Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033924
P. Bharathi, P. Kalaivaani
Due to the advanced technologies of Web 2.0, people are participating in and exchanging opinions through social media sites such as Web forums and Weblogs etc., Classification and Analysis of such opinions and sentiment information is potentially important for both service and product providers, users because this analysis is used for making valuable decisions. Sentiment is expressed differently in different domains. Applying a sentiment classifiers trained on source domain does not produce good performance on target domain because words that occur in the train domain might not appear in the test domain. We propose a hybrid model to detect sentiment and topics from text by using weakly supervised learning technique. First we create sentiment sensitive thesaurus using both labeled and unlabeled data from multiple domains. The created thesaurus is then used to classify sentiments from text. This model is highly portable to various domains. This is verified by experimental results from four different domains where the hybrid model even outperforms existing semi-supervised approaches.
{"title":"Sentiment classification using weakly supervised learning techniques","authors":"P. Bharathi, P. Kalaivaani","doi":"10.1109/ICICES.2014.7033924","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033924","url":null,"abstract":"Due to the advanced technologies of Web 2.0, people are participating in and exchanging opinions through social media sites such as Web forums and Weblogs etc., Classification and Analysis of such opinions and sentiment information is potentially important for both service and product providers, users because this analysis is used for making valuable decisions. Sentiment is expressed differently in different domains. Applying a sentiment classifiers trained on source domain does not produce good performance on target domain because words that occur in the train domain might not appear in the test domain. We propose a hybrid model to detect sentiment and topics from text by using weakly supervised learning technique. First we create sentiment sensitive thesaurus using both labeled and unlabeled data from multiple domains. The created thesaurus is then used to classify sentiments from text. This model is highly portable to various domains. This is verified by experimental results from four different domains where the hybrid model even outperforms existing semi-supervised approaches.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77127058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034140
M. Vimalraj, B. Alex, M. Tamilarasi
In this paper investigations on a fixed speed wind farm with squirrel cage induction generators directly connected to the grid in combination with a StatCom under unbalanced grid voltage fault are given by means of theory and simulations. The stability of fixed speed wind turbines can be improved by a StatCom, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage causes additional generator torque oscillations. A StatCom control structure with the capability to control the positive or negative sequence of the voltage is used. The simulation results clarify the effect of positive and negative sequence voltage compensation by a StatCom on the operation of a fixed speed wind farm. The influence of different StatCom control targets is investigated that lead to an increased network voltage stability and lower torque pulsations.
{"title":"StatCom control for voltage stability improvement at a fixed speed wind farm under unbalanced faults","authors":"M. Vimalraj, B. Alex, M. Tamilarasi","doi":"10.1109/ICICES.2014.7034140","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034140","url":null,"abstract":"In this paper investigations on a fixed speed wind farm with squirrel cage induction generators directly connected to the grid in combination with a StatCom under unbalanced grid voltage fault are given by means of theory and simulations. The stability of fixed speed wind turbines can be improved by a StatCom, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage causes additional generator torque oscillations. A StatCom control structure with the capability to control the positive or negative sequence of the voltage is used. The simulation results clarify the effect of positive and negative sequence voltage compensation by a StatCom on the operation of a fixed speed wind farm. The influence of different StatCom control targets is investigated that lead to an increased network voltage stability and lower torque pulsations.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"247 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77527567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033760
M. Shanthi, S. Suresh
We present an approach to detect a selfish node in a wireless network by passive monitoring. This does not require any access to the network nodes. Our approach requires deploying multiple sniffers across the network to capture wireless traffic traces among multiple channels. IEEE 802.11 networks support multiple channels, and a wireless interface can monitor only a single channel at one time. Thus, capturing all frames passing an interface on all channels is an impossible task, and we need strategies to capture the most representative sample. When a large area is to be monitored, several sniffers must be deployed, and these will typically overlap in their area of coverage. The goals of effective wireless monitoring are to capture as many frames as possible, while minimizing the number of those frames that are captured redundantly by more than one sniffer. The above goals May be addressed with a coordinated sampling strategy that directs neighboring sniffer to different channels during any period. These traces are then analyzed using hidden markov model to infer the misbehavior node in wifi networks.
