Loading [MathJax]/extensions/MathZoom.js
2009 International Conference on Control, Automation, Communication and Energy Conservation - Conference Table of Contents | IEEE Xplore
International Conference on Control, Automation, Communication and Energy Conservation, INCACEC

2009 International Conference on Control, Automation, Communication and Energy Conservation

4-6 June 2009

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Control, Automation, Communication, and Energy Conservation (INCASEC), 2009 International Conference on

This paper presents SSP ( Sleep Scheduling Protocol), a centralized scheme for extending the lifetime of densely deployed wireless sensor networks by keeping only a necessary set of sensor nodes active. We present an algorithm for finding out which nodes should be put into sleep mode, and the algorithm preserves coverage and connectivity while trying to put as much nodes as possible into sleep mod...Show More
Mobile ad hoc network consists of collection of wireless mobile nodes dynamically forming a network without the use of any existing network infrastructure. Each node act as both host and router and communicate with other if they are within the radio range. The dynamic topology of wireless mobile ad hoc networks make routing is challenging one. Routing protocols for mobile ad hoc networks (MANETs) ...Show More
This paper presents design, simulation, fabrication and testing of compact planar antenna for short range and low power applications. It was designed to the center frequency of 867.5 MHz with the bandwidth of 5 MHz unlicensed ISM band. The planar εr = 4.3 Glass epoxy was selected and designed for ISM band specifications. It was simulated using ADS 2002C which is a widely used RF and Microwave comp...Show More
The Beam steering controller plays a vital role in steering the antenna beam of active phased array radars where beams are formed electronically. The Transmit / Receive Modules (T/R Modules) are key parts of advanced phased array radar systems. In order to produce beam pattern from multiple radiating elements, the phase angle of each T/R Module must be assigned with a calculated value. When Common...Show More
Multicasting is a scalable solution for group communication. In order to offer forward and backward secrecy for multicast applications, the data encryption key (DEK) has to be changed whenever a user joins or leaves the system. Such a change has to be made known to all the current users. The re-keying cost of such re-key messaging can be high when the user pool is large. In this paper we propose a...Show More
Most ad hoc mobile devices today operate on batteries. Hence, power consumption becomes an important issue. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node must be evenly distributed, and the overall transmission power for each connection request must be minimized. These two objectives cannot be satisfied simultaneously by employing routing algorithms pr...Show More
In this paper, a design and analysis of compact coplanar waveguide (CPW) fed ultra wideband (UWB) slot antenna is presented. The proposed antenna has simple structure consisting of rectangular slot, triangular structure on a rectangular patch act as a tuning stub of the antenna, placed at the anterior portion of the feed. The overall dimension of the antenna comes around 28 mm times 21 mm times 1....Show More
In the last decade of computer security, using biometrics for various types of security problems has become more and more popular. The uniqueness of biometrics for any specific human being makes the identification system more secure. Biometrics is widely used in person identification and verification. Biometrics as such poses few security risks. Combining cryptography with biometrics is a new rese...Show More
Sensor networks consist of large number of distributed nodes, which have ad hoc topology and high traffic rates. Since the traffic offered in the network is highly dynamic and sensor devices are battery operated, the medium access control (MAC) protocol designed for the network must be stable and should consume less energy. Conventional non-persistent carrier sense multiple access (CSMA) based MAC...Show More
Power management is the key issue in the design and operation of wireless network applications like sensor networks, pervasive computing and ubiquitous computing where the network is primarily driven by battery-powered embedded devices. This paper studies network coding as power minimization technique. Network coding is a new research area that may have interesting applications in practical networ...Show More
A novel design of an ultra-wideband (UWB) slot antenna is presented. This antenna operates as a transmitter and receiver antenna. Effects of the antenna dimensional parameters are studied through experimental and simulation results. The design procedures are developed and verified for UWB frequency band. Antenna gain and directivity at bore sight and in their maximum states are close to each other...Show More
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guessed or obtained through brute force attacks. This is a weak link in the overall encryption system and can potentially compromise the integrity of sensitive data. Combining biometrics with cryptography is seen as a possible...Show More
