Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033799
D. Selvarani, T. Ravi
Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMax). Wi-Fi is for Wireless Local Area Network with the standard IEEE802.11 and WiMax is for Wireless Metropolitan Area Network with the standard IEEE 802.16. These technologies aim to provide broadband wireless access to residential areas and small business enterprises, in addition to providing internet access in countries without any wired network infrastructure. This paper provides an overview of Wi-Fi and WiMax technologies including the features, specifications, architecture, advantages, limitations and security. Finally a comparison is made between Wi-Fi and WiMax. It is suggested that when Wi-Fi is synergized with WiMax, it will provide the best solution for last mile coverage.
{"title":"Comparative analysis of Wi-Fi and WiMAX","authors":"D. Selvarani, T. Ravi","doi":"10.1109/ICICES.2014.7033799","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033799","url":null,"abstract":"Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMax). Wi-Fi is for Wireless Local Area Network with the standard IEEE802.11 and WiMax is for Wireless Metropolitan Area Network with the standard IEEE 802.16. These technologies aim to provide broadband wireless access to residential areas and small business enterprises, in addition to providing internet access in countries without any wired network infrastructure. This paper provides an overview of Wi-Fi and WiMax technologies including the features, specifications, architecture, advantages, limitations and security. Finally a comparison is made between Wi-Fi and WiMax. It is suggested that when Wi-Fi is synergized with WiMax, it will provide the best solution for last mile coverage.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"37 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85941584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033978
Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia
For modern day communication devices, the key aspect lies in the proper reception of data at minimum possible error rates and also on maintenance of great degrees of precision. But, while doing so, a very important aspect that should be kept in mind is the ability of the device developed to operate at reasonable speeds, because it must be compatible with the other sub-systems of the communication setup. Also, the design complexity of the device and the cost of design should be minimum. By putting all these factors together, we can define a common term called time complexity which is the main concern of this proposed work. Considering the various constraints at hand, we would like to propose the design of a Multiplexer-based DPLL device which comprises of features such as good speed, simplified design and precise reception of data.
{"title":"MUX-based design of DPLL for wireless communication","authors":"Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia","doi":"10.1109/ICICES.2014.7033978","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033978","url":null,"abstract":"For modern day communication devices, the key aspect lies in the proper reception of data at minimum possible error rates and also on maintenance of great degrees of precision. But, while doing so, a very important aspect that should be kept in mind is the ability of the device developed to operate at reasonable speeds, because it must be compatible with the other sub-systems of the communication setup. Also, the design complexity of the device and the cost of design should be minimum. By putting all these factors together, we can define a common term called time complexity which is the main concern of this proposed work. Considering the various constraints at hand, we would like to propose the design of a Multiplexer-based DPLL device which comprises of features such as good speed, simplified design and precise reception of data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"435 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76768650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034079
K. Manjula, S. Palanivel, Rajan Asst Professor
Due to the popularity of social media Web sites, extensive research efforts have been dedicated to tag-based social image search. Both visual information and tags have been investigated in the research field. However, most existing methods use tags and visual characteristics either separately or sequentially in order to estimate the relevance of images. In this paper, simultaneously utilizes both visual and textual information to estimate the relevance of user tagged images. The relevance estimation is determined with a hypergraph learning approach. In this method, a social image hypergraph is constructed, where vertices represent images and hyperedges represent visual or textual terms. Learning is achieved with use of a set of pseudo-positive images, where the weights of hyperedges are updated throughout the learning process. In this way, the impact of different tags and visual words can be automatically modulated. Comparative results of the experiments conducted on a dataset including 370 images are presented, which demonstrate the effectiveness of the proposed approach.