{"title":"Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring","authors":"M. Shanthi, S. Suresh","doi":"10.1109/ICICES.2014.7033760","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033760","url":null,"abstract":"We present an approach to detect a selfish node in a wireless network by passive monitoring. This does not require any access to the network nodes. Our approach requires deploying multiple sniffers across the network to capture wireless traffic traces among multiple channels. IEEE 802.11 networks support multiple channels, and a wireless interface can monitor only a single channel at one time. Thus, capturing all frames passing an interface on all channels is an impossible task, and we need strategies to capture the most representative sample. When a large area is to be monitored, several sniffers must be deployed, and these will typically overlap in their area of coverage. The goals of effective wireless monitoring are to capture as many frames as possible, while minimizing the number of those frames that are captured redundantly by more than one sniffer. The above goals May be addressed with a coordinated sampling strategy that directs neighboring sniffer to different channels during any period. These traces are then analyzed using hidden markov model to infer the misbehavior node in wifi networks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91085653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033995
S. S. Pujari, Prangya Paramita Muduli, Amruta Panda, Rashmita Badhai, Sofia Nayak, Yougajyoty Sahoo
Electronics industry is very prodigiously moving towards digital platform, but the world is analog in nature, so when any analog signal needs to be processed in digital platform it should be converted to digital with the help of analog to digital converter. After processing through digital platform by the help of DAC it will be again converted to analog format. Here the digital platform is ALTERA CYCLONE-II FPGA. FIR filters are used in every aspect of present-day technology because filtering is one of the basic tools of information acquisition and manipulation. Different types of digital FIR filters are implemented on external signal by using VERILOG HDL language over FPGA. Further model based design approach using MATLAB and Simulink is taken into account for optimized designing and resource computation.
{"title":"Design & implementation of FIR filters using on-board ADC-DAC & FPGA","authors":"S. S. Pujari, Prangya Paramita Muduli, Amruta Panda, Rashmita Badhai, Sofia Nayak, Yougajyoty Sahoo","doi":"10.1109/ICICES.2014.7033995","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033995","url":null,"abstract":"Electronics industry is very prodigiously moving towards digital platform, but the world is analog in nature, so when any analog signal needs to be processed in digital platform it should be converted to digital with the help of analog to digital converter. After processing through digital platform by the help of DAC it will be again converted to analog format. Here the digital platform is ALTERA CYCLONE-II FPGA. FIR filters are used in every aspect of present-day technology because filtering is one of the basic tools of information acquisition and manipulation. Different types of digital FIR filters are implemented on external signal by using VERILOG HDL language over FPGA. Further model based design approach using MATLAB and Simulink is taken into account for optimized designing and resource computation.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88904566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033910
G. Khekare
Smart cities would like to plan how to minimize their transportation problems due to the increasing population that produces congested roads. VANETs (Vehicular Ad Hoc Networks) aim at helping to alleviate this issue improving vehicles' mobility, increasing road safety and also seeking to have more sustainable cities. At the beginning of the development of vehicular technologies, the main goal was to have more efficient and safer roads. Nowadays, thanks to the huge development in wireless technologies and their application in vehicles, it's possible to use Intelligent Transportation System (ITS) that will change our way to drive, improve road safety, and help emergency services. A survey of assorted Intelligent Traffic Systems (ITS) with respect to our proposed scheme is described in this paper. It introduces a new system consist of a smart city framework which has Intelligent Traffic Lights (ITLs) situated at every intersection that transmit information about traffic conditions and provide the driver congestion free shortest path in emergency that helps to take proper trip decisions.
