Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977278
KS Shravya, A. Deepak, K. Chandrasekaran
Statistical results have predicted that 70% of world's population will reside in cities by the year 2050. With the advancement in the field of information and communication technology, the concept of smart cities is gaining more prominence. Smart cities use the ICT technology to improve the functioning of the city and enhance the community services provided. To keep the data in smart city secure, different existing security mechanisms have been deployed directly in smart or have been modified to smart city scale. Most of the security mechanisms today need cryptographic keys, hence, key generation plays a pivotal role in the security of any smart city. In this paper, we proposes a key generation methodology especially designed for smart cities using a random number generator which collects entropy from different user end devices and sensors present in the city and generate secure random keys at a central node. We have also tested our method against NSIT random number test suite and have got acceptable results.
{"title":"Smart key generation for smart cities","authors":"KS Shravya, A. Deepak, K. Chandrasekaran","doi":"10.1109/CIACT.2017.7977278","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977278","url":null,"abstract":"Statistical results have predicted that 70% of world's population will reside in cities by the year 2050. With the advancement in the field of information and communication technology, the concept of smart cities is gaining more prominence. Smart cities use the ICT technology to improve the functioning of the city and enhance the community services provided. To keep the data in smart city secure, different existing security mechanisms have been deployed directly in smart or have been modified to smart city scale. Most of the security mechanisms today need cryptographic keys, hence, key generation plays a pivotal role in the security of any smart city. In this paper, we proposes a key generation methodology especially designed for smart cities using a random number generator which collects entropy from different user end devices and sensors present in the city and generate secure random keys at a central node. We have also tested our method against NSIT random number test suite and have got acceptable results.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977350
Shilpi Garg, Anu Chaudhary
Multiprotocol Label Switching is an growing knowledge and very essential for now a days. It has an important position in the coming time of networks by given that Quality of Service (QoS), Traffic Engineering (TE), and enhancing speed, scalability. MPLS enhance the performance of the network by using signalling protocols for traffic engineering. Through the signalling protocol, traffic engineering selects the network paths for forwarding the packets to the routers in a balanced manner. This paper explains the study of performance analysis of Constraint-Based routed LDP signalling protocol and Resource Reservation Protocol-TE signalling protocol.
{"title":"A study of performance analysis of signaling protocols in MPLS","authors":"Shilpi Garg, Anu Chaudhary","doi":"10.1109/CIACT.2017.7977350","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977350","url":null,"abstract":"Multiprotocol Label Switching is an growing knowledge and very essential for now a days. It has an important position in the coming time of networks by given that Quality of Service (QoS), Traffic Engineering (TE), and enhancing speed, scalability. MPLS enhance the performance of the network by using signalling protocols for traffic engineering. Through the signalling protocol, traffic engineering selects the network paths for forwarding the packets to the routers in a balanced manner. This paper explains the study of performance analysis of Constraint-Based routed LDP signalling protocol and Resource Reservation Protocol-TE signalling protocol.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977351
Pushpa, R. Agrawal
This paper proposes a modelling technique for fault identification in a heterogeneous network. Heterogeneous network is the integration of wired network, cellular network, wireless local area network (WLAN), and Adhoc network, etc. There may be several numbers of causes and sub-causes of fault in each type of network. These causes of fault must be mitigated in order to have a secure and reliable system. The paper introduces a model based approach that starts with the enumeration of possible causes of each fault over the heterogeneous network. A framework is then created by such causes which diagrammatically describe the causes and sub-causes responsible for the occurrence of a fault. This paper suggests a conceptual fault cause tree model based on the probabilistic framework for ranking the faults and their possible causes. An effective mitigation strategy is required to mitigate the causes and sub-causes. Once mitigation of the cause creating a fault is achieved, the system is analyzed and tested for accuracy and reliability. The Proposed technique assures that all sub-causes even at the lowest level of abstraction is taken into consideration in making the system more robust against the particular fault. The proposed model is also used to analyze the faulty probability of a heterogeneous network.
