首页 > 最新文献

2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
An IoT based soil moisture monitoring on Losant platform 基于物联网的Losant平台土壤湿度监测
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918063
R. Kodali, A. Sahu
The Internet of Things (IoT) is converting the agriculture industry and solving the immense problems or the major challenges faced by the farmers todays in the field. India is one of the 13th countries in the world having scarcity of water resources. Due to ever increasing of world population, we are facing difficulties in the shortage of water resources, limited availability of land, difficult to manage the costs while meeting the demands of increasing consumption needs of a global population that is expected to grow by 70% by the year 2050. The influence of population growth on agriculture leads to a miserable impact on the farmers livelihood. To overcome the problems we design a low cost system for monitoring the agriculture farm which continuously measure the level of soil moisture of the plants and alert the farmers if the moisture content of particular plants is low via sms or an email. This system uses an esp8266 microcontroller and a moisture sensor using Losant platform. Losant is a simple and most powerful IoT cloud platform for the development of coming generation. It offers the real time data visualization of sensors data which can be operate from any part of the world irrespective of the position of field.
物联网(IoT)正在改变农业产业,并解决当今农民在田间面临的巨大问题或主要挑战。印度是世界上水资源短缺的第13个国家之一。由于世界人口的不断增加,我们面临着水资源短缺、土地有限、难以管理成本的困难,同时满足全球人口日益增长的消费需求,预计到2050年将增长70%。人口增长对农业的影响给农民的生计带来了悲惨的影响。为了克服这些问题,我们设计了一个低成本的农业监测系统,该系统可以持续测量植物的土壤水分水平,并通过短信或电子邮件提醒农民特定植物的水分含量低。本系统采用esp8266单片机和Losant平台的湿度传感器。Losant是一个简单而强大的物联网云平台,用于下一代的开发。它提供了传感器数据的实时数据可视化,可以从世界任何地方操作,而不管现场的位置。
{"title":"An IoT based soil moisture monitoring on Losant platform","authors":"R. Kodali, A. Sahu","doi":"10.1109/IC3I.2016.7918063","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918063","url":null,"abstract":"The Internet of Things (IoT) is converting the agriculture industry and solving the immense problems or the major challenges faced by the farmers todays in the field. India is one of the 13th countries in the world having scarcity of water resources. Due to ever increasing of world population, we are facing difficulties in the shortage of water resources, limited availability of land, difficult to manage the costs while meeting the demands of increasing consumption needs of a global population that is expected to grow by 70% by the year 2050. The influence of population growth on agriculture leads to a miserable impact on the farmers livelihood. To overcome the problems we design a low cost system for monitoring the agriculture farm which continuously measure the level of soil moisture of the plants and alert the farmers if the moisture content of particular plants is low via sms or an email. This system uses an esp8266 microcontroller and a moisture sensor using Losant platform. Losant is a simple and most powerful IoT cloud platform for the development of coming generation. It offers the real time data visualization of sensors data which can be operate from any part of the world irrespective of the position of field.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Low cost ambient monitoring using ESP8266 采用ESP8266的低成本环境监测
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918788
R. Kodali, K. S. Mahesh
A different language is different vision of life. Micropython is the open source scripting language and an interpreter that expresses the concepts in fewer lines of codes. This high level language possesses clear and expressive codes which is designed to respond to the actions. It is a lean and efficient implementation of python 3 programming language that comes with the quick language feedback and is optimized for interactive input to run on microcontroller or embedded systems. This functional and dynamic programming language is ported to ESP8266 board. The DHT11 sensor is interfaced with ESP8266 board to sense the ambient conditions like temperature and humidity. The dht module which is confined to DHT sensor is being imported to perform its programming task. The OLED display used here have dimensions of 128×64, it has an I2C interface and can be driven by SSD1306 driver. Firstly, the library for the SSD1306 driver of the chip needs to be imported. The ESP8266 board have two connections, one with the DHT11 sensor to sense the temperature and humidity, and the second with OLED display to show the collected information of temperature and humidity from DHT11 sensor on to the screen. These all are implemented using lean and efficient Micropython language and thus it is easy to control hardware and connected devices using Micropython.