This paper presents a novel chaotic spreading sequence for multiple input multiple output multi-carrier direct sequence code division multiple access (MIMO MC-DS/CDMA) systems. The effect of multiple access interference can be mitigated by choosing the spreading sequences with appropriate cross-correlation properties. The performance of the system is analysed in multiuser scenario with the aid of ...Show More
Device placement is a fundamental factor in determining the coverage, and connectivity, cost and lifetime of a Wireless Sensor Network (WSN). In this project, explore the Problem of relay node placement in heterogeneous WSNs. formulate a Generalized node placement optimization problem aimed at minimizing the network Cost with constraints on lifetime and connectivity. Depending on the constraints, ...Show More
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data f...Show More
In this paper an adaptive decision based robust statistics estimation filter to remove high density impulse noise is presented. The proposed algorithm detects the corrupted pixel at the initial stage and replaces them with an estimated image data using the proposed robust estimation algorithm. The new robust statistics based filter shows significantly better image quality than standard median filt...Show More
Routing, the act of moving information across an Internet work from a source to a destination is one of the major issues in computer network literature. When it comes to mobile ad hoc network, the complexity increases due to various characteristics like dynamic topology, absence of centralized authority, time varying QoS requirements etc. The biggest challenge in this kind of networks is to find a...Show More
Energy conservation is a critical issue regarding wireless mobile ad hoc networks, since the nodes are battery restrained and the depletion of their power defines the lifetime of the network. This paper presents the PAST-EnDRoP: Position Aided Spatial TDMA (PA-STDMA) MAC protocol with Energy and Delay Constrained Routing for mobile ad hoc networks. It is a novel approach designed for optimized cha...Show More
Efficient channel allocation to mobile hosts is of utmost importance in a cellular network. A genetic algorithm (GA) and Particle Swam Optimization (PSO) are very good optimization techniquesl in solving optimization problems, is explored to design a fault - tolerant cellular channel allocation model that allows a cell to continue communicating withits mobile hosts, even if there are insufficient ...Show More
IEEE 1500 is a standard under development which intends to improve ease of test reuse and test integration with respect to the core-based SoCs. The subject paper proposes developing test environment and test methodologies for digital embedded cores based system-on-a-chip (SoC). The digital cores used in the study were constructed from ISCAS 85 combinational and ISCAS 89 sequential benchmark circui...Show More
We propose a new normalization procedure, which is invariant to affine transform attacks .The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. , we employ watermarking scheme as a direct-sequence code division multiple access approach to embed multibit text information in DCT and DWT transform domain...Show More
A novel scheme, ldquoWBTC (wavelet block tree coder) algorithmrdquo that allows a substantial reduction in the storage size of an image is proposed in this work. The coding algorithm is based on the spatial orientation tree (SOT). The major feature of this WBTC algorithm is that it fuses both zero-tree and zero-block algorithm. The key feature of wavelet decomposition is its energy clustering prop...Show More
The low feedback link adaptation technique based on MIESM(Mutual Information based exponential SNR Mapping) has been extensively used in the literature for 802.16 based systems. The previous work on MIESM uses equal modulation order for all the subcarriers in an ofdm block. We have proposed the concept of unequal modulation for the subcarriers in the single ofdm block, and derived a mathematical m...Show More
CAC (Call Admission Control) scheme effectively regulates the traffic load of a network such that uninterrupted service is offered to every admitted user without over penalizing the new admission requests. It incorporates the call-arrival rates, the user mobility across the network and guarantees of the user's quality of service. This task can be accomplished by properly managing the available net...Show More
JPEG 2000 is one of the most rewarding image coding standards. A set of practical features are provided which are not available in the previous standards. The features were realized using two new techniques namely the discrete wavelet transform (DWT), and embedded block coding with optimized truncation (EBCOT). The complexity of EBCOT Tier-1 makes its hardware implementations very difficult. In th...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Control, Automation, Communication, and Energy Conservation (INCASEC), 2009 International Conference on