Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002065
S. M. Rathod, S. Apte
Recently, many industries are using autonomous robots due to their high performance and reliability and which remains as a great help for human beings. Autonomous cars are considered as one of the most trending topics all over the web a car with no steering wheels, pedal, and with the most advanced technology autopilot. An autonomous vehicle is able to recognize there surrounding and finding the path there itself. Autonomous robot senses their surrounding with the help of different sensors such as Lidar, radar, ultrasonic sensor, infrared sensor; GPS etc. the control system used in autonomous vehicle read the information from the surrounding and find the appropriate path as well as the various obstacles are present on the path. Most of the autonomous vehicles are used for the obstacle detection purpose. In this project, the obstacle detection system is developed and the IR sensor usually used for the distance measurement. The sensor-based four-wheeled autonomous electric robot used to move the vehicle in the predefined path and avoid the obstacle during motion using the data logged from the IR sensor. Suppose during motion the robot doesn't have enough space to pass through the obstacle it must be stopped there itself or otherwise it moves by avoiding the obstacle. The system can be designed in Simulink environment.
{"title":"Obstacle Detection Using Sensor Based System For An Four Wheeled Autonomous Electric Robot","authors":"S. M. Rathod, S. Apte","doi":"10.1109/ICCES45898.2019.9002065","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002065","url":null,"abstract":"Recently, many industries are using autonomous robots due to their high performance and reliability and which remains as a great help for human beings. Autonomous cars are considered as one of the most trending topics all over the web a car with no steering wheels, pedal, and with the most advanced technology autopilot. An autonomous vehicle is able to recognize there surrounding and finding the path there itself. Autonomous robot senses their surrounding with the help of different sensors such as Lidar, radar, ultrasonic sensor, infrared sensor; GPS etc. the control system used in autonomous vehicle read the information from the surrounding and find the appropriate path as well as the various obstacles are present on the path. Most of the autonomous vehicles are used for the obstacle detection purpose. In this project, the obstacle detection system is developed and the IR sensor usually used for the distance measurement. The sensor-based four-wheeled autonomous electric robot used to move the vehicle in the predefined path and avoid the obstacle during motion using the data logged from the IR sensor. Suppose during motion the robot doesn't have enough space to pass through the obstacle it must be stopped there itself or otherwise it moves by avoiding the obstacle. The system can be designed in Simulink environment.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125365863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002402
K. K. Lakshmi, B. Sabarish Narayanan
Industry uses different types of materials as microstrip substrates. This paper introduces steel, and thus explores its scope as a microstrip substrate. Its metallic nature creates a barrier, from using it as substrate. A low cost rectangular microstrip patch antenna using a multilayer substrate is proposed here. Martensitic steel of grade 440C and thermocol forms a layered substrate. The magnetic properties of steel and dielectric properties of thermocol helps for achieving good antenna parameters. Designed patch antenna has noticeable return loss of −24dB in 400MHz. Also directional radiation pattern with gain of 0.3dB has been obtained. It shows a narrow bandwidth of 3MHz which is due to the conductivity of steel. VSWR obtained is 1.13 which shows a tremendous matching with transmission line connected to it. The results shows that, newly introduced multilayer material can be used as microstrip substrate for low frequency structures. It can produce almost the same results, which a local substrate can. It can be used for wireless charging using low frequency and thus an application of RF energy harvesting.
