Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877499
S. Agrwal, M. Sharma, D. Kumari, S. Gupta
Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression is lossy compression technique. The disadvantage of DWT based compression is fraction loss in embedding which increases mean square error and results decreasing PSNR. Quality of decompressed image is proportional to PSNR. The Proposed compression approach use integer wavelet transforms to overcome above fraction loss. The paper presents Hybrid Integer wavelet transform (IWT) and discrete cosine transform (DCT) based compression technique to obtain increased quality of decompressed image compared to DWT+ DCT based compression technique. The proposed combined IWT + DCT based compression technique reduces the fractional loss compared to DWT based compression so the proposed technique provides better image quality of decompressed image on high compression ratio compared to DWT based and hybrid DWT DCT based image compression techniques.
{"title":"Improved image compression technique using IWT-DCT transformation","authors":"S. Agrwal, M. Sharma, D. Kumari, S. Gupta","doi":"10.1109/NGCT.2016.7877499","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877499","url":null,"abstract":"Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression is lossy compression technique. The disadvantage of DWT based compression is fraction loss in embedding which increases mean square error and results decreasing PSNR. Quality of decompressed image is proportional to PSNR. The Proposed compression approach use integer wavelet transforms to overcome above fraction loss. The paper presents Hybrid Integer wavelet transform (IWT) and discrete cosine transform (DCT) based compression technique to obtain increased quality of decompressed image compared to DWT+ DCT based compression technique. The proposed combined IWT + DCT based compression technique reduces the fractional loss compared to DWT based compression so the proposed technique provides better image quality of decompressed image on high compression ratio compared to DWT based and hybrid DWT DCT based image compression techniques.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877479
Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil
Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges, cluster based hybrid CF approach is proposed in this paper which uses item-based CF algorithm combined with user demographic based CF algorithm in clusters weighted mechanism. The proposed system is adaptable and extendable which is fruitful in addressing not only user cold start issues but also item cold start issues along with sparsity problem, with lower MAE enhancing the structure to give better suggestion progressively.
{"title":"An efficient system using item & user-based CF techniques to improve recommendation","authors":"Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil","doi":"10.1109/NGCT.2016.7877479","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877479","url":null,"abstract":"Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges, cluster based hybrid CF approach is proposed in this paper which uses item-based CF algorithm combined with user demographic based CF algorithm in clusters weighted mechanism. The proposed system is adaptable and extendable which is fruitful in addressing not only user cold start issues but also item cold start issues along with sparsity problem, with lower MAE enhancing the structure to give better suggestion progressively.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877420
Vikas Kumar, T. Choudhury, S. Sabitha
Tangible User Interface (TUI) started with the invention of mouse and keyboard. Since the last two decades, TUI has experienced tremendous growth and has provided us with a link between the physical and the digital world. Even though, MIT Tangible Lab develops several tangible interface models every year, the research work in TUI is still in its infancy and extensive work is required to fully understand the potential of Tangible User Interfaces. This paper describes a brief history and some landmark Tangible User Interface models. It first acknowledges the existing work in TUI. Then, it is followed by the comparison between several TUI models. The paper brings out methods and technologies which are used in building TUI. It also aims at finding the advantages, disadvantages and applications of some TUI models. The paper concludes with finding those factors which are responsible for the growth of TUI.
{"title":"Physical telepresence: Growth trends of Tangible User Interface and its future","authors":"Vikas Kumar, T. Choudhury, S. Sabitha","doi":"10.1109/NGCT.2016.7877420","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877420","url":null,"abstract":"Tangible User Interface (TUI) started with the invention of mouse and keyboard. Since the last two decades, TUI has experienced tremendous growth and has provided us with a link between the physical and the digital world. Even though, MIT Tangible Lab develops several tangible interface models every year, the research work in TUI is still in its infancy and extensive work is required to fully understand the potential of Tangible User Interfaces. This paper describes a brief history and some landmark Tangible User Interface models. It first acknowledges the existing work in TUI. Then, it is followed by the comparison between several TUI models. The paper brings out methods and technologies which are used in building TUI. It also aims at finding the advantages, disadvantages and applications of some TUI models. The paper concludes with finding those factors which are responsible for the growth of TUI.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877455
Vishakha Tomar, D. Singh
Wireless sensor networks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.