不同的语言是不同的人生观。Micropython是一种开源脚本语言和解释器,可以用更少的代码行来表达概念。这种高级语言具有清晰而富有表现力的代码,旨在对行为做出反应。它是python 3编程语言的精简和高效实现,具有快速的语言反馈,并针对在微控制器或嵌入式系统上运行的交互式输入进行了优化。该函数式动态编程语言可移植到ESP8266板上。DHT11传感器与ESP8266板接口,用于感知环境条件,如温度和湿度。导入dht模块,完成dht传感器的编程任务。这里使用的OLED显示屏尺寸为128×64,它有一个I2C接口,可以由SSD1306驱动。首先,需要导入芯片的SSD1306驱动程序库。ESP8266板有两个连接,一个是与DHT11传感器连接,用于感知温湿度,另一个是与OLED显示器连接,用于将DHT11传感器采集到的温湿度信息显示在屏幕上。这些都是使用精简高效的Micropython语言实现的,因此使用Micropython很容易控制硬件和连接的设备。
{"title":"Low cost ambient monitoring using ESP8266","authors":"R. Kodali, K. S. Mahesh","doi":"10.1109/IC3I.2016.7918788","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918788","url":null,"abstract":"A different language is different vision of life. Micropython is the open source scripting language and an interpreter that expresses the concepts in fewer lines of codes. This high level language possesses clear and expressive codes which is designed to respond to the actions. It is a lean and efficient implementation of python 3 programming language that comes with the quick language feedback and is optimized for interactive input to run on microcontroller or embedded systems. This functional and dynamic programming language is ported to ESP8266 board. The DHT11 sensor is interfaced with ESP8266 board to sense the ambient conditions like temperature and humidity. The dht module which is confined to DHT sensor is being imported to perform its programming task. The OLED display used here have dimensions of 128×64, it has an I2C interface and can be driven by SSD1306 driver. Firstly, the library for the SSD1306 driver of the chip needs to be imported. The ESP8266 board have two connections, one with the DHT11 sensor to sense the temperature and humidity, and the second with OLED display to show the collected information of temperature and humidity from DHT11 sensor on to the screen. These all are implemented using lean and efficient Micropython language and thus it is easy to control hardware and connected devices using Micropython.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Implementation of neural network for channel estimation in OFDM network OFDM网络中信道估计的神经网络实现
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918004
Ravinder Kaur, Rinkesh Mittal
Channel estimation is an important field of interest in wireless OFDM networks. Lot of work has been done in this field, but only few techniques has presented good efficiency in channel estimation in OFDM network. This paper has presented the neural network based channel estimation for OFDM network using Raleigh channel. From result simulation, it has been concluded that obtained values of Mean Square Error (MSE) and Bit Error Rate (BER) are satisfactory using neural network in MATLAB environment.
信道估计是无线OFDM网络研究的一个重要领域。在这方面已经做了大量的工作,但只有少数技术在OFDM网络中表现出较好的信道估计效率。提出了一种基于神经网络的基于罗利信道的OFDM网络信道估计方法。仿真结果表明,在MATLAB环境下利用神经网络得到的均方误差(MSE)和误码率(BER)是令人满意的。
{"title":"Implementation of neural network for channel estimation in OFDM network","authors":"Ravinder Kaur, Rinkesh Mittal","doi":"10.1109/IC3I.2016.7918004","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918004","url":null,"abstract":"Channel estimation is an important field of interest in wireless OFDM networks. Lot of work has been done in this field, but only few techniques has presented good efficiency in channel estimation in OFDM network. This paper has presented the neural network based channel estimation for OFDM network using Raleigh channel. From result simulation, it has been concluded that obtained values of Mean Square Error (MSE) and Bit Error Rate (BER) are satisfactory using neural network in MATLAB environment.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126511808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm for fuzzy based compression of gray JPEG images for big data storage 基于模糊压缩的灰度JPEG图像大数据存储算法
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918019
N. Kaur, N. Bawa
In the current era of big data and data mining, efficient storage of images is very important. In the collected datasets from blogs or social network sites, images are one of the prominent part of that datasets. Images took very large space for storage and even loading when required by the third party. So, image compression is one of the important part in big data and effective data mining. These applications require rapid image processing both at the front and back end. So, one of the most important step in storing and retrieving images is the effective compression of images. Images should be stored in compressed form and compression should not decrease the quality of the image. Many standards for compression of grey images are available. However, this area is still open for research purpose. Moreover, increase in variety of images over the internet demand the use of fuzzy based compression techniques, as also mentioned. In this paper, fuzzy based technique is used for compressing the grey JPEG images. It provides high level of compression and reduced level of errors in the images. Proposed technique also reduced different type of artifacts such as blocking artifacts, ringing artifacts and false contouring. Proposed compression can be effectively used for big data based storing and retrieval of images.