{"title":"Design of emergency system for intelligent traffic system using VANET","authors":"G. Khekare","doi":"10.1109/ICICES.2014.7033910","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033910","url":null,"abstract":"Smart cities would like to plan how to minimize their transportation problems due to the increasing population that produces congested roads. VANETs (Vehicular Ad Hoc Networks) aim at helping to alleviate this issue improving vehicles' mobility, increasing road safety and also seeking to have more sustainable cities. At the beginning of the development of vehicular technologies, the main goal was to have more efficient and safer roads. Nowadays, thanks to the huge development in wireless technologies and their application in vehicles, it's possible to use Intelligent Transportation System (ITS) that will change our way to drive, improve road safety, and help emergency services. A survey of assorted Intelligent Traffic Systems (ITS) with respect to our proposed scheme is described in this paper. It introduces a new system consist of a smart city framework which has Intelligent Traffic Lights (ITLs) situated at every intersection that transmit information about traffic conditions and provide the driver congestion free shortest path in emergency that helps to take proper trip decisions.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"31 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86077208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034036
Amruta V. Pandit, J. Rangole, R. Shastri, S. Deosarkar
Sericulture activities involve rearing of pure races as parent seed crop and production of disease free silkworm seeds in grainages. Success of sericulture as a cash crop depends on production of disease free silkworm seeds supplied to farmers. Silkworm egg counting has to be done as farmers look to grainages for supply of silkworm seeds and pay accordingly. Conventional method of counting silkworm eggs relied on manual counting, which is time consuming and labor-intensive. Egg counting has to be done to generate statistics such as fecundity and hatching percentage. This paper presents the development of automatic method for counting of silkworm eggs using image processing algorithm. The algorithm is realized in LabVIEW graphical programming environment that shortens the development cycle. The algorithm realizes high precision and accuracy of counting.
{"title":"Vision system for automatic counting of silkworm eggs","authors":"Amruta V. Pandit, J. Rangole, R. Shastri, S. Deosarkar","doi":"10.1109/ICICES.2014.7034036","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034036","url":null,"abstract":"Sericulture activities involve rearing of pure races as parent seed crop and production of disease free silkworm seeds in grainages. Success of sericulture as a cash crop depends on production of disease free silkworm seeds supplied to farmers. Silkworm egg counting has to be done as farmers look to grainages for supply of silkworm seeds and pay accordingly. Conventional method of counting silkworm eggs relied on manual counting, which is time consuming and labor-intensive. Egg counting has to be done to generate statistics such as fecundity and hatching percentage. This paper presents the development of automatic method for counting of silkworm eggs using image processing algorithm. The algorithm is realized in LabVIEW graphical programming environment that shortens the development cycle. The algorithm realizes high precision and accuracy of counting.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86244907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033896
M. Vijayalakshmi, S. Banumathi
Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.
{"title":"Secure localization of multiple spoofing attackers","authors":"M. Vijayalakshmi, S. Banumathi","doi":"10.1109/ICICES.2014.7033896","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033896","url":null,"abstract":"Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"02 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86474450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034040
N. Pavithra, E. Shalini, C. Babu
High speed content addressable memory design has high speed search function in a single clock. Parallel match line is used to compare. In robust Low power sense amplifier and high speed are highly sought-after in CAM designs. The value is given to search engine and its finds the value where its present. In the existing parity bit is introduced that leads to delay reduction at a cost of less than area. Furthermost in the proposed system PMOS transistor is used and cascaded and then output is found. Deadline is used in the proposed system to identify if the value is not present in the system.
