Pub Date : 2018-08-02DOI: 10.1007/978-981-10-7641-1_2
Sonika, Aditi Jain
{"title":"Genetic Algorithm Approach for Optimization of Biomass Estimation at LiDAR","authors":"Sonika, Aditi Jain","doi":"10.1007/978-981-10-7641-1_2","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_2","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-02DOI: 10.1007/978-981-10-7641-1_8
G. S. Smrithy, R. Balakrishnan, N. Sivakumar
{"title":"Anomaly Detection Using Dynamic Sliding Window in Wireless Body Area Networks","authors":"G. S. Smrithy, R. Balakrishnan, N. Sivakumar","doi":"10.1007/978-981-10-7641-1_8","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_8","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-02DOI: 10.1007/978-981-10-7641-1_30
Megha Soni, B. K. Joshi
{"title":"Security Assessment of SAODV Protocols in Mobile Ad hoc Networks","authors":"Megha Soni, B. K. Joshi","doi":"10.1007/978-981-10-7641-1_30","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_30","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.
{"title":"Security Issues and Trust Management in Cloud Computing","authors":"Shimpy Harbajanka, Preeti Saxena","doi":"10.1145/2909067.2909068","DOIUrl":"https://doi.org/10.1145/2909067.2909068","url":null,"abstract":"Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Mobile Ad hoc Network (MANET) is a spontaneous network consisting of wireless nodes which are mobile and self-configuring in nature. Devices in MANET can move freely in any direction independently and change its link frequently to other devices. MANET does not have centralized infrastructure and its characteristics makes this network vulnerable to various kinds of attacks. Data transfer is a major problem due to its nature of unreliable wireless medium. Commonly used technique for secure transmission in wireless network is cryptography. Use of cryptography key is often involved in most of cryptographic techniques. Key management is main component in security issues of MANET and various schemes have been proposed for it. In this paper, a study on various kinds of key management techniques in MANET is presented.
{"title":"Key Management Techniques for Securing MANET","authors":"Neha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar","doi":"10.1145/2909067.2909080","DOIUrl":"https://doi.org/10.1145/2909067.2909080","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a spontaneous network consisting of wireless nodes which are mobile and self-configuring in nature. Devices in MANET can move freely in any direction independently and change its link frequently to other devices. MANET does not have centralized infrastructure and its characteristics makes this network vulnerable to various kinds of attacks. Data transfer is a major problem due to its nature of unreliable wireless medium. Commonly used technique for secure transmission in wireless network is cryptography. Use of cryptography key is often involved in most of cryptographic techniques. Key management is main component in security issues of MANET and various schemes have been proposed for it. In this paper, a study on various kinds of key management techniques in MANET is presented.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy consumption affects Wireless Sensor Networks (WSN) lifetime and may cause network degradation. Communication distance between the sensor nodes and base station affects network energy. The more communication distance between two nodes the more energy consumed. Clustering technique is used to reduce the energy consumption in the wireless data transmission. To develop an energy-efficient system using clustering, there are three requirements. First, to determine the optimum number of sensor nodes in a specific cluster, Second, to find the optimal number of clusters in the network and the third is to determine the correct position of Cluster Head (CH) in a particular cluster. Selecting an optimal number of clusters in WSNs gives greater improvement in system scalability, increases energy efficiency, and enhances network lifetime, in the network. For a large WSN lifetime of network depends on the cluster diameter and number of hops. The energy cost of network is directly proportional to the number of clusters. Clustering technique balances the load distribution in network and reduces traffic transmission.
{"title":"Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey","authors":"Jaheda S. Ambekari, Sumedha Sirsikar","doi":"10.1145/2909067.2909074","DOIUrl":"https://doi.org/10.1145/2909067.2909074","url":null,"abstract":"Energy consumption affects Wireless Sensor Networks (WSN) lifetime and may cause network degradation. Communication distance between the sensor nodes and base station affects network energy. The more communication distance between two nodes the more energy consumed. Clustering technique is used to reduce the energy consumption in the wireless data transmission. To develop an energy-efficient system using clustering, there are three requirements. First, to determine the optimum number of sensor nodes in a specific cluster, Second, to find the optimal number of clusters in the network and the third is to determine the correct position of Cluster Head (CH) in a particular cluster. Selecting an optimal number of clusters in WSNs gives greater improvement in system scalability, increases energy efficiency, and enhances network lifetime, in the network. For a large WSN lifetime of network depends on the cluster diameter and number of hops. The energy cost of network is directly proportional to the number of clusters. Clustering technique balances the load distribution in network and reduces traffic transmission.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations.