在当前的大数据和数据挖掘时代,图像的高效存储非常重要。在从博客或社交网站收集的数据集中,图像是该数据集的突出部分之一。图像占用了非常大的存储空间,甚至在第三方需要时也需要加载。因此,图像压缩是大数据和有效数据挖掘的重要组成部分之一。这些应用需要在前端和后端进行快速的图像处理。因此,对图像进行有效的压缩是存储和检索图像的重要步骤之一。图像应以压缩形式存储,压缩不应降低图像质量。有许多用于压缩灰度图像的标准。然而,这一领域仍然是开放的研究目的。此外,如前所述,互联网上图像种类的增加需要使用基于模糊的压缩技术。本文采用基于模糊的技术对JPEG灰度图像进行压缩。它提供了高水平的压缩,并减少了图像中的错误。该技术还减少了不同类型的伪影,如阻塞伪影、振铃伪影和假轮廓伪影。提出的压缩方法可以有效地用于基于大数据的图像存储和检索。
{"title":"Algorithm for fuzzy based compression of gray JPEG images for big data storage","authors":"N. Kaur, N. Bawa","doi":"10.1109/IC3I.2016.7918019","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918019","url":null,"abstract":"In the current era of big data and data mining, efficient storage of images is very important. In the collected datasets from blogs or social network sites, images are one of the prominent part of that datasets. Images took very large space for storage and even loading when required by the third party. So, image compression is one of the important part in big data and effective data mining. These applications require rapid image processing both at the front and back end. So, one of the most important step in storing and retrieving images is the effective compression of images. Images should be stored in compressed form and compression should not decrease the quality of the image. Many standards for compression of grey images are available. However, this area is still open for research purpose. Moreover, increase in variety of images over the internet demand the use of fuzzy based compression techniques, as also mentioned. In this paper, fuzzy based technique is used for compressing the grey JPEG images. It provides high level of compression and reduced level of errors in the images. Proposed technique also reduced different type of artifacts such as blocking artifacts, ringing artifacts and false contouring. Proposed compression can be effectively used for big data based storing and retrieval of images.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of signal behavior through dynamic traffic control: Proposed algorithm with traffic profiling 基于动态交通控制的信号行为优化:基于交通分析的算法
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918033
Bhushan S. Atote, Dr Mangesh Bedekar, S. Panicker, Taranpreet Singh, S. Zahoor
The current scenario of traffic signals in India is fixed time, leading to more pollution, wastage of time and precious fuel. This paper proposes the method to make traffic signals intelligent with the dynamic signal values on the basis of different parameters. This method shall drastically reduce time, fuel and also suggest alternate routes that are congestion free. There are different adaptive strategies for traffic control but with their limitations of particular region and junctions, it is required to make it more precise for a specific network of junctions. For creating the real traffic scenario, consider that all vehicles are equipped with the Bluetooth devices. Our proposed algorithm shows the dynamic traffic control and traffic profiling for the given time.
