Pub Date : 2016-10-10DOI: 10.1109/ICACCS.2016.7586378
N. Ramya, S. Rathi
This paper is to identify the selfish Nodes and also improved the overall network performance in Mobile Adhoc network (MANET). In MANET, using the wireless connection, mobile devices are connected and the nodes freely move where it wants to communicate with each other. All nodes are participated in packet forwarding in order to cooperate with each node. Suppose, if the nodes are not forwarding the packets to its neighbor nodes it is called as selfish nodes. Many techniques are available for identifying selfish nodes. Many methodologies are comparing to improve the detection of selfish nodes and improve the network performance and precision speed and network throughput and reduce the detection time of selfish node. Finally, propose a collaborative contact based watchdog approach, which is based to detect the selfish nodes.
{"title":"Detection of selfish Nodes in MANET - a survey","authors":"N. Ramya, S. Rathi","doi":"10.1109/ICACCS.2016.7586378","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586378","url":null,"abstract":"This paper is to identify the selfish Nodes and also improved the overall network performance in Mobile Adhoc network (MANET). In MANET, using the wireless connection, mobile devices are connected and the nodes freely move where it wants to communicate with each other. All nodes are participated in packet forwarding in order to cooperate with each node. Suppose, if the nodes are not forwarding the packets to its neighbor nodes it is called as selfish nodes. Many techniques are available for identifying selfish nodes. Many methodologies are comparing to improve the detection of selfish nodes and improve the network performance and precision speed and network throughput and reduce the detection time of selfish node. Finally, propose a collaborative contact based watchdog approach, which is based to detect the selfish nodes.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586348
Subodh Kumar Mohanty, P. K. Nayak
This paper is based on the study of current differential protection scheme on transmission line by using Moving Window Averaging technique and Discrete Fourier Transform. From the beginning of the history of power system, researchers have tried to increase the speed and sensitivity of transmission line protection in the power system protection field without compromising the security. Current differential protection scheme always provides sensitive protection with sharp discrimination of the disturbance area from the protection zone. Current differential protection scheme is immune to power swings and load encroachment. In the first method DFT, we can easily measure the phasors of the two ends of the transmission line which is very much essential for power system. With the help of moving window averaging technique extraction of the dc component of the current of transmission line is possible from both the sending and receiving ends. It is shown that under steady state condition, the differential current is zero while an internal line fault leads to non-zero differential current. The transmission line model is simulated with the help of PSCAD software.
{"title":"A comparative study of DFT and Moving Window Averaging technique of current differential protection on Transmission line","authors":"Subodh Kumar Mohanty, P. K. Nayak","doi":"10.1109/ICACCS.2016.7586348","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586348","url":null,"abstract":"This paper is based on the study of current differential protection scheme on transmission line by using Moving Window Averaging technique and Discrete Fourier Transform. From the beginning of the history of power system, researchers have tried to increase the speed and sensitivity of transmission line protection in the power system protection field without compromising the security. Current differential protection scheme always provides sensitive protection with sharp discrimination of the disturbance area from the protection zone. Current differential protection scheme is immune to power swings and load encroachment. In the first method DFT, we can easily measure the phasors of the two ends of the transmission line which is very much essential for power system. With the help of moving window averaging technique extraction of the dc component of the current of transmission line is possible from both the sending and receiving ends. It is shown that under steady state condition, the differential current is zero while an internal line fault leads to non-zero differential current. The transmission line model is simulated with the help of PSCAD software.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586402
K. Gayathri, P. Marikkannu
Many algorithms were designed to remove image blur due to camera shake, either with one or multiple input images, by using the deconvolution problem. If the photographer takes a burst of images, a modality available in virtually all modern digital cameras, it is possible to combine all the images to get a clean sharp version. This algorithm does not use blur estimation or its inverse problem. The proposed algorithm is strikingly simple where the average weight is calculated using Fourier domain which depends on the Fourier spectrum magnitude. Here, burst of images are taken into an account and each image in the burst is blurred differently. The proposed Fourier burst accumulation algorithm shows that one can obtain a sharp image by combining all the images together which is blurred differently. This can be implemented in modern smart phones.
