Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418524
Rajeshwari, A. Bagwari
We know that the rise of harmonics is a major problem now days in non-linear loads. The universal use of non-linear loads like in power electronics equipment which amplified the harmonic-related difficulties in service and trade power systems this make an essential requirement of filter. The nonlinear loads be compensated & sometime we can identified but sometimes they include their own non characteristic harmonic portion & not ideal as it is actual in input & voltage sag occur so many times in a day. As increasing the harmonic magnitude component contribution of key problem also rises in industrial sector, so this is a very complex in power system, to overcome we using different methods to reduce this major problem. This paper is presents a proposed model of passive Alter & combination of shunt active & passive filter to reducing harmonic limits in single-phase system as tracked by IEEE std. 519-1992.
{"title":"Voltage harmonic reduction using passive filter shunt passive-active filters for non-linear load","authors":"Rajeshwari, A. Bagwari","doi":"10.1109/CSNT.2017.8418524","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418524","url":null,"abstract":"We know that the rise of harmonics is a major problem now days in non-linear loads. The universal use of non-linear loads like in power electronics equipment which amplified the harmonic-related difficulties in service and trade power systems this make an essential requirement of filter. The nonlinear loads be compensated & sometime we can identified but sometimes they include their own non characteristic harmonic portion & not ideal as it is actual in input & voltage sag occur so many times in a day. As increasing the harmonic magnitude component contribution of key problem also rises in industrial sector, so this is a very complex in power system, to overcome we using different methods to reduce this major problem. This paper is presents a proposed model of passive Alter & combination of shunt active & passive filter to reducing harmonic limits in single-phase system as tracked by IEEE std. 519-1992.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418568
P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai
In modern era of computing, organizations are focusing on the better utilization of technology and surviving to gear-up with global business demand. Such competition is acting as a driving force for its business to cope-up the data which generated every second of minute. This data needs to figure out and segregated with information which is required for is business growth model. The Predictive Analytics (PA) uses various algorithms to find out different patterns in large data that might suggest the efficient behavior for business solution. This paper provides a conceptual decision making process for data using predictive analysis to maximize the success ratio for handling large dataset. Today, different technologies like cloud computing, SOA, are together transforming information technology but in turn, are imposing new complexities to the data computation. Due to such advances in technologies, and it requires rapid and dynamic data analysis for structured and unstructured data.
{"title":"Predictive analytics in data science for business intelligence solutions","authors":"P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai","doi":"10.1109/CSNT.2017.8418568","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418568","url":null,"abstract":"In modern era of computing, organizations are focusing on the better utilization of technology and surviving to gear-up with global business demand. Such competition is acting as a driving force for its business to cope-up the data which generated every second of minute. This data needs to figure out and segregated with information which is required for is business growth model. The Predictive Analytics (PA) uses various algorithms to find out different patterns in large data that might suggest the efficient behavior for business solution. This paper provides a conceptual decision making process for data using predictive analysis to maximize the success ratio for handling large dataset. Today, different technologies like cloud computing, SOA, are together transforming information technology but in turn, are imposing new complexities to the data computation. Due to such advances in technologies, and it requires rapid and dynamic data analysis for structured and unstructured data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418564
R. Pandey, Nidhi Srivastava, Komal Verma
Data Visualization involves the creation and study of the visual representation of data. This paper involves the integration of R Studio with Microsoft Azure. It will be used to analyze the "Adult Dataset (adult.csv)", which consists of various attributes based on which graphs will be made for visual representation of dataset. Several inferences have been drawn from the analysis and graphical representation of the dataset.
{"title":"Data visualization through R and Azure for scaling machine training sets","authors":"R. Pandey, Nidhi Srivastava, Komal Verma","doi":"10.1109/CSNT.2017.8418564","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418564","url":null,"abstract":"Data Visualization involves the creation and study of the visual representation of data. This paper involves the integration of R Studio with Microsoft Azure. It will be used to analyze the \"Adult Dataset (adult.csv)\", which consists of various attributes based on which graphs will be made for visual representation of dataset. Several inferences have been drawn from the analysis and graphical representation of the dataset.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418534
Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan
As we all know an image is an artifact that depicts visual perception. In order to extract information or modify those images we have to perform some operation on it. In this paper we present a methodology to segment hand images using modified k-means clustering with value of threshold and analysis of histogram. Experimental results show 97% accurate results so we can say proposed methodology is better then previous.