{"title":"A robust fault modeling and prediction technique for heterogeneous network","authors":"Pushpa, R. Agrawal","doi":"10.1109/CIACT.2017.7977351","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977351","url":null,"abstract":"This paper proposes a modelling technique for fault identification in a heterogeneous network. Heterogeneous network is the integration of wired network, cellular network, wireless local area network (WLAN), and Adhoc network, etc. There may be several numbers of causes and sub-causes of fault in each type of network. These causes of fault must be mitigated in order to have a secure and reliable system. The paper introduces a model based approach that starts with the enumeration of possible causes of each fault over the heterogeneous network. A framework is then created by such causes which diagrammatically describe the causes and sub-causes responsible for the occurrence of a fault. This paper suggests a conceptual fault cause tree model based on the probabilistic framework for ranking the faults and their possible causes. An effective mitigation strategy is required to mitigate the causes and sub-causes. Once mitigation of the cause creating a fault is achieved, the system is analyzed and tested for accuracy and reliability. The Proposed technique assures that all sub-causes even at the lowest level of abstraction is taken into consideration in making the system more robust against the particular fault. The proposed model is also used to analyze the faulty probability of a heterogeneous network.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977272
Akanksha Kapoor, Abhishek Singhal
Clustering is essentially a procedure of grouping a set of objects in such a manner that items within the same clusters are more akin to each other compared with those data point or objects in different amassments or clusters. This paper discusses partition-predicated clustering techniques, such as K-Means, K-Means++ and object predicated Fuzzy C-Means clustering algorithm. This paper proposes a method for getting better clustering results by application of sorted and unsorted data into the algorithms. Elapsed time & total number of iterations are the factors on which, the behavioral patterns are analyzed. The experimental results shows that passing the sorted data instead of unsorted data not only effects the time complexity but withal ameliorates performance of these clustering techniques.
{"title":"A comparative study of K-Means, K-Means++ and Fuzzy C-Means clustering algorithms","authors":"Akanksha Kapoor, Abhishek Singhal","doi":"10.1109/CIACT.2017.7977272","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977272","url":null,"abstract":"Clustering is essentially a procedure of grouping a set of objects in such a manner that items within the same clusters are more akin to each other compared with those data point or objects in different amassments or clusters. This paper discusses partition-predicated clustering techniques, such as K-Means, K-Means++ and object predicated Fuzzy C-Means clustering algorithm. This paper proposes a method for getting better clustering results by application of sorted and unsorted data into the algorithms. Elapsed time & total number of iterations are the factors on which, the behavioral patterns are analyzed. The experimental results shows that passing the sorted data instead of unsorted data not only effects the time complexity but withal ameliorates performance of these clustering techniques.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977282
Priya, Vivek Singh Verma
Image segmentation is a most important operation over an image for analysis or identification purposes. Segmentation implies clear distinct delineation between object of interest and rest of the image data known as background. Segmentation algorithm is generally based on either finding the discontinuity or similarity of pixels in the local neighborhood, they are commonly termed region-based or boundary based. Most of the times, these algorithms do not produce accurate segmentation. In this paper, medical Image segmentation based on morphological operators along with threshold selection is presented. The main aim is to have better segmentation accuracy and clarity of segmented image since medical images are sensitive images.