{"title":"Aggregation of blurred images through weighted FBA to remove camera shake","authors":"K. Gayathri, P. Marikkannu","doi":"10.1109/ICACCS.2016.7586402","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586402","url":null,"abstract":"Many algorithms were designed to remove image blur due to camera shake, either with one or multiple input images, by using the deconvolution problem. If the photographer takes a burst of images, a modality available in virtually all modern digital cameras, it is possible to combine all the images to get a clean sharp version. This algorithm does not use blur estimation or its inverse problem. The proposed algorithm is strikingly simple where the average weight is calculated using Fourier domain which depends on the Fourier spectrum magnitude. Here, burst of images are taken into an account and each image in the burst is blurred differently. The proposed Fourier burst accumulation algorithm shows that one can obtain a sharp image by combining all the images together which is blurred differently. This can be implemented in modern smart phones.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586339
N. J. Emmanuel, R. Banupriya, N. Vijaya, G. Susithra, S. Anitha
Wireless broadband access system is operated in high mobility as well as high data rate environment. It is essential to consider the system that can be applied with or without perfect channel state information, has additional spectrum efficiency, and reducing selective fading issues. The proposed method is known as MC CDMA multilevel coding system model. The multilevel coding system model is able to solve all those problems. Consider this system can accommodate different bandwidth usage, Qos and channel response for each user. From the results of research, it can be concluded that in common the MC CDMA multilevel coding scheme gives good performance with high speed user in non-coherent channel transmission method.
{"title":"Performance enhancement of MC-CDMA system for high speed mobile users","authors":"N. J. Emmanuel, R. Banupriya, N. Vijaya, G. Susithra, S. Anitha","doi":"10.1109/ICACCS.2016.7586339","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586339","url":null,"abstract":"Wireless broadband access system is operated in high mobility as well as high data rate environment. It is essential to consider the system that can be applied with or without perfect channel state information, has additional spectrum efficiency, and reducing selective fading issues. The proposed method is known as MC CDMA multilevel coding system model. The multilevel coding system model is able to solve all those problems. Consider this system can accommodate different bandwidth usage, Qos and channel response for each user. From the results of research, it can be concluded that in common the MC CDMA multilevel coding scheme gives good performance with high speed user in non-coherent channel transmission method.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586318
Vinay Kumar, Amit Kumar, Dipen Patel, Rosepreet Kaur Bhogal
The World is slowly turning out from hard work to smart work i.e. from hardware to software. The Purpose of envelope generation is to provide a feel of Drum kit. The various parts of Drum kit can be felt, played and heard with real time simulation. The Karplus Strong Algorithm is used to generate the sounds of different instruments like cymbal, metallic plink, kick drum, Hihat. The elementary signals like sine wave, square wave have been used in order to get the appropriate sounds of different instruments. The actual sound of the particular instrument like snare drum and Tom Tom are generated by using the Butterworth filter of different order. The Physical appearance of the whole drum kit can be visualized on a Graphical User Interface and this can analyze and synthesize the sounds with different frequencies [4]. The users can play the instruments through a keyboard and generate their own music notes, melodies, songs. This Software based kit can be helpful in learning the different musical instruments. The overall approach was to provide a software based sound system which is adaptable, cost effective, can be easily affordable for the users, through which different music notes can be generated etc. This work can be further expanded for creating any software based musical studio.