{"title":"Visual and tag-based social image search based on hypergraph ranking method","authors":"K. Manjula, S. Palanivel, Rajan Asst Professor","doi":"10.1109/ICICES.2014.7034079","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034079","url":null,"abstract":"Due to the popularity of social media Web sites, extensive research efforts have been dedicated to tag-based social image search. Both visual information and tags have been investigated in the research field. However, most existing methods use tags and visual characteristics either separately or sequentially in order to estimate the relevance of images. In this paper, simultaneously utilizes both visual and textual information to estimate the relevance of user tagged images. The relevance estimation is determined with a hypergraph learning approach. In this method, a social image hypergraph is constructed, where vertices represent images and hyperedges represent visual or textual terms. Learning is achieved with use of a set of pseudo-positive images, where the weights of hyperedges are updated throughout the learning process. In this way, the impact of different tags and visual words can be automatically modulated. Comparative results of the experiments conducted on a dataset including 370 images are presented, which demonstrate the effectiveness of the proposed approach.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"190 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77034384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034005
Shubham Agarwal, S. Rawat, V. Sumathi
The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the given function. It describes the implementations and theory of converting the visual information to depict into pictorial view. Inverse kinematics is a method used for pronouncing the same. A target is given as an input by the user and accordingly it sketches the same contours on the paper. The purpose behind using inverse kinematics lies in the fact that it doesn't need the information about the location of each specific limb and hereby angle between them it uses mathematical equations to calculate the angle by itself. The robotic hand equipped with prismatic (translational) and revolute (rotational) joint works well even at increased complexity. This work is further extended to make it as an autonomous system. Few example figures are taken as input to test the system and they are plotted without any human intervene.
{"title":"A drawing robotic hand based on inverse kinematics","authors":"Shubham Agarwal, S. Rawat, V. Sumathi","doi":"10.1109/ICICES.2014.7034005","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034005","url":null,"abstract":"The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the given function. It describes the implementations and theory of converting the visual information to depict into pictorial view. Inverse kinematics is a method used for pronouncing the same. A target is given as an input by the user and accordingly it sketches the same contours on the paper. The purpose behind using inverse kinematics lies in the fact that it doesn't need the information about the location of each specific limb and hereby angle between them it uses mathematical equations to calculate the angle by itself. The robotic hand equipped with prismatic (translational) and revolute (rotational) joint works well even at increased complexity. This work is further extended to make it as an autonomous system. Few example figures are taken as input to test the system and they are plotted without any human intervene.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77247711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034037
S. Maheswari, D. Hemanth
This paper presents a novel data hiding using Integer Wavelet Transform (TWT) through lifting scheme that aims to achieve high quality of stego image. This method transforms a spatial domain cover image into a frequency domain cover image. It hides the secret message into detail coefficients (CH, CV, CD) of IWT by construct a binary image in any of selected bit in CH, CV, CD separately and compresses that bit by using arithmetic coding. This method is very simple and effective.
{"title":"Data hiding in gray scale images using Integer Wavelet Transform","authors":"S. Maheswari, D. Hemanth","doi":"10.1109/ICICES.2014.7034037","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034037","url":null,"abstract":"This paper presents a novel data hiding using Integer Wavelet Transform (TWT) through lifting scheme that aims to achieve high quality of stego image. This method transforms a spatial domain cover image into a frequency domain cover image. It hides the secret message into detail coefficients (CH, CV, CD) of IWT by construct a binary image in any of selected bit in CH, CV, CD separately and compresses that bit by using arithmetic coding. This method is very simple and effective.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80974328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033866
Auxilia M, K Raja
Data security is one of the critical issues in evaluating cloud based services. The reason is that even a naive user can store his/her data in any cloud storage provided by diverse cloud service providers. Each cloud service provider has his/her own access control policies written in diverse policy languages and schemes. Most of the traditional access control policies like MAC, DAC, and RBAC lack consideration about the relationship between access control entities. In this paper, we propose a semantic based access management framework which considers the semantic relationship between the access control entities like subject, object and action. This framework works for diverse cloud service providers and users and provides fine granular access control over the data stored in cloud.
{"title":"Semantics based access management framework for securing data in cloud","authors":"Auxilia M, K Raja","doi":"10.1109/ICICES.2014.7033866","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033866","url":null,"abstract":"Data security is one of the critical issues in evaluating cloud based services. The reason is that even a naive user can store his/her data in any cloud storage provided by diverse cloud service providers. Each cloud service provider has his/her own access control policies written in diverse policy languages and schemes. Most of the traditional access control policies like MAC, DAC, and RBAC lack consideration about the relationship between access control entities. In this paper, we propose a semantic based access management framework which considers the semantic relationship between the access control entities like subject, object and action. This framework works for diverse cloud service providers and users and provides fine granular access control over the data stored in cloud.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85833726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033800
P. Sobiya, M. G. Nayagam, K. Ramar
Cloud computing is a new infrastructure environment that delivers on the promise of supporting on-demand services in a flexible manner by scheduling bandwidth, storage and compute resources on the fly. Content delivery networks (CDN) based systems are considered as the potential solutions to deliver User-generated content (UGC). But none of the existing CDN based solutions can support all the required features in UGC delivery. In this paper we analyses the various mechanism for deploying video in geographically distributed cloud server and optimal utilization of bandwidth, storage and other computing resources. Optimal Deployment can be done by using Nash Bargaining solutions, Greedy algorithm, Convex optimization and Lagrange Duality methods are used.