{"title":"Coverage and connectivity aware data gathering protocol for wireless sensor networks","authors":"Vishakha Tomar, D. Singh","doi":"10.1109/NGCT.2016.7877455","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877455","url":null,"abstract":"Wireless sensor networks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"94 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877492
N. Joshi, Sarika Jain, Amit Agarwal
Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images. Non local means filtering approach is a popular denoising technique for MR images. Modifications have been performed on the original Non Local Means algorithm to apply it on numerous applications. The aim of this paper is to denoise MRI by a novel approach, making use of a median and wiener filter in conjunction with the Non local means filtering technique.
{"title":"An improved approach for denoising MRI using non local means filter","authors":"N. Joshi, Sarika Jain, Amit Agarwal","doi":"10.1109/NGCT.2016.7877492","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877492","url":null,"abstract":"Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images. Non local means filtering approach is a popular denoising technique for MR images. Modifications have been performed on the original Non Local Means algorithm to apply it on numerous applications. The aim of this paper is to denoise MRI by a novel approach, making use of a median and wiener filter in conjunction with the Non local means filtering technique.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
LPG cylinders have become an integral part of every home. Our kitchens are occupied with LPG cylinders which help us make delicious food. But it can be dangerous and life threatening. Therefore, it requires constant vigilance to reduce the danger. The aim of this paper is to design a safety oriented system which will alert the user about any threat in the kitchen through mobile and also capable of performing required action immediately. This system will detect leakage of LPG and send an alert message to the user, at the same time it will switch off the mains power supply and a mechanical design attached with it, can switch off regulator too. It ensures safety from any gas leakage accident like suffocation and explosion. As an additional advantage, this system has a weighing sensor which can measure the weight of the cylinder and regularly update user about gas left in the cylinder. This system will also help customers to know whether they are being cheated by gas agency by providing less amount of LPG. In the present time, everyone is busy in their daily life and it is difficult to know the status of the gas cylinder. Further, it will register your booking through GSM technology by sending SMS to the distributor company and also send an alert to user at the same time. It will be helpful for those aged people who live alone and are dependent on others, by making them independent and secure them from any kitchen hazardous.
{"title":"Designing and implementaion of smart LPG trolley with home safety","authors":"Ajay Mahaputra Kumar, Mukesh Kumar, Balwinder Singh","doi":"10.1109/NGCT.2016.7877412","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877412","url":null,"abstract":"LPG cylinders have become an integral part of every home. Our kitchens are occupied with LPG cylinders which help us make delicious food. But it can be dangerous and life threatening. Therefore, it requires constant vigilance to reduce the danger. The aim of this paper is to design a safety oriented system which will alert the user about any threat in the kitchen through mobile and also capable of performing required action immediately. This system will detect leakage of LPG and send an alert message to the user, at the same time it will switch off the mains power supply and a mechanical design attached with it, can switch off regulator too. It ensures safety from any gas leakage accident like suffocation and explosion. As an additional advantage, this system has a weighing sensor which can measure the weight of the cylinder and regularly update user about gas left in the cylinder. This system will also help customers to know whether they are being cheated by gas agency by providing less amount of LPG. In the present time, everyone is busy in their daily life and it is difficult to know the status of the gas cylinder. Further, it will register your booking through GSM technology by sending SMS to the distributor company and also send an alert to user at the same time. It will be helpful for those aged people who live alone and are dependent on others, by making them independent and secure them from any kitchen hazardous.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"930 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.
{"title":"A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach)","authors":"Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari","doi":"10.1109/NGCT.2016.7877433","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877433","url":null,"abstract":"Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877481
M. Bist, A. P. Panwar, Vishwas Kumar
Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic relations between entities, we used this technique in our system to describe the attacks by their behavior. Our proposed Intrusion Detection System contains multiple agents like Sniffer agent, Analysis Agent, communication agent and manager agent. They work collectively to detect the intrusion in a much efficient way. Analysis agent uses ontology to identify the attack. Protege is software which creates ontology. Our system semantically analyses various fields of the packet and infer to a solution about attack. To identify complex attacks occurs in distributed environment that are not identified by the existing systems we are using complex attack ontology. So overall Ontology based Intrusion Detection Systems are much advanced as compared to other IDS as these are reliable, scalable, interoperable and helpful for finding new attacks.