印度目前的交通信号是固定时间的,这导致了更多的污染,浪费了时间和宝贵的燃料。本文提出了基于不同参数的动态信号值实现交通信号智能化的方法。这种方法将大大减少时间和燃料,并建议没有拥堵的替代路线。交通控制有不同的自适应策略,但由于其对特定区域和路口的限制,需要对特定的路口网络进行更精确的控制。为了创建真实的交通场景,假设所有车辆都配备了蓝牙设备。我们提出的算法显示了给定时间的动态流量控制和流量分析。
{"title":"Optimization of signal behavior through dynamic traffic control: Proposed algorithm with traffic profiling","authors":"Bhushan S. Atote, Dr Mangesh Bedekar, S. Panicker, Taranpreet Singh, S. Zahoor","doi":"10.1109/IC3I.2016.7918033","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918033","url":null,"abstract":"The current scenario of traffic signals in India is fixed time, leading to more pollution, wastage of time and precious fuel. This paper proposes the method to make traffic signals intelligent with the dynamic signal values on the basis of different parameters. This method shall drastically reduce time, fuel and also suggest alternate routes that are congestion free. There are different adaptive strategies for traffic control but with their limitations of particular region and junctions, it is required to make it more precise for a specific network of junctions. For creating the real traffic scenario, consider that all vehicles are equipped with the Bluetooth devices. Our proposed algorithm shows the dynamic traffic control and traffic profiling for the given time.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"92 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new design of digitally controlled oscillator for low power applications 一种适用于低功耗应用的新型数字控制振荡器
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918047
S. Dabas, Manoj Kumar
With the utilization of all-digital Phase locked loops (ADPLLs) in digital communication systems, the use of digitally controlled oscillators (DCO) over voltage controlled oscillators (VCO) has come into existence. In this paper, a new low power DCO structure is proposed with NMOS transistor as switching network. The DCO design is based on the CMOS inverter delay cells and ring topology. Three and five stages DCO architecture with three and four control bits have been designed here with a NMOS switching network. Three-bit DCO with three delay stages shows a variation of output frequency and power consumption in the range of 1.804–2.629 GHz and 44.464–73.023 μW, respectively. For three-bit five-stages DCO the output frequency and power consumption varies in the range of 1.004–1.479 GHz and 74.107–121.705 μW. A four-bit, three-stages DCO shows a variation of output frequency and power consumption in the range of 1.948–2.875 GHz and 44.464–85.489 μW. Similarly, a four-bit five-stages DCO provides a variation of output frequency and power consumption in the range of 1.115–1.676 GHz and 74.107–142.482 μW. The control bits for the three-bit DCO are varied from [001] to [111] and for four-bit DCO the control bits are varied from [0001] to [1111]. The simulations are done using Mentor Graphics tool with TSMC 0.18 μm CMOS technology.
随着全数字锁相环(adpll)在数字通信系统中的应用,数字控制振荡器(DCO)和过压控制振荡器(VCO)的应用应运而生。本文提出了一种以NMOS晶体管作为开关网络的低功耗DCO结构。DCO设计基于CMOS逆变器延迟单元和环形拓扑结构。在NMOS交换网络中,设计了3位和4位控制的三级和五级DCO架构。3位延迟级DCO的输出频率变化范围为1.804 ~ 2.629 GHz,功耗变化范围为44.464 ~ 73.023 μW。对于三位五级DCO,输出频率和功耗范围分别为1.004 ~ 1.479 GHz和74.107 ~ 121.705 μW。4位3级DCO的输出频率和功耗变化范围分别为1.948 ~ 2.875 GHz和44.464 ~ 85.489 μW。同样,4位5级DCO提供1.115-1.676 GHz和74.107-142.482 μW范围内的输出频率和功耗变化。3位DCO的控制位从[001]到[111]不等,4位DCO的控制位从[0001]到[1111]不等。仿真采用Mentor Graphics工具,采用TSMC 0.18 μm CMOS工艺。
{"title":"A new design of digitally controlled oscillator for low power applications","authors":"S. Dabas, Manoj Kumar","doi":"10.1109/IC3I.2016.7918047","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918047","url":null,"abstract":"With the utilization of all-digital Phase locked loops (ADPLLs) in digital communication systems, the use of digitally controlled oscillators (DCO) over voltage controlled oscillators (VCO) has come into existence. In this paper, a new low power DCO structure is proposed with NMOS transistor as switching network. The DCO design is based on the CMOS inverter delay cells and ring topology. Three and five stages DCO architecture with three and four control bits have been designed here with a NMOS switching network. Three-bit DCO with three delay stages shows a variation of output frequency and power consumption in the range of 1.804–2.629 GHz and 44.464–73.023 μW, respectively. For three-bit five-stages DCO the output frequency and power consumption varies in the range of 1.004–1.479 GHz and 74.107–121.705 μW. A four-bit, three-stages DCO shows a variation of output frequency and power consumption in the range of 1.948–2.875 GHz and 44.464–85.489 μW. Similarly, a four-bit five-stages DCO provides a variation of output frequency and power consumption in the range of 1.115–1.676 GHz and 74.107–142.482 μW. The control bits for the three-bit DCO are varied from [001] to [111] and for four-bit DCO the control bits are varied from [0001] to [1111]. The simulations are done using Mentor Graphics tool with TSMC 0.18 μm CMOS technology.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
H-WSN with maximized QoS using secure data aggregation 利用安全数据聚合实现QoS最大化的H-WSN
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917950
Renuka D. Suryawanshi
To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.
