Band Identifying Methods as well as Problems in CR Network
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.310-314, Sep-2015
Abstract
In present day communication wireless communication has become the most popular communication. Because of this growing demand on wireless applications has put a lot of constraints on the available radio band which is limited and precious. In fixed band assignments there are many frequencies that are not being properly used. So cognitive radio helps us to use these unused frequency bands which are also called as “White Spaces”. This is a unique approach to improve utilization of radio electromagnetic band. In establishing the cognitive radio there are 4 important methods. In this paper we are going to discuss about the first and most important method to implement cognitive radio i.e., “band sensing”. The challenges, issues and techniques that are involved in band sensing will discussed in detail.
Key-Words / Index Term
Primary User, Secondary User, Band Sensing, Signal Processing Techniques
References
[1] Yao Liu ; Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA ; Peng Ning ; Huaiyu Dai, “Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures”, Published in: Security and Privacy (SP), 2010 IEEE Symposium on Date of Conference: 16-19 May 2010 Page(s): 286 – 301.
[2] Canberk, B. ; Broadband Wireless Networking Lab. (BWNLab), Georgia Inst. of Technol., Atlanta, GA, USA ; Akyildiz, I.F. ; Oktug, S., “Primary User Activity Modeling Using First-Difference Filter Clustering and Correlation in Cognitive Radio Networks”, Published in: Networking, IEEE/ACM Transactions on (Volume:19 , Issue: 1 ) Page(s): 170 – 183 ISSN : 1063-6692.
[3] Rahimian, N.; Dept. of Electr. & Comput. Eng., Texas A&M Univ., College Station, TX, USA ; Georghiades, C.N. ; Shakir, M.Z. ; Qaraqe, K.A., “On the Probabilistic Model for Primary and Secondary User Activity for OFDMA-Based Cognitive Radio Systems: Spectrum Occupancy and System Throughput Perspectives”, Published in: Wireless Communications, IEEE Transactions on (Volume:13 , Issue: 1 ) Page(s): 356 – 369 ISSN : 1536-1276.
[4] Chang, K. ; Sch. of Eng. Syst., Queensland Univ. of Technol., Brisbane, QLD, Australia ; Senadji, B., “Spectrum Sensing Optimisation for Dynamic Primary User Signal”, Published in: Communications, IEEE Transactions on (Volume:60 , Issue: 12 ) Page(s): 3632 – 3640 ISSN : 0090-6778.
[5] Saifan, R. ; Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA ; Yawen Wei ; Guan, Yong, “A Framework for Cooperative In-Band Sensing in Cognitive Radio Network”, Published in: Networking Technologies for Software Defined Radio (SDR) Networks, 2010 Fifth IEEE Workshop on Date of Conference: 21-21 June 2010 Page(s): 1 – 6.
[6] Hyoil Kim ; Dept. of Electr. Eng. & Comput. Sci., Univ. of Michigan, Ann Arbor, MI, USA ; Shin, K.G., “In-Band Spectrum Sensing in IEEE 802.22 WRANs for Incumbent Protection”, Published in: Mobile Computing, IEEE Transactions on (Volume:9 , Issue: 12 ) Page(s): 1766 – 1779.
[7] Rong Cong ; Coll. of Commun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing, China ; Zhen Yang, “Optimization of out-band sensing time in cognitive radios”, Published in: Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on (Volume:1 ) Date of Conference: 10-12 Dec. 2010 Page(s): 383 – 387.
[8] Jembre, Y.Z. ; Sch. of Inf. & Comput. Eng., Ajou Univ., Suwon, South Korea ; Young-June Choi ; Wooguil Pak, “Out-of-Band Sensing for Seamless Communication in Cognitive Radio Systems”, Published in: Ubiquitous Information Technologies and Applications (CUTE), 2010 Proceedings of the 5th International Conference on Date of Conference: 16-18 Dec. 2010 Page(s): 1 – 4.
[9] Liu, W. ; Dept. of Inf. Technol., Ghent Univ., Ghent, Belgium ; Yaron, O. ; Moerman, I. ; Bouckaert, S., “Real-time wide-band spectrum sensing for cognitive radio”, Published in: Communications and Vehicular Technology in the Benelux (SCVT), 2011 18th IEEE Symposium on Date of Conference: 22-23 Nov. 2011 Page(s): 1 – 6.
