Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569519
Afsha Shaukat, Mahesh Chaurasia, G. Sanyal
Steganography has always been competent in the field of data hiding by ensuring its remarkable behavior of preserving the secrecy of data. In order to maintain the secrecy of private data, the host data is being exploited to hide the information in such a way that it is unrecognizable to the human visual system thereby meeting the goals of steganography which are high embedding capacity, imperceptibility and robustness. Various amounts of work have been done in this field by a number of researchers. In this paper we have used a new image steganography technique using Fast Fourier Transform on the cover image Then the secret image is embedded into the two components of the cover image formed after applying the FFT on the cover image using the Least Significant Bit substitution method. The results obtained prove that this method is efficient and highly imperceptible to the human eye. The embedding capacity and the PSNR values clearly show the uniqueness of our proposed method.
{"title":"A novel image steganographic technique using fast fourier transform","authors":"Afsha Shaukat, Mahesh Chaurasia, G. Sanyal","doi":"10.1109/ICRTIT.2016.7569519","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569519","url":null,"abstract":"Steganography has always been competent in the field of data hiding by ensuring its remarkable behavior of preserving the secrecy of data. In order to maintain the secrecy of private data, the host data is being exploited to hide the information in such a way that it is unrecognizable to the human visual system thereby meeting the goals of steganography which are high embedding capacity, imperceptibility and robustness. Various amounts of work have been done in this field by a number of researchers. In this paper we have used a new image steganography technique using Fast Fourier Transform on the cover image Then the secret image is embedded into the two components of the cover image formed after applying the FFT on the cover image using the Least Significant Bit substitution method. The results obtained prove that this method is efficient and highly imperceptible to the human eye. The embedding capacity and the PSNR values clearly show the uniqueness of our proposed method.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569525
Srilakshmi Annapoorna, P. V. Mirnalinee
In the evolving technology of big data, high velocity data streams play a vital role since pattern of data is being changed over time. The temporal pattern change in data stream leads to a concept evolution called concept drift where statistical properties of data differs from time to time and the drift is taken into account in order to update old and outdated classifier and make it adaptable to new data arrival and pattern change over. In order to classify the stream data, a scalable efficient classification algorithm is to be designed which perfectly classifies the data with minimizing misclassification rate in presence of concept drift due to high velocity data. Training time of the classifier must be reduced in order to reduce computational complexity. In this work, a novel algorithm has been implemented using Random Forest with stratified random sampling and Bloom filtering in order to reduce the training time and to handle high velocity data. Experimental results are shown by performing classification with sampling, classification with filtering and classification with sampling and filtering. This enhances the performance of the algorithm by decreasing the training time and testing time of the classifier with negligible compromise in accuracy of classification.
{"title":"Streaming data classification","authors":"Srilakshmi Annapoorna, P. V. Mirnalinee","doi":"10.1109/ICRTIT.2016.7569525","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569525","url":null,"abstract":"In the evolving technology of big data, high velocity data streams play a vital role since pattern of data is being changed over time. The temporal pattern change in data stream leads to a concept evolution called concept drift where statistical properties of data differs from time to time and the drift is taken into account in order to update old and outdated classifier and make it adaptable to new data arrival and pattern change over. In order to classify the stream data, a scalable efficient classification algorithm is to be designed which perfectly classifies the data with minimizing misclassification rate in presence of concept drift due to high velocity data. Training time of the classifier must be reduced in order to reduce computational complexity. In this work, a novel algorithm has been implemented using Random Forest with stratified random sampling and Bloom filtering in order to reduce the training time and to handle high velocity data. Experimental results are shown by performing classification with sampling, classification with filtering and classification with sampling and filtering. This enhances the performance of the algorithm by decreasing the training time and testing time of the classifier with negligible compromise in accuracy of classification.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569512
Intelligent Transport System (ITS) is one of the major paradigms in Wireless Sensor Networks. Intelligent Transport System plays an important role because of its ability to enhance safety on vehicles. Due to the fact experimentation of data transmission scheme on large number of vehicles is very expensive in nature so such safety system on VANET should be tested in simulation to narrow down the gap. The HSND (High Speed Node Detection) Protocol is employed to ensure the detection of high speed node(HSN) and alerting the other nodes which are closer to the HSN node. The environment of VANET is generally of higher traffic dynamics and topology changes. It is a challenging issue to avail the required data transmission on Vehicle-To-Vehicle (V2V) channel. Considering the fact, focus on the detection of victim nodes and high speed indication on junction based urban scenario was not still obtained. In consideration of previous researches only semi urban message transmission and highway scenarios are considered. In this study, we simulate hundreds of IEEE 802.11p nodes on junction based urban scenario and each node is under the consideration of DSDV (Destination-Sequenced Distance-Vector). DSDV is a table driven routing scheme for Ad-Hoc Mobile Networks. As a result we found all the vehicles with in specific distance from HSN node gets alert and the victim node details are stored.
