Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418546
Dheeresh Soni, M. Kumar
The use of cloud computing platform is growing now days. It is used in all the area of Education, Business, Web Domain and Data Servers. The developing interest is a direct result of the on interest of pay per premise. In any case, the uses upgrade the danger of information catching and phony. As the administrations are sharing inside diverse cloud clients and the availability are likewise distinctive. So security is a noteworthy concern now days. The objective of this paper is to establish a way for the future enhancements based on the previous research. Our paper also analyzed the trends and the characteristics. The gaps with the future suggestions are highlighted.
{"title":"Secure data communication in client-cloud environment: A survey","authors":"Dheeresh Soni, M. Kumar","doi":"10.1109/CSNT.2017.8418546","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418546","url":null,"abstract":"The use of cloud computing platform is growing now days. It is used in all the area of Education, Business, Web Domain and Data Servers. The developing interest is a direct result of the on interest of pay per premise. In any case, the uses upgrade the danger of information catching and phony. As the administrations are sharing inside diverse cloud clients and the availability are likewise distinctive. So security is a noteworthy concern now days. The objective of this paper is to establish a way for the future enhancements based on the previous research. Our paper also analyzed the trends and the characteristics. The gaps with the future suggestions are highlighted.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418547
Anuradha Singh
One of the most challenging tasks in real life is to find the multiple zeros of nonlinear equations. It is also known that the iterative methods are highly sensitive towards initial guesses. So, the choice of initial guess is also a difficult task with iterative methods. Various researchers have established the generalized form of iterative methods for finding the multiple roots. The prime focus of this study is to extend existing fourth order method from simple roots to multiple roots because some of the available methods for findings multiple root are fails or do not perform well for some nonlinear functions.
{"title":"An efficient iterative scheme for computing multiple roots of nonlinear equations","authors":"Anuradha Singh","doi":"10.1109/CSNT.2017.8418547","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418547","url":null,"abstract":"One of the most challenging tasks in real life is to find the multiple zeros of nonlinear equations. It is also known that the iterative methods are highly sensitive towards initial guesses. So, the choice of initial guess is also a difficult task with iterative methods. Various researchers have established the generalized form of iterative methods for finding the multiple roots. The prime focus of this study is to extend existing fourth order method from simple roots to multiple roots because some of the available methods for findings multiple root are fails or do not perform well for some nonlinear functions.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418569
Ariruna Dasgupta, Dibyabiva Seth, Anindita Ghosh, A. Nath
This paper discusses the design and prototype implementation of a Sign Language to Braille Converter as well as an English Language to Braille Converter. This prototype can convert any sign language to the corresponding Braille system. For simplicity, the finger-spelling component of the ASL (American Sign Language) was chosen. The paper proposes a simple and affordable device that incorporates a software interface to convert ASL to braille along with a dedicated hardware component to produce the Braille output. The device was experimentally verified to be giving accurate outputs.
{"title":"Real time sign language to Braille interfacing system","authors":"Ariruna Dasgupta, Dibyabiva Seth, Anindita Ghosh, A. Nath","doi":"10.1109/CSNT.2017.8418569","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418569","url":null,"abstract":"This paper discusses the design and prototype implementation of a Sign Language to Braille Converter as well as an English Language to Braille Converter. This prototype can convert any sign language to the corresponding Braille system. For simplicity, the finger-spelling component of the ASL (American Sign Language) was chosen. The paper proposes a simple and affordable device that incorporates a software interface to convert ASL to braille along with a dedicated hardware component to produce the Braille output. The device was experimentally verified to be giving accurate outputs.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125658435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418527
B. Nandwana, S. Tazi, Sheifalee Trivedi, D. Kumar, S. Vipparthi
Hand gesture recognition system has a good attention now days because of easy interaction between human and machine. The focus of developing hand gesture is to create a better communication between human and computer for conveying information. This paper presents a survey on recent technology of hand gesture recognition both static and dynamic. It shows all method that was used for hand gesture recognition in different research paper.
{"title":"A survey paper on hand gesture recognition","authors":"B. Nandwana, S. Tazi, Sheifalee Trivedi, D. Kumar, S. Vipparthi","doi":"10.1109/CSNT.2017.8418527","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418527","url":null,"abstract":"Hand gesture recognition system has a good attention now days because of easy interaction between human and machine. The focus of developing hand gesture is to create a better communication between human and computer for conveying information. This paper presents a survey on recent technology of hand gesture recognition both static and dynamic. It shows all method that was used for hand gesture recognition in different research paper.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418517
J. Grover, Ashish Jain, N. Chaudhari
One of the vital application of Emergency Ad hoc Networks is to establish communication between those affected by emergency situation and responders providing services. In most such cases, the conventional communication infrastructure such as wired and cellular networks get damaged and therefore cannot provide communication required to exchange emergency information. Therefore, to cope with such disasters in a fast and coordinated way, the optimal provisioning of the emergency information is crucial. Unmanned Aerial Vehicles (UAV) are the paramount components for such situations. UAVs can act as mobile base stations and facilitate wireless communication to connect to nearest working telephone network access point. A large scale disaster information system can be formed by combining UAV network with existing available network regardless of some of network lines being damaged and destroyed. In this paper, we have designed a prototype of UAV assisted emergency ad hoc network (EANET). We have also evaluated and compared AODV and ZRP routing protocols by varying the number of UAV assisted EANET nodes in different transmission range cases of disaster scenarios. The experimental results illustrate that ZRP is the most appropriate protocol for emergency situations.
