Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437877
Rachana Yadav, S. Yadav, S. Yadav
A simple Coaxial-fed antenna with frequency-band reconfigurable characteristics is presented here. This proposed antenna consists of a modified patch structure with annular-ring slots etched on it. In order to generate frequency reconfigurable characteristics different combination of ON/OFF states PIN diodes are used. These diodes are situated as switches in curve type slots. Antenna is operable in three modes on the basis of combination of ON/OFF states of the switches. This antenna is able to maintain a return loss below -10 dB for the GPS L5 Band (1.164 GHz to 1.189 GHz) exactly and 2.6 GHz for mobile broadband.
{"title":"A reconfigurable antenna with multiband characteristics for GPS and mobile communication","authors":"Rachana Yadav, S. Yadav, S. Yadav","doi":"10.1109/CCINTELS.2015.7437877","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437877","url":null,"abstract":"A simple Coaxial-fed antenna with frequency-band reconfigurable characteristics is presented here. This proposed antenna consists of a modified patch structure with annular-ring slots etched on it. In order to generate frequency reconfigurable characteristics different combination of ON/OFF states PIN diodes are used. These diodes are situated as switches in curve type slots. Antenna is operable in three modes on the basis of combination of ON/OFF states of the switches. This antenna is able to maintain a return loss below -10 dB for the GPS L5 Band (1.164 GHz to 1.189 GHz) exactly and 2.6 GHz for mobile broadband.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437875
Manisha Gupta, Vinita Mathur
A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.
{"title":"Koch fractal antenna using right angled isosceles triangular microstrip patch antenna structure for WiMAX","authors":"Manisha Gupta, Vinita Mathur","doi":"10.1109/CCINTELS.2015.7437875","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437875","url":null,"abstract":"A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437892
Chinmay Gordey, V. Deshmukh
This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.
{"title":"Identification and localization of event sources in WSN using binary data in fault tolerant way","authors":"Chinmay Gordey, V. Deshmukh","doi":"10.1109/CCINTELS.2015.7437892","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437892","url":null,"abstract":"This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437910
Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan
Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.
{"title":"Clustering of robotic environment using image data stream","authors":"Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan","doi":"10.1109/CCINTELS.2015.7437910","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437910","url":null,"abstract":"Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437896
Abhishek Mishra, Ashutosh Gupta
Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.
{"title":"Probabilistic secret sharing scheme for binary images","authors":"Abhishek Mishra, Ashutosh Gupta","doi":"10.1109/CCINTELS.2015.7437896","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437896","url":null,"abstract":"Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"&NA; 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437914
Sudip Kumar Rajak, Sayantani Mondal, I. Ali
This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.
{"title":"Detection of human being and non-human object from image and video sequences","authors":"Sudip Kumar Rajak, Sayantani Mondal, I. Ali","doi":"10.1109/CCINTELS.2015.7437914","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437914","url":null,"abstract":"This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437901
Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal
Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.
{"title":"An application of SVM in character recognition with chain code","authors":"Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal","doi":"10.1109/CCINTELS.2015.7437901","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437901","url":null,"abstract":"Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437922
Princy Saraswat, G. Parmar
This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.
{"title":"Model order reduction of transformer linear section model using Simulated Annealing","authors":"Princy Saraswat, G. Parmar","doi":"10.1109/CCINTELS.2015.7437922","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437922","url":null,"abstract":"This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437955
Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari
USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.
{"title":"Data transfer with the help of USB host controller without PC","authors":"Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari","doi":"10.1109/CCINTELS.2015.7437955","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437955","url":null,"abstract":"USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437886
A. Dhakne, P. Chatur
Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.
{"title":"Distributed Trust based Intrusion Detection approach in wireless sensor network","authors":"A. Dhakne, P. Chatur","doi":"10.1109/CCINTELS.2015.7437886","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437886","url":null,"abstract":"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}