{"title":"Simulation of Drum kit synthesizer","authors":"Vinay Kumar, Amit Kumar, Dipen Patel, Rosepreet Kaur Bhogal","doi":"10.1109/ICACCS.2016.7586318","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586318","url":null,"abstract":"The World is slowly turning out from hard work to smart work i.e. from hardware to software. The Purpose of envelope generation is to provide a feel of Drum kit. The various parts of Drum kit can be felt, played and heard with real time simulation. The Karplus Strong Algorithm is used to generate the sounds of different instruments like cymbal, metallic plink, kick drum, Hihat. The elementary signals like sine wave, square wave have been used in order to get the appropriate sounds of different instruments. The actual sound of the particular instrument like snare drum and Tom Tom are generated by using the Butterworth filter of different order. The Physical appearance of the whole drum kit can be visualized on a Graphical User Interface and this can analyze and synthesize the sounds with different frequencies [4]. The users can play the instruments through a keyboard and generate their own music notes, melodies, songs. This Software based kit can be helpful in learning the different musical instruments. The overall approach was to provide a software based sound system which is adaptable, cost effective, can be easily affordable for the users, through which different music notes can be generated etc. This work can be further expanded for creating any software based musical studio.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129356244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586394
Tanmoy Hazra, M. Nene, C. R. S. Kumar
This paper aims to find optimal strategies for mobile sensors to search a mobile object in a square/rectangular grid environment. Strategies decide the initial position of mobile sensors, optimizing search space and number of mobile sensors assigned for searching the mobile object. In the proposed methodology, mobile sensors are searchers and the mobile object is the target. In this article, optimal strategies for different grid structures are analyzed and illustrated with suitable figures. Basic mathematical and logical concepts are applied to find the strategies. These strategies are invariable for any size of grid environment. The novelty of the proposed methodology is to determine strategies for searching a target using minimum number of searchers for all sizes of square/rectangular grid environments with 100% detection rate. To the best of our knowledge, no article presents or demonstrates such case study for making strategy policies to solve such kind of problems.
{"title":"Optimal strategies for searching a mobile object using mobile sensors in a grid environment","authors":"Tanmoy Hazra, M. Nene, C. R. S. Kumar","doi":"10.1109/ICACCS.2016.7586394","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586394","url":null,"abstract":"This paper aims to find optimal strategies for mobile sensors to search a mobile object in a square/rectangular grid environment. Strategies decide the initial position of mobile sensors, optimizing search space and number of mobile sensors assigned for searching the mobile object. In the proposed methodology, mobile sensors are searchers and the mobile object is the target. In this article, optimal strategies for different grid structures are analyzed and illustrated with suitable figures. Basic mathematical and logical concepts are applied to find the strategies. These strategies are invariable for any size of grid environment. The novelty of the proposed methodology is to determine strategies for searching a target using minimum number of searchers for all sizes of square/rectangular grid environments with 100% detection rate. To the best of our knowledge, no article presents or demonstrates such case study for making strategy policies to solve such kind of problems.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124704451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586382
Sudipto Roy, M. Nene
The criticality of maintaining a complete degree of secrecy for any critical infrastructure based communication is a must. The seriousness of the requirement ensures success in terms of financial and competitive gains. Such critical infrastructure can be closely related to the one used by the armed forces for their operational objectives. Defense forces of developed country are more rapidly moving towards a unified solution that will take care of the network and the communication security, thus ensuring interoperable modules between different plethora of equipment. However the same solution may not be apt for armies of developing countries. These developing countries use equipment whose profile are spread over decades of manufacturing. In addition, the countries in which communication and network devices have been developed are different with varied optimum operational parameters. Whereas a complete overhaul of network and communication equipment, aligning to all modern security standards is desired, the same may not be feasible for the economics of developing countries. This paper tries to analyze the network and communication security requirements of a critical infrastructure, as in case of armed forces, of a developing country. We also bring out the possible recommendations under the economic and vintage equipment profile constraints.
{"title":"Analysis and recommendations for network and communication security for mission critical infrastructure","authors":"Sudipto Roy, M. Nene","doi":"10.1109/ICACCS.2016.7586382","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586382","url":null,"abstract":"The criticality of maintaining a complete degree of secrecy for any critical infrastructure based communication is a must. The seriousness of the requirement ensures success in terms of financial and competitive gains. Such critical infrastructure can be closely related to the one used by the armed forces for their operational objectives. Defense forces of developed country are more rapidly moving towards a unified solution that will take care of the network and the communication security, thus ensuring interoperable modules between different plethora of equipment. However the same solution may not be apt for armies of developing countries. These developing countries use equipment whose profile are spread over decades of manufacturing. In addition, the countries in which communication and network devices have been developed are different with varied optimum operational parameters. Whereas a complete overhaul of network and communication equipment, aligning to all modern security standards is desired, the same may not be feasible for the economics of developing countries. This paper tries to analyze the network and communication security requirements of a critical infrastructure, as in case of armed forces, of a developing country. We also bring out the possible recommendations under the economic and vintage equipment profile constraints.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586404
K. Lalitha, V. M. Barkavi, R. Thangarajan, K. S. Preethi
In Wireless sensor networks (WSN), how to collect the major amount of data and reduce the data size is a delinquent issue. The existing methods concentrated on the data similarities based on the threshold limit. Those approaches may reduce the number of wireless communications but may not guarantee the bandwidth requirements. To ensure the communication and bandwidth requirements, clusters are framed based on the relationship of data and information gathering is done at the global level, in the sink node. A tree based routing topology known as convergecast is applied to transfer the collected information among sensors. The main aim of the time scheduling on a single frequency channel is to minimize the number of time slots required (schedule length) to complete convergecast. To reduce the effect of interference, multiple frequency transmission scheduling is implemented. The results predict that the communication and information gathering is greatly reduced without compromising the bandwidth requirements due to this global data collection approach.