{"title":"Unmanned aerial vehicles operated emergency ad hoc networks","authors":"J. Grover, Ashish Jain, N. Chaudhari","doi":"10.1109/CSNT.2017.8418517","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418517","url":null,"abstract":"One of the vital application of Emergency Ad hoc Networks is to establish communication between those affected by emergency situation and responders providing services. In most such cases, the conventional communication infrastructure such as wired and cellular networks get damaged and therefore cannot provide communication required to exchange emergency information. Therefore, to cope with such disasters in a fast and coordinated way, the optimal provisioning of the emergency information is crucial. Unmanned Aerial Vehicles (UAV) are the paramount components for such situations. UAVs can act as mobile base stations and facilitate wireless communication to connect to nearest working telephone network access point. A large scale disaster information system can be formed by combining UAV network with existing available network regardless of some of network lines being damaged and destroyed. In this paper, we have designed a prototype of UAV assisted emergency ad hoc network (EANET). We have also evaluated and compared AODV and ZRP routing protocols by varying the number of UAV assisted EANET nodes in different transmission range cases of disaster scenarios. The experimental results illustrate that ZRP is the most appropriate protocol for emergency situations.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121112764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418554
S. Shivashankara, S. Srinath
American Sign Language Recognition (ASLR) system is a process where the computer understands the gestures of American Sign Language (ASL) automatically and converts them into their equivalent human / machine readable text. Several researchers have presented various vision based techniques to recognize static and dynamic gesture recognition of ASL. In this paper an effort has been made to highlight the various works and a comparative study of those works carried out by the researchers in recognizing ASL.
{"title":"A review on vision based American sign language recognition, its techniques, and outcomes","authors":"S. Shivashankara, S. Srinath","doi":"10.1109/CSNT.2017.8418554","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418554","url":null,"abstract":"American Sign Language Recognition (ASLR) system is a process where the computer understands the gestures of American Sign Language (ASL) automatically and converts them into their equivalent human / machine readable text. Several researchers have presented various vision based techniques to recognize static and dynamic gesture recognition of ASL. In this paper an effort has been made to highlight the various works and a comparative study of those works carried out by the researchers in recognizing ASL.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115019504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418548
Agrata Shukla, Vijay Bhandari, Amit Shrivastava
Data streams are the sequence of data packets for communication. The properties of the target variable that is trying to predict, changes at the occurrence of concept drift. So, The observations become less accurate as the time passes. When the speed of concept drift is very fast, In terms of milliseconds, the accuracy of predictions is very difficult to handle. So to solve the problem the new stay one forget multiple extreme learning machine with deep network using time interval process is proposed.
{"title":"Stay one forget multiple extreme learning machine with deep network using time interval process: A review","authors":"Agrata Shukla, Vijay Bhandari, Amit Shrivastava","doi":"10.1109/CSNT.2017.8418548","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418548","url":null,"abstract":"Data streams are the sequence of data packets for communication. The properties of the target variable that is trying to predict, changes at the occurrence of concept drift. So, The observations become less accurate as the time passes. When the speed of concept drift is very fast, In terms of milliseconds, the accuracy of predictions is very difficult to handle. So to solve the problem the new stay one forget multiple extreme learning machine with deep network using time interval process is proposed.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418528
Poorva Gubrele, R. Prasad, P. Saurabh, B. Verma
Hand gesture recognition system is employed to provide interface between computer and human using hand gesture. This paper presents a technique for human computer interface through common hand gesture that is efficient to commemorate 25 aspersion gestures from the American sign language hand alphabet. The prospect of this paper is to develop up an algorithm for hand gesture recognition with reasonable accuracy. This work uses a domain independent learning methodology to automatically stir low-level spatio-temporal descriptors for high-level cross recognition by Correlated variance programming. Feature extraction is the most important orientation for gesture recognition and is indeed important in terms of giving input to a classifier. In this work Canny edge detector algorithm is used to find edge of the segmented and morphological filtered image which yields boundary of hand gesture in the image then Correlated variance mean based programming applied for recognition of gesture. Experimental results very precisely indicate that the developed method outperforms the existing state of the art.