[10] Bogale, T.E. ; Inst. Nat. de la Rech. Sci. (INRS), Univ. du Quebec, Montreal, QC, Canada ; Vandendorpe, L. ; Long Bao Le, “Wide-Band Sensing and Optimization for Cognitive Radio Networks With Noise Variance Uncertainty”, Published in: Communications, IEEE Transactions on (Volume:63 , Issue: 4 ) Page(s): 1091 – 1105.
[11] Blaschke, V. ; Inst. fur Nachrichtentechnik, Univ. Karlsruhe, Karlsruhe ; Renk, T. ; Jondral, F.K., “A Cognitive Radio Receiver Supporting Wide-Band Sensing”, Published in: Communications Workshops, 2008. ICC Workshops '08. IEEE International Conference on Date of Conference: 19-23 May 2008 Page(s): 499 – 503.
[12] Dautrich, B.A. ; Rabiner, L.R. ; Martin, T.B., “The effects of selected signal processing techniques on the performance of a filter-bank-based isolated word recognizer”, Published in: Bell System Technical Journal, The (Volume:62 , Issue: 5 ) Page(s): 1311 – 1336.
[13] Kia, S.H. ; Dept. of Electr. Eng., Univ. of Picardie Jules Verne, Amiens, France ; Henao, H. ; Capolino, G., “Efficient digital signal processing techniques for induction machines fault diagnosis”, Published in: Electrical Machines Design Control and Diagnosis (WEMDCD), 2013 IEEE Workshop on Date of Conference: 11-12 March 2013 Page(s): 232 – 246.
Citation
D.Vinoth and A.Immaculate Mercy, "Band Identifying Methods as well as Problems in CR Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.310-314, 2015.
Operational Grid-Based Self-Motivated Entrance Time Calculation Consuming GPS Positions
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.315-319, Sep-2015
Abstract
Transportation modes are aplenty in today’s urban environment. Computers utilization open transport such as buses, trains, and taxis, personal motion the other hand vehicles, walking, bicycles, etc. to travel between places. One of the major the other hand concerns on the other hand the individuals who depend on open transportation is the unavailability on the other hand inexactness of frame lives up to expectations that foresee the assessed landing time on the other hand the plan based on the current range of vehicles and the change situation. With the advent of technology, a substantial set of urban transportation administrators have begun to utilization range reporting frame lives up to expectations such as GPS gadgets on-board their fleet, with the primary purpose of checking and managing their fleet. This paper describes techniques on the other hand predicting the landing time taking advantage of the range reports from such devices. The framework pipeline created is based on a complex occasion preparing motor inside which a calculation is executed to ceaselessly foresee in constant the assessed landing time in an online fashion. The created framework in to start with phase is assessed utilizing a vehicle simulation the other hand that generates vehicle directions along genuine open transportation routes.
Key-Words / Index Term
Complex Occasion Processing, Information Stream Mining, Constant Disseminated Systems, Spatial Information Mining
References
[1] Hui Li; Qian Wu“Expansion application of dSPACE for HILS”. Published in:Industrial Electronics, 2008. ISIE 2008.IEEE International Symposium Date of Conference:June 30 2008-July 2 2008Page(s):2231 – 2235.
