma P. Agrawal, Life Fellow, IEEEIEEETransactions on parallel and distributed systems, vol. 24, no. 2, february 2013
[2]. T. Wimalajeewa and S.K. Jayaweera, "Impact of Mobile Node Density on Detection Performance Measures in a Hybrid Sensor Network," IEEE Trans. Wireless Comm., vol. 9, no. 5, pp. 1760-1769, May 2010.
[3]. H. Kung and D. Vlah, "Efficient Location Tracking Using Sensor Networks," Proc. IEEE Wireless Comm. and Networking Conf., vol. 3,pp. 1954-1961, Mar. 2003
[4]. C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient In-Network Moving Object Tracking in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 1044-1056, Aug. 2006.
[5]. Chao, S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Design andAnalysis of Sensing Scheduling Algorithms under Partial Coveragefor Object Detection in Sensor Networks," IEEE Trans. Paralleland Distributed Systems, vol. 18, no. 3, pp. 334-350, Mar. 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimal Target Detection Using Coded Waveform Design |
Country | : | India |
Authors | : | Mohammed Moazzam Moinuddin |
Abstract: A novel design approach has been proposed to evaluate the detection ability of high range resolution radar(HRR) systems using poly-semantic sequences (PSS) in the presence of high additive noise. The PSS are optimized by employing Hamming Backtrack algorithm with figure of merit as the measure of goodness. The simulation results show that the proposed sequences give improved robustness of noise for HRR target detection.
Keywords: Hamming Backtrack Algorithm, High Range resolution Radar, Poly-Semantic Sequences, Optimal Binary Codes.
[1]. I.A. Pasha, N. Sudershan Rao, P. S. Moharir, "Poly-alphabetic Pulse Compression Radar Signal Design," Modeling, Measurement & Control, Journal of AMSE, vol.74, no.4, pp.57-64, 2001.
[2]. Y. Mallikarjuna Reddy , I. A. Pasha, S. Vathsal, "Poly-alphabetic radar signal processor for efficient target detection" International radar Symposium I -2007, Bangalore, pp. 30-34.
[3]. I. A. Pasha, P. S. Moharir & V. M. Pandharipande, " Poly-semantic binary pulse compression radar sequences", IEEE TENCON 2003, IEEE Technical conference on convergent technologies for the Asia-Pacific.
[4]. Moharir. P.S., RajaRajeswari. K. and VenkataRao. K., "New figures of merit for pulse compression sequences", Journal of IETE, vol. 38, no. 4, pp. 209-216, 1992.
[5]. RajaRajeswari.K.et.al. "New figures of merit for range resolution radar using hamming and euclidean distance concepts" Proceedings of the 7th WSEAS International Conference on Multimedia Systems & Signal Processing, Hangzhou, China, April 15-17, 2007 pp.-139-145, 2007..