为了执行一些操作,节点上需要一定数量的能量,这与在网络中发送单个数据相同。数据传输在传感器网络中传输数据,减少了网络的生存时间。因此需要降低能耗以提高网络的生命周期。簇头作为集群的聚合节点,在集群成员之间进行通信时,簇头可以多次参与通信。这就是簇头的能量利用率比簇中其他成员高的原因。目前的系统有一种方法可以选择簇头计划外由于其高水平的能源消耗。为了解决这一问题,我们引入了一种基于与基站的距离和剩余能量选择有效簇头的系统表示技术。在选择簇头后,利用了较少的传感器网络能量,有助于提高传感器网络的网络寿命。聚合从集群成员接收到的数据是集群中集群头的职责。数据的验证由簇头在数据聚合之前完成,如果接收到的数据无效,则丢弃接收到的数据。只有经过验证的数据才会在簇头进行聚合。采用同态加密方法进行加密,加密后的信息发送到簇头,由基站(BS)进行信息解密,实现端到端安全。提出了一种基于ID的逐跳认证技术。在本文中,我们提出了恢复由于缓冲区溢出而丢失的数据的方法。在给定的系统中,缓存存储器由簇头提供,用于恢复数据丢失。最后的测试结果表明,根据Jung模拟器上的时间和能耗等参数,所提出的系统与现有系统相比是良好的。
{"title":"H-WSN with maximized QoS using secure data aggregation","authors":"Renuka D. Suryawanshi","doi":"10.1109/IC3I.2016.7917950","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917950","url":null,"abstract":"To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A study on disruption tolerant session based mobile architecture 基于容错会话的移动架构研究
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918795
S. Vijayan, R. Divya
There are lots of Challenges while using IP mobility. Among that route optimization and frequent handover is most important. Preserving communication between two moving end points on the Internet is difficult. For efficient mobility multiple access points are needed, so frequent handover is always needed for getting appropriate access points. Handling mobility will leads to performance degradation. Also unexpected disconnection is problematic for session-based applications which maintains state and consume resources. Thus stability and connectivity are the notable challenges for a smooth data transmission in the mobile environment. A disruption Tolerant Session based Mobile Architecture is a method suitable to solve these problems. A Disruption tolerant Session based Mobile Architecture is a solution that allow minimum disconnection time to enable seamless mobility. This architecture is a TCP based Application suitable for secure connection establishment, reliable end to end transmission. The session scheme used in the architecture allows mobility for TCP-based applications which need flexibility to failures, delays or disconnection and also provides session services, such as tracking mobile nodes, detecting disruptions, and suspending and resuming sessions with efficiency, security, and reliability. By using this architecture disruptions can be detected in microseconds and recovery takes only milliseconds.