{"title":"K-means clustering with adaptive threshold for segmentation of hand images","authors":"Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan","doi":"10.1109/CSNT.2017.8418534","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418534","url":null,"abstract":"As we all know an image is an artifact that depicts visual perception. In order to extract information or modify those images we have to perform some operation on it. In this paper we present a methodology to segment hand images using modified k-means clustering with value of threshold and analysis of histogram. Experimental results show 97% accurate results so we can say proposed methodology is better then previous.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418502
S. Srivastava, Shivani Dixit, M. Shukla
This research work presents a novel numerical interleaver for generation of user specific interleaving sequences, for interleave-division multiple-access (IDMA) system. In general, all the interleaving sequences, used by users, need to be transferred to receiver side for extracting the user specific data with help of de-interleaving process. In the proposed interleaver, there is no need to transfer any interleaving sequences to the receiver. This interleaver eliminates the problem of high consumption of bandwidth as the interleaved sequences depend only on few parameters and it can be easily generated at the receiver if receiver system is aware of these parameters. To make comparison with other interleavers, the bit error rate (BER) performance analysis has been performed under Additive White Gaussian Noise (AWGN) channel conditions based on the computer MATLAB simulations. The simulation results demonstrate that the proposed numerical interleaver provides better BER performance since it allows the communication system to easily check for more orthogonal interleaving patterns by changing the values of few parameters.
{"title":"Analysis of numerical interleaver for IDMA scheme","authors":"S. Srivastava, Shivani Dixit, M. Shukla","doi":"10.1109/CSNT.2017.8418502","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418502","url":null,"abstract":"This research work presents a novel numerical interleaver for generation of user specific interleaving sequences, for interleave-division multiple-access (IDMA) system. In general, all the interleaving sequences, used by users, need to be transferred to receiver side for extracting the user specific data with help of de-interleaving process. In the proposed interleaver, there is no need to transfer any interleaving sequences to the receiver. This interleaver eliminates the problem of high consumption of bandwidth as the interleaved sequences depend only on few parameters and it can be easily generated at the receiver if receiver system is aware of these parameters. To make comparison with other interleavers, the bit error rate (BER) performance analysis has been performed under Additive White Gaussian Noise (AWGN) channel conditions based on the computer MATLAB simulations. The simulation results demonstrate that the proposed numerical interleaver provides better BER performance since it allows the communication system to easily check for more orthogonal interleaving patterns by changing the values of few parameters.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418516
P. Mayank, A. K. Singh
Today anonymity and privacy are the major concerns of Internet users. There are several types and implementations of anonymizing services available on the Internet. Tor is one of the services among those services. Tor networks are based on onion routing concept, and is now very popular. Surprisingly, very few research has been done on such an anonymizing network. Activist, journalist and writers use this tool for their freedom of speech, but it is also mis-used by malware, distributed denial of service attacks, hidden services that sells illegal things, spams, and many more. This paper will explain Tor usage detection by analysing the TLS connection that is used to make the connection secure and using the characteristics found during analysis to detect and block the Tor traffic originated from Tor browser.
如今,匿名和隐私是互联网用户最关心的问题。互联网上有多种类型和实现方式的匿名服务。Tor 就是其中之一。Tor 网络基于洋葱路由概念,现在非常流行。令人惊讶的是,关于这种匿名网络的研究却寥寥无几。活动家、记者和作家使用这一工具来维护言论自由,但它也被恶意软件、分布式拒绝服务攻击、销售非法物品的隐藏服务、垃圾邮件等滥用。本文将通过分析用于确保连接安全的 TLS 连接,并利用分析过程中发现的特征来检测和阻止源自 Tor 浏览器的 Tor 流量,从而解释如何检测 Tor 的使用情况。
{"title":"Tor traffic identification","authors":"P. Mayank, A. K. Singh","doi":"10.1109/CSNT.2017.8418516","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418516","url":null,"abstract":"Today anonymity and privacy are the major concerns of Internet users. There are several types and implementations of anonymizing services available on the Internet. Tor is one of the services among those services. Tor networks are based on onion routing concept, and is now very popular. Surprisingly, very few research has been done on such an anonymizing network. Activist, journalist and writers use this tool for their freedom of speech, but it is also mis-used by malware, distributed denial of service attacks, hidden services that sells illegal things, spams, and many more. This paper will explain Tor usage detection by analysing the TLS connection that is used to make the connection secure and using the characteristics found during analysis to detect and block the Tor traffic originated from Tor browser.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418530
N. Rathee, Ashutosh Vaish, Sagar Gupta
Facial Feature extraction is used in a number of applications including emotion detection. In the following approach various popular feature descriptors, including Gabor features, HOG, DWT were computed. We have fused features using Multiview Distance Metric Learning (MDML) which utilizes complementary features of the images to extract every known detail while eliminating the redundant features. Moreover MDML maps the features extracted from the dataset to higher discriminative space. The features belonging to the same class are brought closer and those that are from different classes are forced away by the MDML thereby increasing the accuracy of the classifier employed. CK+ Dataset has been used to conduct the experiments. Experimental results represent the efficacy of the method is 93.5% displaying the potential of the recommended manner.
