Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583992
P. Saranya, V. Saravanan, M. Divya
The Silver code has been proposed as a 2 × 2 space time block code that accomplish the optimal diversity - multiplexing gain tradeoff for a multiple antenna system in Cognitive Radio Network. In this paper the decoding methodology for the Silver code is analyzed, followed by performance analyzing with the Alamouti code and V-BLAST in Rayleigh fading environments. Simulation results show that the Silver Code outrun both the Alamouti code and V-BLAST at high SNR levels.
{"title":"Bit error rate analysis of cognitive radio under fading channels","authors":"P. Saranya, V. Saravanan, M. Divya","doi":"10.1109/STARTUP.2016.7583992","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583992","url":null,"abstract":"The Silver code has been proposed as a 2 × 2 space time block code that accomplish the optimal diversity - multiplexing gain tradeoff for a multiple antenna system in Cognitive Radio Network. In this paper the decoding methodology for the Silver code is analyzed, followed by performance analyzing with the Alamouti code and V-BLAST in Rayleigh fading environments. Simulation results show that the Silver Code outrun both the Alamouti code and V-BLAST at high SNR levels.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583926
V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri
The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.
{"title":"A survey on real time authentication and tampering detection in digital video","authors":"V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri","doi":"10.1109/STARTUP.2016.7583926","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583926","url":null,"abstract":"The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583911
Rohini K. Akotkar, S. Kasturiwala
Video is a collection chronological frame in a sequence. Video compression means reducing the size of video. To discard the redundancies present in video some video compression technique are involved. In video sequence there are two types of technique are present that are temporal redundancy and spatial redundancy. In this paper, we discuss about hybrid technique. Hybrid means combination of two technique i.e. efficient three step search algorithm (E3SS) and cross hexagonal search algorithm (CHS). There for E3SS used for core search and CHS is used for fine search so it occupies less disk space and file transferring is faster. In today's date block matching algorithm for motion estimation is powerful technique for high compression ratio and to reduce computational complexity. motion estimation calculate the position of pixel and it is a custom to calculate the pixel from current frame to reference frame. The main approach of motion estimation is reducing the search point and redundancy present in video. The experiment result shows that the proposal algorithm performs better than previous proposed block matching algorithms and required less computation.
{"title":"Hybrid approach for video compression using block matching motion estimation","authors":"Rohini K. Akotkar, S. Kasturiwala","doi":"10.1109/STARTUP.2016.7583911","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583911","url":null,"abstract":"Video is a collection chronological frame in a sequence. Video compression means reducing the size of video. To discard the redundancies present in video some video compression technique are involved. In video sequence there are two types of technique are present that are temporal redundancy and spatial redundancy. In this paper, we discuss about hybrid technique. Hybrid means combination of two technique i.e. efficient three step search algorithm (E3SS) and cross hexagonal search algorithm (CHS). There for E3SS used for core search and CHS is used for fine search so it occupies less disk space and file transferring is faster. In today's date block matching algorithm for motion estimation is powerful technique for high compression ratio and to reduce computational complexity. motion estimation calculate the position of pixel and it is a custom to calculate the pixel from current frame to reference frame. The main approach of motion estimation is reducing the search point and redundancy present in video. The experiment result shows that the proposal algorithm performs better than previous proposed block matching algorithms and required less computation.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583987
V. Manogajapathi, Jayakumar Loganathan, R. Sekhar
In recent trends, android smartphones are rapidly in use by a number of users because of its user friendly and open source architecture. There are millions of android applications are available in the open market place. But we cannot trust most of the apps, which may steal the user privacy content or any confidential data. However, some works have studied mobile phones, multimedia securities and also android permissions. In this paper, to focus on the security issues related to camera based attacks on smartphones. The fraudulent application and its traitor can be detected by using the defense system that detects the attacks. By use of the defense system the users can be saved before getting into the vulnerability. To evaluate the defense system we have proposed a camera based fraudulent application for feasibility study and also we analyzed the performance of the system with the fraudulent applications from the open android market.