[2] Yang Shu; Sch. of Electromech. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu; Hui Li; Qian Wu “Expansion application of dSPACE for HILS” Published in: Industrial Electronics, 2008. ISIE 2008. IEEE International Symposium on Date of Conference: June 30 2008-July 2 2008 Page(s): 2231 – 2235
[3] Vural, R.A.; Commun. Eng. Dept., Yildiz Tech. Univ. Electron., Istanbul; Yildirim,T. “Optimization of integra circuits using an artificial intelligence algorithm” Published in: Research in Microelectronics and Electronics, 2008. PRIME 2008. Ph.D. Date of Conference: June 22 2008-April 25 2008 Page(s): 13 – 15
[4] Haoting Liu; Nat. Lab. of Pattern Recognition, Chinese Acad. of Sci., Beijing, China ; Hongwei Zhu ; Fenggang Xu; Hanqing Lu “Imaging Quality based state switch algorithm for outdoor moving robot system” Published in: Information and Automation (ICIA), 2010 IEEE International Conference on Date of Conference: 20-23 June 2010 Page(s): 397 – 401
[5] Lane, James W.; Tenneco, Inc., Houston, Tex. 77001. “Digital Computer Control and Testing of Compressor Stations”Published in: Industry Applications, IEEE Transactions on (Volume: IA-9, Issue: 3) Page(s): 366 – 375
[6] Turner, S.R.; Philips Res. Lab., Redhill, UK “Interactivity and the convergence of TV and PC-real or imagined?” Published in: Broadcasting Convention, International (Conf. Publ. No. 428) Date of Conference: 12-16 Sep 1996 Page(s): 200-202
[7] Yan Hongwei ; Coll. of Mech. Eng. & Automatization, North Univ. of China, Taiyuan, China ; Yao Zhuting “Notice of and implementation on two kinds practical and portable transient waveform recorder” Published in: Mechanical and Electronics Engineering (ICMEE), 2010 2nd International Conference on (Volume:1 ) Date of Conference: 1-3 Aug. 2010 Page(s):V1-433-V1-436
[8] Molina, D ; Department of Computer Engineering, University of Cadiz, Cadiz, 11003, Spain. daniel.molina@uca.es ; Lozano,M;García-Martínez,C;Herrera,F“Memetic Algorithms for Continuous Optimisation Based on Local Search Chains” Published in:Evolutionary Computation (Volume:18 , Issue: 1 )Page(s):27 - 63
[9] Lloyd, M H ; Farside Technology Research, UK ; Reeve, P J “IEC 61508 and IEC 61511 assessments - some lessons learned” Published in: Systems Safety 2009. Incorporating the SaRS Annual Conference, 4th IET International Conference on Date of Conference: 26-28 Oct. 2009 Page(s):1-6
[10] Lizhong Chen ; Inst. of Adv. Process Control, Zhejiang Univ., Hangzhou, China ; Yongyou Hu ; Hongye Su ; Jian Chu “A comparative study for solution methods of a multicomponent distillation model” Published in: Systems, Man and Cybernetics, 2004 IEEE International Conference on (Volume:5 )Date of Conference:10-13 Oct. 2004 Page(s): 4249 - 4253 vol.5
[11] Browning, T.R.; Lockheed Martin Aeronaut. Co., Fort Worth, TX, USA; Eppinger, S.D. “Modeling impacts of process architecture on cost and schedule risk in product development” Published in: Engineering Management, IEEE Transactions on (Volume: 49, Issue: 4) Page(s): 428 - 442
[12] Zee, A.; Atotech Deutschland GmbH, Berlin, Germany; Massey, R. “Use of non-etching adhesion promoters advanced PCB applications” Published in: Electronic System-Integration Technology Conference (ESTC), 2010 3rd Date of Conference: 13-16 Sept. 2010 Page(s): 1 – 5.
Citation
V.Vinothini and L.Vijayakalyani, "Operational Grid-Based Self-Motivated Entrance Time Calculation Consuming GPS Positions," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.315-319, 2015.
AI Based Security Mechanism Using Captcha as Graphical Password
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.320-321, Sep-2015
Abstract
Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologiDDes, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as Pass Points, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Key-Words / Index Term
CaRP,technologiDDes,AI,Captcha,Cryptosystem
References
[1]. R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[2]. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.
[3]. H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
[4]. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 02–127, Jul. 2005.
[5]. K. Golofit, “Click passwords under investigation,” in Proc. ESORICS, 2007, pp. 343– 58.
[6]. A. E. Dirik, N. Memon, and J.-C. Birget, “Modeling user choice in the passpoints Graphical password scheme,” in Proc. Symp. Usable Privacy Security, 2007, pp. 20–28.
Citation
V.Surekha and S.K.Murugaraja, "AI Based Security Mechanism Using Captcha as Graphical Password," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.320-321, 2015.