{"title":"Junction based urban scenario High Speed Node Detection (JBUS-HSND) and alerting system on VANET","authors":"","doi":"10.1109/ICRTIT.2016.7569512","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569512","url":null,"abstract":"Intelligent Transport System (ITS) is one of the major paradigms in Wireless Sensor Networks. Intelligent Transport System plays an important role because of its ability to enhance safety on vehicles. Due to the fact experimentation of data transmission scheme on large number of vehicles is very expensive in nature so such safety system on VANET should be tested in simulation to narrow down the gap. The HSND (High Speed Node Detection) Protocol is employed to ensure the detection of high speed node(HSN) and alerting the other nodes which are closer to the HSN node. The environment of VANET is generally of higher traffic dynamics and topology changes. It is a challenging issue to avail the required data transmission on Vehicle-To-Vehicle (V2V) channel. Considering the fact, focus on the detection of victim nodes and high speed indication on junction based urban scenario was not still obtained. In consideration of previous researches only semi urban message transmission and highway scenarios are considered. In this study, we simulate hundreds of IEEE 802.11p nodes on junction based urban scenario and each node is under the consideration of DSDV (Destination-Sequenced Distance-Vector). DSDV is a table driven routing scheme for Ad-Hoc Mobile Networks. As a result we found all the vehicles with in specific distance from HSN node gets alert and the victim node details are stored.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569521
G. Sushma, V. Ramesh
D flip flops are extensively used in analog, digital and mixed signal systems. D flip flops are first choice to realize different counters, shift registers and other circuits. One major consequence of scaling of CMOS technology is leakage power. To decrease power consumption and to improve life time of battery, the voltage supplied to the given circuit during standby mode should be reduced. This paper proposes a new D flip flop design which employs improved SVL technique in order to reduce power consumption due to leakage currents in standby mode. Also the proposed design uses less number of clocked transistors, thus reduces the dynamic power consumption as well as delay compared to existing design. Proposed design achieves 60.54% reduction in power delay product in comparison with existing D flip flop design. Both existing design and proposed design are simulated using Tanner T spice tool at 45nm technology.
D触发器广泛应用于模拟、数字和混合信号系统中。D触发器是实现不同计数器、移位寄存器和其他电路的首选。CMOS技术规模化的一个主要后果是漏功率。为了降低功耗和延长电池的使用寿命,应降低待机模式下给定电路的电压。本文提出了一种采用改进SVL技术的新型D触发器设计,以降低待机时漏电流造成的功耗。此外,与现有设计相比,所提出的设计使用的时钟晶体管数量较少,从而降低了动态功耗和延迟。与现有的D触发器设计相比,本设计实现了60.54%的功率延迟产品降低。现有设计和提出的设计都使用Tanner T spice工具在45纳米技术下进行了模拟。
{"title":"Low power high speed D flip flop design using improved SVL technique","authors":"G. Sushma, V. Ramesh","doi":"10.1109/ICRTIT.2016.7569521","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569521","url":null,"abstract":"D flip flops are extensively used in analog, digital and mixed signal systems. D flip flops are first choice to realize different counters, shift registers and other circuits. One major consequence of scaling of CMOS technology is leakage power. To decrease power consumption and to improve life time of battery, the voltage supplied to the given circuit during standby mode should be reduced. This paper proposes a new D flip flop design which employs improved SVL technique in order to reduce power consumption due to leakage currents in standby mode. Also the proposed design uses less number of clocked transistors, thus reduces the dynamic power consumption as well as delay compared to existing design. Proposed design achieves 60.54% reduction in power delay product in comparison with existing D flip flop design. Both existing design and proposed design are simulated using Tanner T spice tool at 45nm technology.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569556
M. Dinesh, R. Bhakthavatchalu
Internet of Things (IoT) devices is getting increasingly popular in every aspect of life. From health care monitors, activity/sleep trackers to industry/home automation, IoT devices and system-on-chip (SoC) have huge research potential. This paper presents a new memory interface intellectual property (IP) developed for interfacing IoT SoC with storage class memory or non-volatile memory (NVM). So the novelty of this IP is that it enables storage class memory which stands invisible to core as executable memory for low to medium sized IoT SoC's. Currently the devices available in the market have to be synced in to cloud or a device with higher memory bandwidth frequently as the inbuilt SRAM/DDR memory have limited executable memory space. So this interface can be used in the SoC with a high capacity NVM using an interface IP using advanced caching algorithms, this potential limitation can be eliminated.