{"title":"Detecting camera based traitor and fraudulent apps on smartphone","authors":"V. Manogajapathi, Jayakumar Loganathan, R. Sekhar","doi":"10.1109/STARTUP.2016.7583987","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583987","url":null,"abstract":"In recent trends, android smartphones are rapidly in use by a number of users because of its user friendly and open source architecture. There are millions of android applications are available in the open market place. But we cannot trust most of the apps, which may steal the user privacy content or any confidential data. However, some works have studied mobile phones, multimedia securities and also android permissions. In this paper, to focus on the security issues related to camera based attacks on smartphones. The fraudulent application and its traitor can be detected by using the defense system that detects the attacks. By use of the defense system the users can be saved before getting into the vulnerability. To evaluate the defense system we have proposed a camera based fraudulent application for feasibility study and also we analyzed the performance of the system with the fraudulent applications from the open android market.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583902
Prajakta D. Chutke, M. K. Hadap
This paper is motivated by the recognition of the need for a finer grain and more personalized privacy in data publication of social networks. We will propose a privacy protection scheme that not only prevents the disclosure of identity of users but also the disclosure of Selected features in users' profiles. An individual user can select which features of her profile she wishes to conceal. We want to group nodes with as similar neighborhood information as possible so that we can change as few labels as possible and add as few noisy nodes as possible. In this application, we will use hybrid cryptography for providing security while sharing the information. The encryption helps for cryptographic purpose and it also provides attribute base encryption this involves over many people that decrypts the cipher text. It involves the different users and allow to decrypt it based on their policies.
{"title":"Enhancing security of encrypted data sharing on social networks","authors":"Prajakta D. Chutke, M. K. Hadap","doi":"10.1109/STARTUP.2016.7583902","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583902","url":null,"abstract":"This paper is motivated by the recognition of the need for a finer grain and more personalized privacy in data publication of social networks. We will propose a privacy protection scheme that not only prevents the disclosure of identity of users but also the disclosure of Selected features in users' profiles. An individual user can select which features of her profile she wishes to conceal. We want to group nodes with as similar neighborhood information as possible so that we can change as few labels as possible and add as few noisy nodes as possible. In this application, we will use hybrid cryptography for providing security while sharing the information. The encryption helps for cryptographic purpose and it also provides attribute base encryption this involves over many people that decrypts the cipher text. It involves the different users and allow to decrypt it based on their policies.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583933
M. Kalmegh, S. R. Jain
The WSN networks employing duty cycle technique in geographic routing has a task to find out the path from sensor to Base Station of the network to send the sensed data will be accomplished by several existing mechanism given over the last few decades. Discovering the optimized route in WSN depends upon the number of hops used to transfer the data packets. However, the nodes selected in the path may be overloaded due to heavy traffic. This can increase the delay in transmitting sensed data to the Base Station which will contribute in the overall delay of the network. Rediscovering routes can result in data loss and increasing communication overheads. In this paper, we present the comparison of different approaches in multi-path routing in terms of energy consumption and broadcasting delay in WSNs. We present and compare algorithms and techniques that aim to address the sleep/wake scheduling issue, which are divided into distributed and centralized manners. Meanwhile, the routing strategies, QoS parameters like average delay, packet loss ratio, and throughput are discussed.
{"title":"Optimal route discovery in duty cycled wireless sensor network: A review","authors":"M. Kalmegh, S. R. Jain","doi":"10.1109/STARTUP.2016.7583933","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583933","url":null,"abstract":"The WSN networks employing duty cycle technique in geographic routing has a task to find out the path from sensor to Base Station of the network to send the sensed data will be accomplished by several existing mechanism given over the last few decades. Discovering the optimized route in WSN depends upon the number of hops used to transfer the data packets. However, the nodes selected in the path may be overloaded due to heavy traffic. This can increase the delay in transmitting sensed data to the Base Station which will contribute in the overall delay of the network. Rediscovering routes can result in data loss and increasing communication overheads. In this paper, we present the comparison of different approaches in multi-path routing in terms of energy consumption and broadcasting delay in WSNs. We present and compare algorithms and techniques that aim to address the sleep/wake scheduling issue, which are divided into distributed and centralized manners. Meanwhile, the routing strategies, QoS parameters like average delay, packet loss ratio, and throughput are discussed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583932
Vikky Mohane, C. Gode
For blind persons it is very essential to recognize a product of their daily use so we implied a method to identify product in their everyday routine by use of camera. To separate a object from un-necessary background, movement based technique is used to spot object of concern from the video by instructing person to shake the object that gives moving object area by K-means clustering background separation technique. After detection of moving area feature extraction SIFT technique is used to take out key points of that product and that key-point is matched with the data base images if it matches efficiently then it identify a product and produce name of that product to blind persons in speech. Instead of OCR we used SIFT because in OCR orientation of camera must be towards label of product and for blind person it is very tough to locate label efficiently whereas in SIFT product orientation is not a big deal as key-points can be matched from any position.