{"title":"Significance of Ticket Analytics in Effective Software Maintenance: Awareness","authors":"Sharon Christa V. Suma, Asst Professor Professor","doi":"10.1145/2909067.2909091","DOIUrl":"https://doi.org/10.1145/2909067.2909091","url":null,"abstract":"Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123514305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper silicon based photo voltaic (PV) cells has been designed using double layer (SiO2/ZnO) anti-reflective coating (ARC). Here reflection spectrum of single layer anti-reflective coating (SLAR) of SiO2&ZnO individually and double layer anti-reflective coatings (DLAR) of SiO2/ZnO are compared. ZnO is a wide band semiconductor which provides good transparency and high electron mobility. The results indicated that the DLAR of SiO2/ZnO proved to be a valuable achievement to obtain highly absorbent surfaces. The results are obtained with planar surface of crystalline silicon substrate using Air Mass 1.5 Global (AM 1.5 G) spectrums. The average reflectance of 6.5% has been achieved within the range of 300-1400nm as maximum solar spectral irradiance of AM 1.5 G is in this region.
{"title":"Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell","authors":"Neha Mahnot, R. Mehra, Shikha Maheshwary","doi":"10.1145/2909067.2909087","DOIUrl":"https://doi.org/10.1145/2909067.2909087","url":null,"abstract":"In this paper silicon based photo voltaic (PV) cells has been designed using double layer (SiO2/ZnO) anti-reflective coating (ARC). Here reflection spectrum of single layer anti-reflective coating (SLAR) of SiO2&ZnO individually and double layer anti-reflective coatings (DLAR) of SiO2/ZnO are compared. ZnO is a wide band semiconductor which provides good transparency and high electron mobility. The results indicated that the DLAR of SiO2/ZnO proved to be a valuable achievement to obtain highly absorbent surfaces. The results are obtained with planar surface of crystalline silicon substrate using Air Mass 1.5 Global (AM 1.5 G) spectrums. The average reflectance of 6.5% has been achieved within the range of 300-1400nm as maximum solar spectral irradiance of AM 1.5 G is in this region.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131526416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not only increasing equipment efficiency, but also patient health. The Internet of Things (IoT) is increasingly being recognized by industry and different services mainly in healthcare. This paper describes the various Internet of Things (IoT) enable devices and its practices in the area of healthcare for toddler, children, chronic care, monitoring of critical patients, operation theaters and medicine dispenser.
{"title":"Use of Internet of Things (IoT) in Healthcare: A Survey","authors":"A. Yeole, D. Kalbande","doi":"10.1145/2909067.2909079","DOIUrl":"https://doi.org/10.1145/2909067.2909079","url":null,"abstract":"In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not only increasing equipment efficiency, but also patient health. The Internet of Things (IoT) is increasingly being recognized by industry and different services mainly in healthcare. This paper describes the various Internet of Things (IoT) enable devices and its practices in the area of healthcare for toddler, children, chronic care, monitoring of critical patients, operation theaters and medicine dispenser.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131910771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel edible coating formulation developed from a terpenoidal oligomer P-104 has been used as postharvest treatment to maintain pear quality. The changes in weight, color, texture, pH, total soluble solids and microbial populations of coated and uncoated pears with storage time were measured at regular intervals throughout the storage period to evaluate the effect of coating on fruit quality. Coated pears showed significant decrease in water loss, total color change, firmness, pH and microbial populations resulting the increase in shelf life of coated pears upto 15 days at room temperature in the month of August (35±2 °C).
{"title":"Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac","authors":"Anjali Bishnoi, H. M. Chawla","doi":"10.1145/2909067.2909086","DOIUrl":"https://doi.org/10.1145/2909067.2909086","url":null,"abstract":"A novel edible coating formulation developed from a terpenoidal oligomer P-104 has been used as postharvest treatment to maintain pear quality. The changes in weight, color, texture, pH, total soluble solids and microbial populations of coated and uncoated pears with storage time were measured at regular intervals throughout the storage period to evaluate the effect of coating on fruit quality. Coated pears showed significant decrease in water loss, total color change, firmness, pH and microbial populations resulting the increase in shelf life of coated pears upto 15 days at room temperature in the month of August (35±2 °C).","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125472652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}