{"title":"Investigations on Steel as Low Cost Substrate for Low Frequency Patch Antenna","authors":"K. K. Lakshmi, B. Sabarish Narayanan","doi":"10.1109/ICCES45898.2019.9002402","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002402","url":null,"abstract":"Industry uses different types of materials as microstrip substrates. This paper introduces steel, and thus explores its scope as a microstrip substrate. Its metallic nature creates a barrier, from using it as substrate. A low cost rectangular microstrip patch antenna using a multilayer substrate is proposed here. Martensitic steel of grade 440C and thermocol forms a layered substrate. The magnetic properties of steel and dielectric properties of thermocol helps for achieving good antenna parameters. Designed patch antenna has noticeable return loss of −24dB in 400MHz. Also directional radiation pattern with gain of 0.3dB has been obtained. It shows a narrow bandwidth of 3MHz which is due to the conductivity of steel. VSWR obtained is 1.13 which shows a tremendous matching with transmission line connected to it. The results shows that, newly introduced multilayer material can be used as microstrip substrate for low frequency structures. It can produce almost the same results, which a local substrate can. It can be used for wireless charging using low frequency and thus an application of RF energy harvesting.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002542
K. Patil, C. Patil, S. Barhate
In day to day life use of vehicle is continuously increasing among all the countries, and as a most important part of vehicle, usage of fuel is increasing and not it is becoming critical problem. So, for accurate measurement of fuel level becomes extremely important. The design and development of Capacitive sensor is some contribution towards the accurate fuel level measurement in automotive sector. Wide variety of existing fuel level sensors are available such as mechanical float type, load cell, ultrasonic transreceiver based and Capacitive plate sensors. Nowadays all the vehicle has digital display (Dashboard) units, so fuel bunks occurring chances are more compare to other because of the digit roundoff. When we refill the fuel, we don't know the exact amount of fuel added is same as that to the amount paid by us. So here the fuel level measurement sensor plays vital role for customers, at the same time it improves performance and safety aspects related to the vehicle. Currently the capacitive fuel level measurement sensors are used in Aircrafts, where fuel level is considered as most critical parameter. That implies the capacitive level sensor construction is costly for small vehicle. So, the main objective of this paper to working towards the development of low-cost capacitive fuel measurement sensor for 2W/3W vehicles.
{"title":"Design and development of fuel level measurement technique for automotive application","authors":"K. Patil, C. Patil, S. Barhate","doi":"10.1109/ICCES45898.2019.9002542","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002542","url":null,"abstract":"In day to day life use of vehicle is continuously increasing among all the countries, and as a most important part of vehicle, usage of fuel is increasing and not it is becoming critical problem. So, for accurate measurement of fuel level becomes extremely important. The design and development of Capacitive sensor is some contribution towards the accurate fuel level measurement in automotive sector. Wide variety of existing fuel level sensors are available such as mechanical float type, load cell, ultrasonic transreceiver based and Capacitive plate sensors. Nowadays all the vehicle has digital display (Dashboard) units, so fuel bunks occurring chances are more compare to other because of the digit roundoff. When we refill the fuel, we don't know the exact amount of fuel added is same as that to the amount paid by us. So here the fuel level measurement sensor plays vital role for customers, at the same time it improves performance and safety aspects related to the vehicle. Currently the capacitive fuel level measurement sensors are used in Aircrafts, where fuel level is considered as most critical parameter. That implies the capacitive level sensor construction is costly for small vehicle. So, the main objective of this paper to working towards the development of low-cost capacitive fuel measurement sensor for 2W/3W vehicles.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002110
Rishabh Kamal, Priyanka Ahlawat
In wireless sensor networks (WSN) key management is a working research subject. As we have large number of key management schemes (KMS) that are designed for sensor network, it is not easy for network designers to know which KMS is perfect fit in a specific WSN operation. This paper presents an exhaustive overview of different schemes along with their advantages and disadvantages. As KMS is the stepping stone of any security mechanism in a sensor network, its effectiveness depends on the underlying scheme. KMS in a WSN guarantees communication between one or two pairs node batch. We have analyzed different schemes based on parameters such as storage cost, communication cost and resilience against node capture.