{"title":"Storage memory/NVM based executable memory interface IP for advanced IoT applications","authors":"M. Dinesh, R. Bhakthavatchalu","doi":"10.1109/ICRTIT.2016.7569556","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569556","url":null,"abstract":"Internet of Things (IoT) devices is getting increasingly popular in every aspect of life. From health care monitors, activity/sleep trackers to industry/home automation, IoT devices and system-on-chip (SoC) have huge research potential. This paper presents a new memory interface intellectual property (IP) developed for interfacing IoT SoC with storage class memory or non-volatile memory (NVM). So the novelty of this IP is that it enables storage class memory which stands invisible to core as executable memory for low to medium sized IoT SoC's. Currently the devices available in the market have to be synced in to cloud or a device with higher memory bandwidth frequently as the inbuilt SRAM/DDR memory have limited executable memory space. So this interface can be used in the SoC with a high capacity NVM using an interface IP using advanced caching algorithms, this potential limitation can be eliminated.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569520
V. S. P. Nayak, A. Krishna, Asmita Rangari, B. Sammunayak, K. Madhukar
A new method is proposed here for the automation of the street lighting system using the wireless ZigBee module. This module provides a perfect scheme for the operation of alternate street lighting system that is both automatic and manual. LDR and IR sensor are the backbone of this project. The LDR Sensors are used here to detect the day and night and the sensors to detect any obstacle (vehicle/mobile) passing by and accordingly the lights will be switched on and off. The Graphical User Interface (GUI) is created on MATLAB and can be used to manually operate the lights from the base station. Considerable amount of energy will be saved by the application of this module. A prototype was developed based upon this idea.
{"title":"Development Of street lighting system with vehicular sensing at low light intensity based on ZigBee intelligence","authors":"V. S. P. Nayak, A. Krishna, Asmita Rangari, B. Sammunayak, K. Madhukar","doi":"10.1109/ICRTIT.2016.7569520","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569520","url":null,"abstract":"A new method is proposed here for the automation of the street lighting system using the wireless ZigBee module. This module provides a perfect scheme for the operation of alternate street lighting system that is both automatic and manual. LDR and IR sensor are the backbone of this project. The LDR Sensors are used here to detect the day and night and the sensors to detect any obstacle (vehicle/mobile) passing by and accordingly the lights will be switched on and off. The Graphical User Interface (GUI) is created on MATLAB and can be used to manually operate the lights from the base station. Considerable amount of energy will be saved by the application of this module. A prototype was developed based upon this idea.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"272 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569557
K. Sathya, V. Rajasekar, J. Premalatha
The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.
{"title":"Biometric signcryption using hyperelliptic curve and cryptographically secure random number","authors":"K. Sathya, V. Rajasekar, J. Premalatha","doi":"10.1109/ICRTIT.2016.7569557","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569557","url":null,"abstract":"The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569569
S. Sankari, S. Bose
Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.