{"title":"Advance morphological filtering, correlation and convolution method for gesture recognition","authors":"Poorva Gubrele, R. Prasad, P. Saurabh, B. Verma","doi":"10.1109/CSNT.2017.8418528","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418528","url":null,"abstract":"Hand gesture recognition system is employed to provide interface between computer and human using hand gesture. This paper presents a technique for human computer interface through common hand gesture that is efficient to commemorate 25 aspersion gestures from the American sign language hand alphabet. The prospect of this paper is to develop up an algorithm for hand gesture recognition with reasonable accuracy. This work uses a domain independent learning methodology to automatically stir low-level spatio-temporal descriptors for high-level cross recognition by Correlated variance programming. Feature extraction is the most important orientation for gesture recognition and is indeed important in terms of giving input to a classifier. In this work Canny edge detector algorithm is used to find edge of the segmented and morphological filtered image which yields boundary of hand gesture in the image then Correlated variance mean based programming applied for recognition of gesture. Experimental results very precisely indicate that the developed method outperforms the existing state of the art.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122062947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418543
S. Lighari, D. Hussain
Advanced Metering Infrastructure (AMI) is a kind of communication infrastructure with millions of Smart Meters. The Smart Meters and other components of AMI generate data with high capacity and rate. In the result, data becomes hard to analyze with traditional methods, therefore, some advanced analytics like big data analytics can be very expedient here. There are two types of data passed by every communication system, they are actual and network data. Due to enormous size of AMI network, it produces both actual and network data in terabytes or even more. The actual data is collected from AMI at the AMI repository which can be applied for billing, energy forecasting and demand response applications. The network data controls the passage of actual data and can be a good source to examine the security of AMI system. The authors in the paper review the advanced analytics of the network data for detecting the anomalies in the AMI network. The AMI comprises of a firewall at the entrance of the data center which monitors ins and outs of the data based on security rules. In order to increase the efficiency of the firewall, it is proposed to use the big data analytics for advanced surveillance. There are many tools available for big data analytics. Among those, the apache spark is getting popularity because of its fast in memory cluster computing. It features processing of both batch and streamed data. The inclusion of apache spark as the surveillance tool will make the firewall stream processing more efficient. We also propose the use of machine learning algorithms by AMI firewall for better prediction of anomalies. The machine learning libraries are also well supported by apache spark.
{"title":"Reviewing the security surveillance of AMI using big data analytics","authors":"S. Lighari, D. Hussain","doi":"10.1109/CSNT.2017.8418543","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418543","url":null,"abstract":"Advanced Metering Infrastructure (AMI) is a kind of communication infrastructure with millions of Smart Meters. The Smart Meters and other components of AMI generate data with high capacity and rate. In the result, data becomes hard to analyze with traditional methods, therefore, some advanced analytics like big data analytics can be very expedient here. There are two types of data passed by every communication system, they are actual and network data. Due to enormous size of AMI network, it produces both actual and network data in terabytes or even more. The actual data is collected from AMI at the AMI repository which can be applied for billing, energy forecasting and demand response applications. The network data controls the passage of actual data and can be a good source to examine the security of AMI system. The authors in the paper review the advanced analytics of the network data for detecting the anomalies in the AMI network. The AMI comprises of a firewall at the entrance of the data center which monitors ins and outs of the data based on security rules. In order to increase the efficiency of the firewall, it is proposed to use the big data analytics for advanced surveillance. There are many tools available for big data analytics. Among those, the apache spark is getting popularity because of its fast in memory cluster computing. It features processing of both batch and streamed data. The inclusion of apache spark as the surveillance tool will make the firewall stream processing more efficient. We also propose the use of machine learning algorithms by AMI firewall for better prediction of anomalies. The machine learning libraries are also well supported by apache spark.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418570
Prakhar Gupta, R. Negi, S. Shekhar
This paper proposes the faster version of the searching tool used in desktops. The searching tool normally used is based on sequential search i.e. the drives are searched in a sequential manner one after the other which is time consuming. In this paper we have proposed a version based on the multithreading approach, the number of threads equal to the number of drives in the desktop are created. Since multiple threads can be executed simultaneously so all the drives are searched simultaneously rather than sequentially. The searching results are displayed to the user. The proposed version is checked multiple times on different desktops and results are obtained in the less time than the normal searching tool. The version is totally implemented in java, efficient and fast searching tool.
{"title":"Searching made easy: A multithreading based desktop search engine","authors":"Prakhar Gupta, R. Negi, S. Shekhar","doi":"10.1109/CSNT.2017.8418570","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418570","url":null,"abstract":"This paper proposes the faster version of the searching tool used in desktops. The searching tool normally used is based on sequential search i.e. the drives are searched in a sequential manner one after the other which is time consuming. In this paper we have proposed a version based on the multithreading approach, the number of threads equal to the number of drives in the desktop are created. Since multiple threads can be executed simultaneously so all the drives are searched simultaneously rather than sequentially. The searching results are displayed to the user. The proposed version is checked multiple times on different desktops and results are obtained in the less time than the normal searching tool. The version is totally implemented in java, efficient and fast searching tool.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}