{"title":"Object recognition for blind people using portable camera","authors":"Vikky Mohane, C. Gode","doi":"10.1109/STARTUP.2016.7583932","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583932","url":null,"abstract":"For blind persons it is very essential to recognize a product of their daily use so we implied a method to identify product in their everyday routine by use of camera. To separate a object from un-necessary background, movement based technique is used to spot object of concern from the video by instructing person to shake the object that gives moving object area by K-means clustering background separation technique. After detection of moving area feature extraction SIFT technique is used to take out key points of that product and that key-point is matched with the data base images if it matches efficiently then it identify a product and produce name of that product to blind persons in speech. Instead of OCR we used SIFT because in OCR orientation of camera must be towards label of product and for blind person it is very tough to locate label efficiently whereas in SIFT product orientation is not a big deal as key-points can be matched from any position.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583925
Pranita P. Hadke, S. Kale
In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.
{"title":"Use of Neural Networks in cryptography: A review","authors":"Pranita P. Hadke, S. Kale","doi":"10.1109/STARTUP.2016.7583925","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583925","url":null,"abstract":"In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583982
Komal V. Tumsare, P. Zade
In this paper, logo antenna for WLAN application is proposed. This logo-type antenna represents the logo of Nagpur Engg. autonomous college (Yeshwantrao chavan college, Nagpur-India). The dual band college logotype antenna of size 40mm × 50mm × 1.6mm is presented. In this paper the design of a dual band logo antenna consists of three letters, YCC. This antenna give the dual band, first band from 2.4214 GHz to 3.0742 GHz and second band from 4.7462 GHz to 6.2313 GHz. FR4 substrate with relative permittivity, εr = 4.3 is used for the proposed antenna design. In this paper the antenna performance in terms of resonance frequency, return loss, radiation pattern, antenna gain, directivity and bandwidth is observed.
{"title":"Dual band logo antenna for WLAN application","authors":"Komal V. Tumsare, P. Zade","doi":"10.1109/STARTUP.2016.7583982","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583982","url":null,"abstract":"In this paper, logo antenna for WLAN application is proposed. This logo-type antenna represents the logo of Nagpur Engg. autonomous college (Yeshwantrao chavan college, Nagpur-India). The dual band college logotype antenna of size 40mm × 50mm × 1.6mm is presented. In this paper the design of a dual band logo antenna consists of three letters, YCC. This antenna give the dual band, first band from 2.4214 GHz to 3.0742 GHz and second band from 4.7462 GHz to 6.2313 GHz. FR4 substrate with relative permittivity, εr = 4.3 is used for the proposed antenna design. In this paper the antenna performance in terms of resonance frequency, return loss, radiation pattern, antenna gain, directivity and bandwidth is observed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583964
Pooja G. Mate, Kavita R. Singh, A. Khobragade
Feature plays a vital role in classification task. In this context, feature selection and feature extraction is an essential module for the classification of any kind of data, namely textual database, image database consisting of simple images or complex images like remote sensing images collected through satellites. Use of particular features is domain and problem specific. For instance, very specific features different from others might be needed for classifying agricultural areas or crops within agricultural fields. Identification of such specific features pertaining to satellite images exhibiting its agriculture coverage is a challenging problem. Therefore features related to satellite images are studied and different methods or techniques used for optimal feature selection have also been studied and analyzed.
{"title":"Feature extraction algorithm for estimation of agriculture acreage from remote sensing images","authors":"Pooja G. Mate, Kavita R. Singh, A. Khobragade","doi":"10.1109/STARTUP.2016.7583964","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583964","url":null,"abstract":"Feature plays a vital role in classification task. In this context, feature selection and feature extraction is an essential module for the classification of any kind of data, namely textual database, image database consisting of simple images or complex images like remote sensing images collected through satellites. Use of particular features is domain and problem specific. For instance, very specific features different from others might be needed for classifying agricultural areas or crops within agricultural fields. Identification of such specific features pertaining to satellite images exhibiting its agriculture coverage is a challenging problem. Therefore features related to satellite images are studied and different methods or techniques used for optimal feature selection have also been studied and analyzed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}