{"title":"A Comparative Analysis of Matrix Based Key Management Schemes For Wireless Sensor Network","authors":"Rishabh Kamal, Priyanka Ahlawat","doi":"10.1109/ICCES45898.2019.9002110","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002110","url":null,"abstract":"In wireless sensor networks (WSN) key management is a working research subject. As we have large number of key management schemes (KMS) that are designed for sensor network, it is not easy for network designers to know which KMS is perfect fit in a specific WSN operation. This paper presents an exhaustive overview of different schemes along with their advantages and disadvantages. As KMS is the stepping stone of any security mechanism in a sensor network, its effectiveness depends on the underlying scheme. KMS in a WSN guarantees communication between one or two pairs node batch. We have analyzed different schemes based on parameters such as storage cost, communication cost and resilience against node capture.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002204
N. Megha, K. Remesh Babu, E. Sherly
Cyber security is a most important trepidation in the widespread adoption of internet technologies in the everyday activities of human being. Even though more sophisticated technologies emerged on the Internet, but different kinds of attacks and threats are also increasing day by day. Cyber attacks causes loss of customer confidence in adopting internet based applications. Phishing attack is one of the common vulnerabilities in the cyber space. Most of the anti-phishing solutions proposed so are focused only on a single issue and needs improvement. For malicious web page detection and prevention, an intelligent multi agent solution is proposed in this paper with the help of machine learning methods. The proposed approach detects both phishing sites and websites with malicious content. This multi-agent system contains four autonomous intelligent agents, which communicate with each other using the Extensible Messaging and Presence Protocol (XMPP) for decision-making. The first is a monitoring agent, second and third is for decision-making (using the machine-learning classifiers) and the fourth is for action-performing. The first agent is responsible for extracting URLs. It passes the extracted URLs to the second agent for feature extraction and classification. If any phishing is detected, the second agent communicates with the fourth agent and the site is blocked. Otherwise, the second agent communicates with the third agent for malicious script detection. If any malicious script is detected then the fourth agent blocks the entire web page. We have tested the performance and accuracy of the proposed method and obtained results ensures its efficiency.
{"title":"An Intelligent System for Phishing Attack Detection and Prevention","authors":"N. Megha, K. Remesh Babu, E. Sherly","doi":"10.1109/ICCES45898.2019.9002204","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002204","url":null,"abstract":"Cyber security is a most important trepidation in the widespread adoption of internet technologies in the everyday activities of human being. Even though more sophisticated technologies emerged on the Internet, but different kinds of attacks and threats are also increasing day by day. Cyber attacks causes loss of customer confidence in adopting internet based applications. Phishing attack is one of the common vulnerabilities in the cyber space. Most of the anti-phishing solutions proposed so are focused only on a single issue and needs improvement. For malicious web page detection and prevention, an intelligent multi agent solution is proposed in this paper with the help of machine learning methods. The proposed approach detects both phishing sites and websites with malicious content. This multi-agent system contains four autonomous intelligent agents, which communicate with each other using the Extensible Messaging and Presence Protocol (XMPP) for decision-making. The first is a monitoring agent, second and third is for decision-making (using the machine-learning classifiers) and the fourth is for action-performing. The first agent is responsible for extracting URLs. It passes the extracted URLs to the second agent for feature extraction and classification. If any phishing is detected, the second agent communicates with the fourth agent and the site is blocked. Otherwise, the second agent communicates with the third agent for malicious script detection. If any malicious script is detected then the fourth agent blocks the entire web page. We have tested the performance and accuracy of the proposed method and obtained results ensures its efficiency.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002086
Dheeraj Punia, Brahmjit Singh
Secure encryption algorithms with advanced key executive techniques constantly help to achieve privacy, verification, and security of the data and curtail the overheads of the system. Currently, the prominent cryptographic technique is the Advance Encryption Standard (AES). The 128-bit pipelined cipher AES components adopt the symmetric-block cipher algorithm for encryption of the data. Our application achieves a high-level of encryption of 25.6 Gbps with an effective inter-and-intra-round layout. This module is designed on Xilinx ISE® Design Suite 14.7 and optimized for faster conversion speeds as the module is based on the pipeline architecture to perform the repeated array of operations known as the round. The designed module is suitable for high-security data communication, image processing, and other embedded applications. Pipelined architecture reduces the time associated with each encryption process and decreases the total time it takes for a plaintext block to encrypt.