{"title":"New morphological technique for medical image segmentation","authors":"Priya, Vivek Singh Verma","doi":"10.1109/CIACT.2017.7977282","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977282","url":null,"abstract":"Image segmentation is a most important operation over an image for analysis or identification purposes. Segmentation implies clear distinct delineation between object of interest and rest of the image data known as background. Segmentation algorithm is generally based on either finding the discontinuity or similarity of pixels in the local neighborhood, they are commonly termed region-based or boundary based. Most of the times, these algorithms do not produce accurate segmentation. In this paper, medical Image segmentation based on morphological operators along with threshold selection is presented. The main aim is to have better segmentation accuracy and clarity of segmented image since medical images are sensitive images.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977337
R. K. Tarai, V. Chandola, P. Kale
The decision to install a PV plant depends on three major factors: the climatic and environment conditions of the location, the viability of commercial operations, and the government policies. Economic feasibility of a PV system in the energy market depends on the cost of technology, the cost of installation, and the yield of the plant. Considering uncertain nature of climatic parameters, development of a reliable model to predict the energy output of a plant-to-be installed becomes essential. The presented study deals with PVGIS software method to estimate the total PV energy production of Odisha for a year. The proposed model considers only two meteorological variables collected from 1195 locations of Odisha: total annual incident global radiation on the surface of the module and annual average air temperature. The paper focuses on simplification at every stage of the development while analyzing the preciseness of the model.
{"title":"Development of the simplified predictive model for the estimation of annual PV energy production: A case study for Odisha","authors":"R. K. Tarai, V. Chandola, P. Kale","doi":"10.1109/CIACT.2017.7977337","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977337","url":null,"abstract":"The decision to install a PV plant depends on three major factors: the climatic and environment conditions of the location, the viability of commercial operations, and the government policies. Economic feasibility of a PV system in the energy market depends on the cost of technology, the cost of installation, and the yield of the plant. Considering uncertain nature of climatic parameters, development of a reliable model to predict the energy output of a plant-to-be installed becomes essential. The presented study deals with PVGIS software method to estimate the total PV energy production of Odisha for a year. The proposed model considers only two meteorological variables collected from 1195 locations of Odisha: total annual incident global radiation on the surface of the module and annual average air temperature. The paper focuses on simplification at every stage of the development while analyzing the preciseness of the model.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121360583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977339
A. Singh, M. Pathak, Y. S. Rao
This work presents a front-end a novel boost power factor converter for on-board plug-in electric vehicle battery charger. The converter has lower passive components size such as inductor and EMI filter. In addition, low switch stress and higher efficiency can be expected. As a result, the size of charger, charging time and cost of electricity is minimized. In addition, a detailed current stress model of this topology is presented for selection of power stage components as well as for efficiency calculation. The proposed converter is simulated in Matlab/Simulink environment to demonstrate its effectiveness.
{"title":"A multi-device front-end power factor converter for EV battery charger","authors":"A. Singh, M. Pathak, Y. S. Rao","doi":"10.1109/CIACT.2017.7977339","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977339","url":null,"abstract":"This work presents a front-end a novel boost power factor converter for on-board plug-in electric vehicle battery charger. The converter has lower passive components size such as inductor and EMI filter. In addition, low switch stress and higher efficiency can be expected. As a result, the size of charger, charging time and cost of electricity is minimized. In addition, a detailed current stress model of this topology is presented for selection of power stage components as well as for efficiency calculation. The proposed converter is simulated in Matlab/Simulink environment to demonstrate its effectiveness.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116251985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977379
Abhishek Tiwari, S. Ojha, Dmitry Pantiukhin
Video has an important entity that is shared over the network which is exchange through various devices like mobile, digital television, internet streaming. In the enhancement of bandwidth utilization from 2G to 3G and 3G to 4G, a lot of interest is found in video transmission so it's created issue of secure video transmission. In proposed approach, mainly focus invisible and robust video watermarking approach for H.264 standard and it's robustness against different special and temporal domain attacks. It has able to retrieved watermark without access of original video content. Experimental outcomes show that our proposed scheme outperforms.