{"title":"An agent based architecture using ontology for intrusion detection system","authors":"M. Bist, A. P. Panwar, Vishwas Kumar","doi":"10.1109/NGCT.2016.7877481","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877481","url":null,"abstract":"Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic relations between entities, we used this technique in our system to describe the attacks by their behavior. Our proposed Intrusion Detection System contains multiple agents like Sniffer agent, Analysis Agent, communication agent and manager agent. They work collectively to detect the intrusion in a much efficient way. Analysis agent uses ontology to identify the attack. Protege is software which creates ontology. Our system semantically analyses various fields of the packet and infer to a solution about attack. To identify complex attacks occurs in distributed environment that are not identified by the existing systems we are using complex attack ontology. So overall Ontology based Intrusion Detection Systems are much advanced as compared to other IDS as these are reliable, scalable, interoperable and helpful for finding new attacks.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877380
Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar
The main idea of this paper is to suggest a way in which, by using the Internet of Things (IoT), a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time. The primary user (authenticator) uses a digital pen to sign the paper document. The signature area of the document contains a particular dot pattern which helps the digital pen track the movements as the signature is created. While the paper is being signed, the digital pen also records the user's fingerprint for later verification. The obtained information is then converted to binary bits and is encoded using DNA encryption. This cipher data is transmitted to the secondary user (receiver) where the cipher is decoded and printed on the second copy of the document. Thus, the signature is securely transferred from one paper to the other.
{"title":"IoT-based real time signature authentication and transfer from document to document with DNA encryption","authors":"Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar","doi":"10.1109/NGCT.2016.7877380","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877380","url":null,"abstract":"The main idea of this paper is to suggest a way in which, by using the Internet of Things (IoT), a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time. The primary user (authenticator) uses a digital pen to sign the paper document. The signature area of the document contains a particular dot pattern which helps the digital pen track the movements as the signature is created. While the paper is being signed, the digital pen also records the user's fingerprint for later verification. The obtained information is then converted to binary bits and is encoded using DNA encryption. This cipher data is transmitted to the secondary user (receiver) where the cipher is decoded and printed on the second copy of the document. Thus, the signature is securely transferred from one paper to the other.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877406
V. K. Sarma, Manu Mehta
Single Scattering Albedo (SSA) is one of the most important parameters in deciding the type of aerosols present in the atmosphere. This study mainly aims to study the characteristics of SSA at 388nm wavelength (UV region) at global scale using Ozone Monitoring Instrument (OMI) (level-3) data which is on board the NASA Aura. The study is carried out for the period 2014 December to 2015 November. The Global region is divided into six sub-regions i.e., North-West, South-West, North, South, North-East and South-East. The SSA values for these sub-regions are averaged and analyzed on a seasonal basis. Four seasons have been chosen and the mean SSA of the sub-regions is calculated with respect to them. The sub-region seasonal approach gave a better inference on the aerosol SSA values. The decrease in the SSA values has been observed over the regions where biomass burning generally takes place. The Southern region is showing low SSA values in almost all the seasons than other regions because of the dust activities and biomass burning activities in the African sub-continent. The Californian and Indonesian forest fires also constitute high absorbing aerosols causing low SSA values.
{"title":"Global aerosol single scattering albedo characteristics","authors":"V. K. Sarma, Manu Mehta","doi":"10.1109/NGCT.2016.7877406","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877406","url":null,"abstract":"Single Scattering Albedo (SSA) is one of the most important parameters in deciding the type of aerosols present in the atmosphere. This study mainly aims to study the characteristics of SSA at 388nm wavelength (UV region) at global scale using Ozone Monitoring Instrument (OMI) (level-3) data which is on board the NASA Aura. The study is carried out for the period 2014 December to 2015 November. The Global region is divided into six sub-regions i.e., North-West, South-West, North, South, North-East and South-East. The SSA values for these sub-regions are averaged and analyzed on a seasonal basis. Four seasons have been chosen and the mean SSA of the sub-regions is calculated with respect to them. The sub-region seasonal approach gave a better inference on the aerosol SSA values. The decrease in the SSA values has been observed over the regions where biomass burning generally takes place. The Southern region is showing low SSA values in almost all the seasons than other regions because of the dust activities and biomass burning activities in the African sub-continent. The Californian and Indonesian forest fires also constitute high absorbing aerosols causing low SSA values.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}