具有高级密钥执行技术的安全加密算法不断帮助实现数据的隐私、验证和安全性,并减少系统的开销。目前,主要的加密技术是高级加密标准AES (advanced Encryption Standard)。128位流水线密码AES组件采用对称分组密码算法对数据进行加密。我们的应用程序通过有效的轮间和轮内布局实现了25.6 Gbps的高级加密。该模块是在Xilinx ISE®Design Suite 14.7上设计的,并针对更快的转换速度进行了优化,因为该模块基于流水线架构来执行称为轮的重复操作数组。设计的模块适用于高安全性的数据通信、图像处理等嵌入式应用。流水线架构减少了与每个加密过程相关的时间,并减少了明文块加密所需的总时间。
{"title":"Speed Optimization of the AES Algorithm Using Pipeline Hardware Architecture","authors":"Dheeraj Punia, Brahmjit Singh","doi":"10.1109/ICCES45898.2019.9002086","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002086","url":null,"abstract":"Secure encryption algorithms with advanced key executive techniques constantly help to achieve privacy, verification, and security of the data and curtail the overheads of the system. Currently, the prominent cryptographic technique is the Advance Encryption Standard (AES). The 128-bit pipelined cipher AES components adopt the symmetric-block cipher algorithm for encryption of the data. Our application achieves a high-level of encryption of 25.6 Gbps with an effective inter-and-intra-round layout. This module is designed on Xilinx ISE® Design Suite 14.7 and optimized for faster conversion speeds as the module is based on the pipeline architecture to perform the repeated array of operations known as the round. The designed module is suitable for high-security data communication, image processing, and other embedded applications. Pipelined architecture reduces the time associated with each encryption process and decreases the total time it takes for a plaintext block to encrypt.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002050
Chintam Muni Kanaka Sri Shalini, Y. Roopa, J. S. Devi
Most of the rural areas keep declining and smart cities keep evolving in its own phase. Data is one of the most important resources to maintain as terabytes of data is collected from a single city. Data is analyzed using big data analysis and it can be stored by using the fog computing and it also describes how fog computing is effective in IoT when compared to cloud-based computing and how fog-based computing is introducing its innovative applications. The research work describes cloud and fog architecture and furthermore we will learn about a new experimental architecture. It is the combination of both fog based and cloud-based technologies. Fog computing is a technology that is rapidly influencing the emerging digital technologies and applications. There are many challenges in maintaining the data through fog computing technologies, these challenges are mentioned along with their security concerns that help for the transition from cloud to fog. This paper mainly tells us how fog computing would emerge as the future of IoT and how it would change the quality of life at an unprecedented rate.
{"title":"Fog Computing for Smart Cities","authors":"Chintam Muni Kanaka Sri Shalini, Y. Roopa, J. S. Devi","doi":"10.1109/ICCES45898.2019.9002050","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002050","url":null,"abstract":"Most of the rural areas keep declining and smart cities keep evolving in its own phase. Data is one of the most important resources to maintain as terabytes of data is collected from a single city. Data is analyzed using big data analysis and it can be stored by using the fog computing and it also describes how fog computing is effective in IoT when compared to cloud-based computing and how fog-based computing is introducing its innovative applications. The research work describes cloud and fog architecture and furthermore we will learn about a new experimental architecture. It is the combination of both fog based and cloud-based technologies. Fog computing is a technology that is rapidly influencing the emerging digital technologies and applications. There are many challenges in maintaining the data through fog computing technologies, these challenges are mentioned along with their security concerns that help for the transition from cloud to fog. This paper mainly tells us how fog computing would emerge as the future of IoT and how it would change the quality of life at an unprecedented rate.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002530
Dhaval Bagal, Pallavi Saindane
Libraries play the most important role when it comes to books and reading. Today, libraries have become a great source of information. If we look upon the procedure that most of the conventional libraries in the world follow, we see a great amount of drudgery involved. In this paper, we propose a smart library system, which eliminates most of this drudgery in the conventional library management systems. Using face recognition and QR code based technology, the system automates and eases the tasks of Book Issue, Book Return and Book Search. It resembles ‘Just walk out technology’ implemented by Amazon in the Amazon Go stores. The proposed system enjoins self-issue and self-return procedures along with the dynamic search feature which provides the real-time location of the books. The proposed system significantly expedites the process of issue, return and search thus avoiding long queues at the reception counter/librarian's desk.