{"title":"An effective approach for secure video watermarking based on H.264 coding standard","authors":"Abhishek Tiwari, S. Ojha, Dmitry Pantiukhin","doi":"10.1109/CIACT.2017.7977379","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977379","url":null,"abstract":"Video has an important entity that is shared over the network which is exchange through various devices like mobile, digital television, internet streaming. In the enhancement of bandwidth utilization from 2G to 3G and 3G to 4G, a lot of interest is found in video transmission so it's created issue of secure video transmission. In proposed approach, mainly focus invisible and robust video watermarking approach for H.264 standard and it's robustness against different special and temporal domain attacks. It has able to retrieved watermark without access of original video content. Experimental outcomes show that our proposed scheme outperforms.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977377
Usha Rani, Shashank Sahu
Clustering groups the objects into clusters having similarity with each other. This paper focuses on the two techniques of clustering i.e. hierarchical clustering and k-means clustering. The research is to compare various similarities measuring methods and finding out the best one. Research work is started by selecting different categories of textual contents or articles. For each selected category, articles have been selected from various news channels. Search words are identified which are most relevant for a respective category. Now these words are used as input for processing in the program to create a matrix of words. This matrix is then processed in Matlab using different measuring methods. The final outcome is demonstrated by the Cophenatic correlation coefficient & Silhouette Value to find out the best method of similarity measure. In this paper, five categories have been selected for the analysis which are “Business”, “Education”, “Election”, “Entertainment” and “Game” and 28 news articles have been filtered out for each category from various news channels. Different numbers of words are selected like 35, 49, 25, 30 and 35 against the mentioned categories for the implementation of the proposed technique. The research work finally concludes that for hierarchical clustering — ‘Cityblock’ and for k-means clustering — ‘Correlation’ is the best method however cityblock is at second position in the k-means clustering.
{"title":"Comparison of clustering techniques for measuring similarity in articles","authors":"Usha Rani, Shashank Sahu","doi":"10.1109/CIACT.2017.7977377","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977377","url":null,"abstract":"Clustering groups the objects into clusters having similarity with each other. This paper focuses on the two techniques of clustering i.e. hierarchical clustering and k-means clustering. The research is to compare various similarities measuring methods and finding out the best one. Research work is started by selecting different categories of textual contents or articles. For each selected category, articles have been selected from various news channels. Search words are identified which are most relevant for a respective category. Now these words are used as input for processing in the program to create a matrix of words. This matrix is then processed in Matlab using different measuring methods. The final outcome is demonstrated by the Cophenatic correlation coefficient & Silhouette Value to find out the best method of similarity measure. In this paper, five categories have been selected for the analysis which are “Business”, “Education”, “Election”, “Entertainment” and “Game” and 28 news articles have been filtered out for each category from various news channels. Different numbers of words are selected like 35, 49, 25, 30 and 35 against the mentioned categories for the implementation of the proposed technique. The research work finally concludes that for hierarchical clustering — ‘Cityblock’ and for k-means clustering — ‘Correlation’ is the best method however cityblock is at second position in the k-means clustering.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/CIACT.2017.7977346
Grayson Himunzowa, F. Smith
The most recent technique for tuning proportional-integral-differential(PID) controllers is the Iterative Feedback Tuning (IFT) technique. The IFT has gone through many phases of improvement, such as increased transient performance, accelerated convergence, strengthened technique robustness and modified system stability. In this paper we propose the study of IFT technique in a view to create a novel hardware that implements IFT technique. To accomplish the said proposal, we carried out an overview of IFT technique basic theory and applications so that algorithm's expressions are refined to simplify development of hardware architecture. Then VHDL code is developed, simulated, and implemented on to the National Instruments (NI) Digital Electronics FPGA Board.
{"title":"Study of IFT technique in a view to create a novel hardware","authors":"Grayson Himunzowa, F. Smith","doi":"10.1109/CIACT.2017.7977346","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977346","url":null,"abstract":"The most recent technique for tuning proportional-integral-differential(PID) controllers is the Iterative Feedback Tuning (IFT) technique. The IFT has gone through many phases of improvement, such as increased transient performance, accelerated convergence, strengthened technique robustness and modified system stability. In this paper we propose the study of IFT technique in a view to create a novel hardware that implements IFT technique. To accomplish the said proposal, we carried out an overview of IFT technique basic theory and applications so that algorithm's expressions are refined to simplify development of hardware architecture. Then VHDL code is developed, simulated, and implemented on to the National Instruments (NI) Digital Electronics FPGA Board.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129369999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}