{"title":"Emotion detection through fusion of complementary facial features","authors":"N. Rathee, Ashutosh Vaish, Sagar Gupta","doi":"10.1109/CSNT.2017.8418530","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418530","url":null,"abstract":"Facial Feature extraction is used in a number of applications including emotion detection. In the following approach various popular feature descriptors, including Gabor features, HOG, DWT were computed. We have fused features using Multiview Distance Metric Learning (MDML) which utilizes complementary features of the images to extract every known detail while eliminating the redundant features. Moreover MDML maps the features extracted from the dataset to higher discriminative space. The features belonging to the same class are brought closer and those that are from different classes are forced away by the MDML thereby increasing the accuracy of the classifier employed. CK+ Dataset has been used to conduct the experiments. Experimental results represent the efficacy of the method is 93.5% displaying the potential of the recommended manner.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418539
Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer
In today's scenario, where everything is internet based, there is a huge demand for data security. A large number of cryptographic techniques are available to handle this problem. To increase data security, data can first be compressed using compression techniques and then encryption techniques can be applied. In this paper, we are proposing two new algorithms for encryption in which we have incorporated the concept of diffusion and confusion. The algorithms are based on Transposition cipher, Substitution cipher and Symmetric Key Encryption. Brute force on these algorithms can't be done so easily. These can be applied along with data compression to get more security.
{"title":"Enhancement in data security using cryptography and compression","authors":"Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer","doi":"10.1109/CSNT.2017.8418539","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418539","url":null,"abstract":"In today's scenario, where everything is internet based, there is a huge demand for data security. A large number of cryptographic techniques are available to handle this problem. To increase data security, data can first be compressed using compression techniques and then encryption techniques can be applied. In this paper, we are proposing two new algorithms for encryption in which we have incorporated the concept of diffusion and confusion. The algorithms are based on Transposition cipher, Substitution cipher and Symmetric Key Encryption. Brute force on these algorithms can't be done so easily. These can be applied along with data compression to get more security.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418559
S. Pournamy, Navin Kumar
In this paper, 60GHz millimeter wave (mmWave) two stage common source (CS) cascode low noise amplifier (LNA) with degenerative inductor is designed in 65nm CMOS technology. It has a wide band (57–64GHz) and highly stable characteristics. We have also proposed two different techniques to design the LNA unconditionally stable and increase its linearity without degrading other performancemetrics. Simulation results of a two stage LNA without the stability improvisation show a peak gain of 24.5dB at 61GHz, input return loss of −9.1dB, noise factor (NF) of 1.5dB, static power dissipation Pdc of 6.63mW and is conditionally stable. In one of the methods of designing LNA unconditionally stable is to reduce the gain to 19.5dB by incorporating an additional inductor at the source of second stage amplifier. Linearity is also increased to P1dB of −2.44dBm without degradation of other parameters. Another approach is to maintain the peak gain greater than 22dB by increasing the transconductance of the CMOS transistors. This increases the return loss to −14.5dB. Various obtained results are presented and discussed.
{"title":"Design of 60GHz broadband LNA for 5G cellular using 65nm CMOS technology","authors":"S. Pournamy, Navin Kumar","doi":"10.1109/CSNT.2017.8418559","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418559","url":null,"abstract":"In this paper, 60GHz millimeter wave (mmWave) two stage common source (CS) cascode low noise amplifier (LNA) with degenerative inductor is designed in 65nm CMOS technology. It has a wide band (57–64GHz) and highly stable characteristics. We have also proposed two different techniques to design the LNA unconditionally stable and increase its linearity without degrading other performancemetrics. Simulation results of a two stage LNA without the stability improvisation show a peak gain of 24.5dB at 61GHz, input return loss of −9.1dB, noise factor (NF) of 1.5dB, static power dissipation Pdc of 6.63mW and is conditionally stable. In one of the methods of designing LNA unconditionally stable is to reduce the gain to 19.5dB by incorporating an additional inductor at the source of second stage amplifier. Linearity is also increased to P1dB of −2.44dBm without degradation of other parameters. Another approach is to maintain the peak gain greater than 22dB by increasing the transconductance of the CMOS transistors. This increases the return loss to −14.5dB. Various obtained results are presented and discussed.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418549
Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit
This concept is about tracking a smartphone using a GPS independent of state whether the smartphone is switched on or off. When the user makes a request to track, the receiver receives the request and then triggers the GPS to locate the device. Further, the GPS obtains location data in the form of geographical co-ordinates which is then processed by the chip and transmit the latest co-ordinates to the user. Since independent power supply is used, under any circumstances our smartphone can be easily tracked by the user.
{"title":"All time tracking system for recovering stolen devices even in power-off state","authors":"Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit","doi":"10.1109/CSNT.2017.8418549","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418549","url":null,"abstract":"This concept is about tracking a smartphone using a GPS independent of state whether the smartphone is switched on or off. When the user makes a request to track, the receiver receives the request and then triggers the GPS to locate the device. Further, the GPS obtains location data in the form of geographical co-ordinates which is then processed by the chip and transmit the latest co-ordinates to the user. Since independent power supply is used, under any circumstances our smartphone can be easily tracked by the user.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}