{"title":"Librany - A Face Recognition and QR Code Technology based Smart Library System","authors":"Dhaval Bagal, Pallavi Saindane","doi":"10.1109/ICCES45898.2019.9002530","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002530","url":null,"abstract":"Libraries play the most important role when it comes to books and reading. Today, libraries have become a great source of information. If we look upon the procedure that most of the conventional libraries in the world follow, we see a great amount of drudgery involved. In this paper, we propose a smart library system, which eliminates most of this drudgery in the conventional library management systems. Using face recognition and QR code based technology, the system automates and eases the tasks of Book Issue, Book Return and Book Search. It resembles ‘Just walk out technology’ implemented by Amazon in the Amazon Go stores. The proposed system enjoins self-issue and self-return procedures along with the dynamic search feature which provides the real-time location of the books. The proposed system significantly expedites the process of issue, return and search thus avoiding long queues at the reception counter/librarian's desk.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"23 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002403
M. Rajesh, S. Sathiamoorthy
This paper proposes BVLC (block variation off local correlation coefficients) and BDIP (block difference of inverse probabilities) into covariance descriptors for image recognition and retrieval. The images in RGB is partitioned to R,G and B then BVLCs and BDIPs are computed for each channel then BVLCs and BDIPs in covariance among R,G and B is computed. The proposed BVLCs and BDIPs in covariance descriptor is extremely precious to reflect the degree of linear association among identified textures, edges and valleys. Degree of similarity among query and target images is analyzed using statistical measures of divergence namely Chernoff and Bhattacharya and results shown that Chernoff is noticeably outperform Bhattacharya measure. Comprehensive experiments on Corel- 1k, Corel- 5k and Corel-10k databases illustrates that proposed BVLCs and BDIPs in covariance descriptor is satisfactory and can attains significantly enhanced retrieval accuracies than traditional techniques.
{"title":"BVLCs and BDIPs in Covariance Descriptor with a Statistical Measure of Divergence for Image Retrieval","authors":"M. Rajesh, S. Sathiamoorthy","doi":"10.1109/ICCES45898.2019.9002403","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002403","url":null,"abstract":"This paper proposes BVLC (block variation off local correlation coefficients) and BDIP (block difference of inverse probabilities) into covariance descriptors for image recognition and retrieval. The images in RGB is partitioned to R,G and B then BVLCs and BDIPs are computed for each channel then BVLCs and BDIPs in covariance among R,G and B is computed. The proposed BVLCs and BDIPs in covariance descriptor is extremely precious to reflect the degree of linear association among identified textures, edges and valleys. Degree of similarity among query and target images is analyzed using statistical measures of divergence namely Chernoff and Bhattacharya and results shown that Chernoff is noticeably outperform Bhattacharya measure. Comprehensive experiments on Corel- 1k, Corel- 5k and Corel-10k databases illustrates that proposed BVLCs and BDIPs in covariance descriptor is satisfactory and can attains significantly enhanced retrieval accuracies than traditional techniques.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002601
D. Keerthi, A. Shobha Rani, T. Basavaraju
The tremendous growth in the usage of internet technology has pawed way for advancement of diverse wireless networks. One of the domain of wireless networks that have gathered a lot of attention from researchers is Wireless Mesh Network (WMN). WMN is preferred because of its numerous advantages like better coverage area, communication with other networks, cost effectiveness, increased network capacity and is compatible with all IEEE 802.11 standards. Low Capacity, management of the traffic and gateway nodes and end to end fairness problem are the major issues in the employment of WMNs. In order to reduce the existing challenges in WMNs load balancing plays a vital role. In our work we have proposed a load balancing protocol to overcome the problem of congestion using residual energy and delay. The simulation results are derived and they prove that our proposed protocol enhances the performance and life time of WMN compared to standard protocol with reference to residual energy, throughput, packets received jitter and delay.
{"title":"Energy-Delay Based Route Request Scheme for Load Balanced Routing in Wireless Mesh Networks","authors":"D. Keerthi, A. Shobha Rani, T. Basavaraju","doi":"10.1109/ICCES45898.2019.9002601","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002601","url":null,"abstract":"The tremendous growth in the usage of internet technology has pawed way for advancement of diverse wireless networks. One of the domain of wireless networks that have gathered a lot of attention from researchers is Wireless Mesh Network (WMN). WMN is preferred because of its numerous advantages like better coverage area, communication with other networks, cost effectiveness, increased network capacity and is compatible with all IEEE 802.11 standards. Low Capacity, management of the traffic and gateway nodes and end to end fairness problem are the major issues in the employment of WMNs. In order to reduce the existing challenges in WMNs load balancing plays a vital role. In our work we have proposed a load balancing protocol to overcome the problem of congestion using residual energy and delay. The simulation results are derived and they prove that our proposed protocol enhances the performance and life time of WMN compared to standard protocol with reference to residual energy, throughput, packets received jitter and delay.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}