{"title":"Program length based estimated facts assembly with minimal information loss in Wireless sensor networks","authors":"K. Lalitha, V. M. Barkavi, R. Thangarajan, K. S. Preethi","doi":"10.1109/ICACCS.2016.7586404","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586404","url":null,"abstract":"In Wireless sensor networks (WSN), how to collect the major amount of data and reduce the data size is a delinquent issue. The existing methods concentrated on the data similarities based on the threshold limit. Those approaches may reduce the number of wireless communications but may not guarantee the bandwidth requirements. To ensure the communication and bandwidth requirements, clusters are framed based on the relationship of data and information gathering is done at the global level, in the sink node. A tree based routing topology known as convergecast is applied to transfer the collected information among sensors. The main aim of the time scheduling on a single frequency channel is to minimize the number of time slots required (schedule length) to complete convergecast. To reduce the effect of interference, multiple frequency transmission scheduling is implemented. The results predict that the communication and information gathering is greatly reduced without compromising the bandwidth requirements due to this global data collection approach.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128105156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586357
Liang Mengdi, Zheng Wu, Xia Liangmeng
In this paper, it mainly introduces the study of wavelet analysis which is applied in the blasting vibration signal. Two methods, namely, decomposition and reconstruction of forcing denoising method and wavelet transform threshold denoising, are comparatively introduced in this paper. On the basis of two methods, a dual threshold shift invariant denoising method is proposed. Firstly, according to the specific circumstances, the layers of shift invariant are determined, and then the results after shift invariant should be de-noising with double threshold denoising method, finally, take the average of them, and fuse to get the final result. And it not only can remove the noise effectively, but also can save the detail information.
{"title":"Application of dual shift invariant wavelet transform in blasting vibration signal denoising","authors":"Liang Mengdi, Zheng Wu, Xia Liangmeng","doi":"10.1109/ICACCS.2016.7586357","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586357","url":null,"abstract":"In this paper, it mainly introduces the study of wavelet analysis which is applied in the blasting vibration signal. Two methods, namely, decomposition and reconstruction of forcing denoising method and wavelet transform threshold denoising, are comparatively introduced in this paper. On the basis of two methods, a dual threshold shift invariant denoising method is proposed. Firstly, according to the specific circumstances, the layers of shift invariant are determined, and then the results after shift invariant should be de-noising with double threshold denoising method, finally, take the average of them, and fuse to get the final result. And it not only can remove the noise effectively, but also can save the detail information.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586359
B. Reddy, K. Kuppusamy, T. Sivakumar
The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web pages. The Tag repository collects all potential tags and Attribute Truth Table is built over the Tag repository for giving the binary values for the attribute orders in the Tag repository. This Attribute Truth Table helps in concealing the secrete information into the web page. The decoding of the secrete information is carried out using tailor made client side plug-in.
{"title":"Towards Web page steganography with Attribute Truth Table","authors":"B. Reddy, K. Kuppusamy, T. Sivakumar","doi":"10.1109/ICACCS.2016.7586359","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586359","url":null,"abstract":"The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web pages. The Tag repository collects all potential tags and Attribute Truth Table is built over the Tag repository for giving the binary values for the attribute orders in the Tag repository. This Attribute Truth Table helps in concealing the secrete information into the web page. The decoding of the secrete information is carried out using tailor made client side plug-in.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}