{"title":"Elaborative survey on storage technologies for XML big data: A real-time approach","authors":"S. Sankari, S. Bose","doi":"10.1109/ICRTIT.2016.7569569","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569569","url":null,"abstract":"Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115429254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569571
M. Devi, A. Priya
Data mining is an interdisciplinary subfield of computer science. Invoicing is a commercial document issued by the seller to the buyer. Payment terms are stated in the invoice. Customer can view the invoice through online billing portal. The objective of this paper is to create Business Intelligence Solution for Sriram Industries and Sriram Wire Products which is the small and the micro enterprise. The software includes three modules User login, Company profile, Invoicing and analytics. Sampling algorithm is used for generating the random graph with the given degree of sequence in the analytical module and the invoice module automatically creates a printable invoice for the company defined tax structure. The software is created by using the open source technologies like J2EE platform, Spring MVC framework, Hibernate ORM, Jfree chart and itext PDF to make affordable to the enterprises. Analytics module enables the complete business intelligence and provides the detailed information about the sales analytics, invoice status, customer's payment status and item analytics.
{"title":"Invoicing and analytics for small and micro manufacturing enterprises","authors":"M. Devi, A. Priya","doi":"10.1109/ICRTIT.2016.7569571","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569571","url":null,"abstract":"Data mining is an interdisciplinary subfield of computer science. Invoicing is a commercial document issued by the seller to the buyer. Payment terms are stated in the invoice. Customer can view the invoice through online billing portal. The objective of this paper is to create Business Intelligence Solution for Sriram Industries and Sriram Wire Products which is the small and the micro enterprise. The software includes three modules User login, Company profile, Invoicing and analytics. Sampling algorithm is used for generating the random graph with the given degree of sequence in the analytical module and the invoice module automatically creates a printable invoice for the company defined tax structure. The software is created by using the open source technologies like J2EE platform, Spring MVC framework, Hibernate ORM, Jfree chart and itext PDF to make affordable to the enterprises. Analytics module enables the complete business intelligence and provides the detailed information about the sales analytics, invoice status, customer's payment status and item analytics.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-08DOI: 10.1109/ICRTIT.2016.7569514
S. Chowdhury, S. Dhawan
The advent of Machine to machine communication, and the indomitable push of the scientific community towards smart living has given birth to a new reality. This reality includes waking up to a smart home, travelling to work place using a smart vehicle, making smart decisions for the day which are backed more by technology than by instincts and that reality has been given a name and a physical existence in the form of “Smart City”. The single most characteristic quality of a smart city is categorized by the large amounts of data it produces. This data which is generated provides a lot of information about the usage as well as the user characteristics of the devices used. At, this point we look towards an important aspect which deals with humans as the center of the data ecosystem. In this paper we systematically analyze different facets of human data interaction with respect to the smart cities. The paper revolves around the parameters on the basis of which the ownership of data is decided which has been derived from an extensive survey and how the ownership aspect pans out with the dimensions of smart city. Finally, we discuss about the category of devices which dominate the smart city system and conclude upon how HDI could shape the future of smart cities.
{"title":"HDI based data ownership model for smart cities","authors":"S. Chowdhury, S. Dhawan","doi":"10.1109/ICRTIT.2016.7569514","DOIUrl":"https://doi.org/10.1109/ICRTIT.2016.7569514","url":null,"abstract":"The advent of Machine to machine communication, and the indomitable push of the scientific community towards smart living has given birth to a new reality. This reality includes waking up to a smart home, travelling to work place using a smart vehicle, making smart decisions for the day which are backed more by technology than by instincts and that reality has been given a name and a physical existence in the form of “Smart City”. The single most characteristic quality of a smart city is categorized by the large amounts of data it produces. This data which is generated provides a lot of information about the usage as well as the user characteristics of the devices used. At, this point we look towards an important aspect which deals with humans as the center of the data ecosystem. In this paper we systematically analyze different facets of human data interaction with respect to the smart cities. The paper revolves around the parameters on the basis of which the ownership of data is decided which has been derived from an extensive survey and how the ownership aspect pans out with the dimensions of smart city. Finally, we discuss about the category of devices which dominate the smart city system and conclude upon how HDI could shape the future of smart cities.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}