{"title":"Increasing the speed and reducing a sensing delay of content addressable memory","authors":"N. Pavithra, E. Shalini, C. Babu","doi":"10.1109/ICICES.2014.7034040","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034040","url":null,"abstract":"High speed content addressable memory design has high speed search function in a single clock. Parallel match line is used to compare. In robust Low power sense amplifier and high speed are highly sought-after in CAM designs. The value is given to search engine and its finds the value where its present. In the existing parity bit is introduced that leads to delay reduction at a cost of less than area. Furthermost in the proposed system PMOS transistor is used and cascaded and then output is found. Deadline is used in the proposed system to identify if the value is not present in the system.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81628380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034179
M. D. Sankari, M. Kiruthiga, B. T. Tharanisrisakthi
In our day to day life we are facing too much of accidents which leads to loss of many lives, we can't stop these miserable events and can't find out the reason for the accidents and the persons responsible for that. Many people getting escape from these type of cases and many accidents are still persuing continously. The main idea of the system is dealt with the concept of finding out the cause of the accidents and there by avoiding the root cause of the accidents in future. Our idea is to record all the events that occurring inside and outside the vehicle which was used in Aircrafts. The concept helping to carry out the recording is an Video camera. The data can be saved and restored using a serial communication. All the data can be viewed in LCD display. Various sensors are being used for sensing external signals. PIC Microcontroller is used to convert and process the above external signals.
{"title":"Accident inference and data acquisition in automobiles","authors":"M. D. Sankari, M. Kiruthiga, B. T. Tharanisrisakthi","doi":"10.1109/ICICES.2014.7034179","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034179","url":null,"abstract":"In our day to day life we are facing too much of accidents which leads to loss of many lives, we can't stop these miserable events and can't find out the reason for the accidents and the persons responsible for that. Many people getting escape from these type of cases and many accidents are still persuing continously. The main idea of the system is dealt with the concept of finding out the cause of the accidents and there by avoiding the root cause of the accidents in future. Our idea is to record all the events that occurring inside and outside the vehicle which was used in Aircrafts. The concept helping to carry out the recording is an Video camera. The data can be saved and restored using a serial communication. All the data can be viewed in LCD display. Various sensors are being used for sensing external signals. PIC Microcontroller is used to convert and process the above external signals.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"73 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90597106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033858
S. Priya, B. Gopinathan
Data delivery of packets in broad cast using wireless medium is the main intention of this paper, this will be done through a MANETS and should achieve reliable delivery. This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. The process of routing the data packets to the destination is a challenging task. In order to provide an efficient and reliable data delivery for these MANETs, a Zone-based opportunistic routing (ZOR) protocol is used. This protocol uses the best features of the exiting protocols and algorithms to achieve good performance. It uses GPS to find the exact location of the destination and greedy to route the data packets in an efficient manner to the destination. For the purpose of back up, ZOR uses the forwarding candidates, which are selected by the greedy node. In case of communication hole, that is if an intermediate node fails or moves out of the coverage area of the node, then Virtual Destination-based Void Handling (VDVH) scheme is further proposed to work together with ZOR to provide an efficient and reliable data delivery. This is achieved by adjusting the direction of data flow temporarily. The features such as greedy forwarding and robustness through opportunistic routing can still be achieved when handling communication voids.
{"title":"Reliable data delivery in MANETs using VDVH framework","authors":"S. Priya, B. Gopinathan","doi":"10.1109/ICICES.2014.7033858","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033858","url":null,"abstract":"Data delivery of packets in broad cast using wireless medium is the main intention of this paper, this will be done through a MANETS and should achieve reliable delivery. This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. The process of routing the data packets to the destination is a challenging task. In order to provide an efficient and reliable data delivery for these MANETs, a Zone-based opportunistic routing (ZOR) protocol is used. This protocol uses the best features of the exiting protocols and algorithms to achieve good performance. It uses GPS to find the exact location of the destination and greedy to route the data packets in an efficient manner to the destination. For the purpose of back up, ZOR uses the forwarding candidates, which are selected by the greedy node. In case of communication hole, that is if an intermediate node fails or moves out of the coverage area of the node, then Virtual Destination-based Void Handling (VDVH) scheme is further proposed to work together with ZOR to provide an efficient and reliable data delivery. This is achieved by adjusting the direction of data flow temporarily. The features such as greedy forwarding and robustness through opportunistic routing can still be achieved when handling communication voids.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89310884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}