在使用IP移动性时存在许多挑战。其中路线优化和频繁切换最为重要。保持互联网上两个移动端点之间的通信是很困难的。为了实现高效的移动,需要多个接入点,因此需要频繁的切换以获得合适的接入点。处理移动性将导致性能下降。此外,对于维护状态和消耗资源的基于会话的应用程序来说,意外断开也是有问题的。因此,稳定性和连接性是在移动环境中实现平稳数据传输的显著挑战。基于中断容忍会话的移动架构是一种适合解决这些问题的方法。基于中断容忍会话的移动架构是一种解决方案,它允许最小的断开时间来实现无缝移动。该体系结构是一种基于TCP的应用程序,适用于建立安全的连接,可靠的端到端传输。该体系结构中使用的会话方案允许基于tcp的应用程序的移动性,这些应用程序需要灵活地应对故障、延迟或断开连接,并且还提供会话服务,例如跟踪移动节点、检测中断以及高效、安全和可靠地暂停和恢复会话。通过使用这种体系结构,可以在几微秒内检测到中断,而恢复只需几毫秒。
{"title":"A study on disruption tolerant session based mobile architecture","authors":"S. Vijayan, R. Divya","doi":"10.1109/IC3I.2016.7918795","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918795","url":null,"abstract":"There are lots of Challenges while using IP mobility. Among that route optimization and frequent handover is most important. Preserving communication between two moving end points on the Internet is difficult. For efficient mobility multiple access points are needed, so frequent handover is always needed for getting appropriate access points. Handling mobility will leads to performance degradation. Also unexpected disconnection is problematic for session-based applications which maintains state and consume resources. Thus stability and connectivity are the notable challenges for a smooth data transmission in the mobile environment. A disruption Tolerant Session based Mobile Architecture is a method suitable to solve these problems. A Disruption tolerant Session based Mobile Architecture is a solution that allow minimum disconnection time to enable seamless mobility. This architecture is a TCP based Application suitable for secure connection establishment, reliable end to end transmission. The session scheme used in the architecture allows mobility for TCP-based applications which need flexibility to failures, delays or disconnection and also provides session services, such as tracking mobile nodes, detecting disruptions, and suspending and resuming sessions with efficiency, security, and reliability. By using this architecture disruptions can be detected in microseconds and recovery takes only milliseconds.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"118 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure AODV routing protocol based on homomorphic digital signature 基于同态数字签名的安全AODV路由协议
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917980
G. Jain, Gajendra Singh Rajawat
Mobile hosts in a Mobile Ad-Hoc Network are linked by wireless links without usual routing infrastructure and link fixed routers. Ad-Hoc Distance vector Routing (AODV) is among one of the prominently used routing protocol for packet transfer from source to destination. It relies on maintaining most recent information, for which, each ad-hoc node maintains hop count and sequence number field. Ad-hoc nodes are prone to security attacks because of their mutable nature. Analogously, routing updates are transmitted in clear text, which again poses a security hazard. In this paper, we will propose an improved version of AODV routing protocol using Homomorphic Encryption Scheme which prevents pollution attack and accomplishes in maintaining Integrity Security Standard by following minimum hop count path. Simulation mechanism is used to evaluate HAODV Routing Scheme and results show that improved throughput and ETE delay can be obtained.
移动Ad-Hoc网络中的移动主机通过无线链路连接,不需要通常的路由基础设施,并连接固定路由器。Ad-Hoc距离矢量路由(AODV)是数据包从源到目的传输的重要路由协议之一。它依赖于维护最新的信息,为此,每个ad-hoc节点维护跳数和序列号字段。Ad-hoc节点由于其易变的特性,容易受到安全攻击。类似地,路由更新以明文形式传输,这也会带来安全隐患。在本文中,我们将提出一个改进版本的AODV路由协议,使用同态加密方案,防止污染攻击,并通过遵循最小跳数路径来保持完整性安全标准。利用仿真机制对HAODV路由方案进行了评估,结果表明,HAODV路由方案可以提高吞吐量和延迟时间。
{"title":"Secure AODV routing protocol based on homomorphic digital signature","authors":"G. Jain, Gajendra Singh Rajawat","doi":"10.1109/IC3I.2016.7917980","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917980","url":null,"abstract":"Mobile hosts in a Mobile Ad-Hoc Network are linked by wireless links without usual routing infrastructure and link fixed routers. Ad-Hoc Distance vector Routing (AODV) is among one of the prominently used routing protocol for packet transfer from source to destination. It relies on maintaining most recent information, for which, each ad-hoc node maintains hop count and sequence number field. Ad-hoc nodes are prone to security attacks because of their mutable nature. Analogously, routing updates are transmitted in clear text, which again poses a security hazard. In this paper, we will propose an improved version of AODV routing protocol using Homomorphic Encryption Scheme which prevents pollution attack and accomplishes in maintaining Integrity Security Standard by following minimum hop count path. Simulation mechanism is used to evaluate HAODV Routing Scheme and results show that improved throughput and ETE delay can be obtained.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of back propagation training algorithms for software defect prediction 软件缺陷预测的反向传播训练算法比较
Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917934
Ishani Arora, A. Saha
The cost of deleting a software bug increases ten times as it is floated onto the next phase of software development lifecycle (SDLC). This makes the task of the project managers difficult and also degrades the quality of the output software product. Software defect prediction (SDP) was proposed as a solution to the problem which could anticipate the defective modules and hence, deal with them in an efficient and effective manner in advance. The adequacy of artificial neural networks (ANNs) to handle the complex nonlinear relationships between the software metrics and the defect data demonstrates their suitability to build the defect prediction models. In this paper, multilayer feed forward back propagation based neural networks were constructed using seven defect datasets from the PROMISE repository. An empirical comparison of Levenberg-Marquardt (LM), Resilient back propagation (RP) and Bayesian Regularization (BR) back propagation training algorithms was performed using statistical measures such as MSE and R2 values and the parameters computed from the confusion matrix. Bayesian based back propagation training method performed better than the LM and RP techniques in terms of minimizing mean square error and type II error and maximizing accuracy, sensitivity and R2 value. An accuracy of more than 90 percent was achieved by BR on all the seven datasets and the best data fit during the regression analysis was shown with a R2 value of 0.96. Overall, it is the context and the criticality of the software project which will aid the project managers to prioritize the performance measures and hence, decide upon the training algorithm to be applied, according to the goals and resources available.
在软件开发生命周期(SDLC)的下一个阶段,删除软件缺陷的成本会增加十倍。这使得项目经理的任务变得困难,也降低了输出软件产品的质量。软件缺陷预测(Software defect prediction, SDP)是一种能够提前预测缺陷模块并对其进行有效处理的方法。人工神经网络(ann)处理软件度量与缺陷数据之间复杂非线性关系的能力证明了其建立缺陷预测模型的适用性。本文利用PROMISE存储库中的7个缺陷数据集,构建了基于多层前馈-反向传播的神经网络。利用MSE和R2值等统计度量以及从混淆矩阵中计算的参数,对Levenberg-Marquardt (LM)、弹性反向传播(RP)和贝叶斯正则化(BR)反向传播训练算法进行了实证比较。基于贝叶斯的反向传播训练方法在均方误差和II型误差最小、精度、灵敏度和R2值最大等方面优于LM和RP技术。BR在所有7个数据集上的准确率均超过90%,回归分析期间的最佳数据拟合显示R2值为0.96。总的来说,软件项目的环境和重要性将帮助项目经理根据目标和可用资源确定性能度量的优先级,从而决定要应用的训练算法。
{"title":"Comparison of back propagation training algorithms for software defect prediction","authors":"Ishani Arora, A. Saha","doi":"10.1109/IC3I.2016.7917934","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917934","url":null,"abstract":"The cost of deleting a software bug increases ten times as it is floated onto the next phase of software development lifecycle (SDLC). This makes the task of the project managers difficult and also degrades the quality of the output software product. Software defect prediction (SDP) was proposed as a solution to the problem which could anticipate the defective modules and hence, deal with them in an efficient and effective manner in advance. The adequacy of artificial neural networks (ANNs) to handle the complex nonlinear relationships between the software metrics and the defect data demonstrates their suitability to build the defect prediction models. In this paper, multilayer feed forward back propagation based neural networks were constructed using seven defect datasets from the PROMISE repository. An empirical comparison of Levenberg-Marquardt (LM), Resilient back propagation (RP) and Bayesian Regularization (BR) back propagation training algorithms was performed using statistical measures such as MSE and R2 values and the parameters computed from the confusion matrix. Bayesian based back propagation training method performed better than the LM and RP techniques in terms of minimizing mean square error and type II error and maximizing accuracy, sensitivity and R2 value. An accuracy of more than 90 percent was achieved by BR on all the seven datasets and the best data fit during the regression analysis was shown with a R2 value of 0.96. Overall, it is the context and the criticality of the software project which will aid the project managers to prioritize the performance measures and hence, decide upon the training algorithm to be applied, according to the goals and resources available.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127756784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1