{"title":"A survey on video distribution services in cloud computing","authors":"P. Sobiya, M. G. Nayagam, K. Ramar","doi":"10.1109/ICICES.2014.7033800","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033800","url":null,"abstract":"Cloud computing is a new infrastructure environment that delivers on the promise of supporting on-demand services in a flexible manner by scheduling bandwidth, storage and compute resources on the fly. Content delivery networks (CDN) based systems are considered as the potential solutions to deliver User-generated content (UGC). But none of the existing CDN based solutions can support all the required features in UGC delivery. In this paper we analyses the various mechanism for deploying video in geographically distributed cloud server and optimal utilization of bandwidth, storage and other computing resources. Optimal Deployment can be done by using Nash Bargaining solutions, Greedy algorithm, Convex optimization and Lagrange Duality methods are used.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84073477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034152
A. Dube, Prateek Saraf, R. Dashora, Rohit Singh
Data mining processes were initially invented and developed for finding out meaningful information and deriving rules from more recent data sets. With growth in the size of power systems due to the increased requirements of industries and cities for uninterrupted power supply, data mining in electrical systems has emerged as a very efficient tool for continuous assessment of power systems. In this paper we propose Rough Set based knowledge discovery for predicting faults and probability of failure in high voltage equipment present in a real electrical systems. The approach has several different steps viz. analysis of real time data, creation and population of databases, pre-processing of data and use of rough sets based data mining algorithm to finally determine the set of rules for knowledge discovery. The methodology has been validated by presenting a case study and application of the algorithm on real time data.
{"title":"A Monte Carlo-rough based mixed-integer probablistic non-linear programming model for predicting and minimizing unavailability of power system components","authors":"A. Dube, Prateek Saraf, R. Dashora, Rohit Singh","doi":"10.1109/ICICES.2014.7034152","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034152","url":null,"abstract":"Data mining processes were initially invented and developed for finding out meaningful information and deriving rules from more recent data sets. With growth in the size of power systems due to the increased requirements of industries and cities for uninterrupted power supply, data mining in electrical systems has emerged as a very efficient tool for continuous assessment of power systems. In this paper we propose Rough Set based knowledge discovery for predicting faults and probability of failure in high voltage equipment present in a real electrical systems. The approach has several different steps viz. analysis of real time data, creation and population of databases, pre-processing of data and use of rough sets based data mining algorithm to finally determine the set of rules for knowledge discovery. The methodology has been validated by presenting a case study and application of the algorithm on real time data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78539875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033868
S. Jeeva, V. Saranya
In this paper a fuzzy based approach is used for Effective retrieval of video. Initially a video is partitioned into frames and then we use fuzzy logic method in order to retrieve a video. While existing search engines like Google and yahoo provide a video retrieving through manual textual queries. We provide an advanced concept of giving a relevant image as an input in order to rescue the video. While text based queries uses color histograms our concept makes great advantage of fuzzy logic in order to provide an accurate result.
{"title":"Comfortable perception mining in videos using fuzzy logic","authors":"S. Jeeva, V. Saranya","doi":"10.1109/ICICES.2014.7033868","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033868","url":null,"abstract":"In this paper a fuzzy based approach is used for Effective retrieval of video. Initially a video is partitioned into frames and then we use fuzzy logic method in order to retrieve a video. While existing search engines like Google and yahoo provide a video retrieving through manual textual queries. We provide an advanced concept of giving a relevant image as an input in order to rescue the video. While text based queries uses color histograms our concept makes great advantage of fuzzy logic in order to provide an accurate result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"39 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77431399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033873
Krishan Kant Varshney, P. Samundiswary
Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.
{"title":"Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network","authors":"Krishan Kant Varshney, P. Samundiswary","doi":"10.1109/ICICES.2014.7033873","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033873","url":null,"abstract":"Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77852309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}