Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409258
Yiying Zhang, Xiangzhen Li, Suxiang Zhang, Y. Zhen
Smart Grid requires lots of applications in the terminals to sense the environment or control the intelligent devices. Due to the low cost and high function, wireless sensors have been deployed in power grid wildly. Depending on wireless sensor network (WSN), the grid can build a two-way communication system, and then customers can interact extensively with the network, both in providing power consumption data and even feeding back domestically produced energy into the grid. This paper starts with an overview of various applications of wireless sensor network in smart grid and then discusses exiting issues. Wireless sensor network can sense and monitor the transmission line, substation, home etc. however, the issues of security, reliability, standardization etc should be address.
{"title":"Wireless sensor network in smart grid: Applications and issue","authors":"Yiying Zhang, Xiangzhen Li, Suxiang Zhang, Y. Zhen","doi":"10.1109/WICT.2012.6409258","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409258","url":null,"abstract":"Smart Grid requires lots of applications in the terminals to sense the environment or control the intelligent devices. Due to the low cost and high function, wireless sensors have been deployed in power grid wildly. Depending on wireless sensor network (WSN), the grid can build a two-way communication system, and then customers can interact extensively with the network, both in providing power consumption data and even feeding back domestically produced energy into the grid. This paper starts with an overview of various applications of wireless sensor network in smart grid and then discusses exiting issues. Wireless sensor network can sense and monitor the transmission line, substation, home etc. however, the issues of security, reliability, standardization etc should be address.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409044
S. Akashe, V. Rajak, G. Sharma, R. Pandey
High performance 4:2 Encoder design using standard CMOS (Complementary Metal Oxide Semiconductor) logic gates is proposed. The proposed encoder design implementation accommodates both high and low current/power characteristics with scalable design structure through MTCMOS (Multi threshold CMOS) technique. This technique is applied to minimize the entire power and shows significant improvement in terms of speed. During the simulation we simulate the encoder by regular CMOS scheme and then proposed MTCMOS technique consists of sleep transistors connect with the logic circuit. The leakage current reduces to 54.56% and leakage power is 57.71%.
{"title":"Estimation of high speed encoder with MTCMOS technique in 45 nanometer era","authors":"S. Akashe, V. Rajak, G. Sharma, R. Pandey","doi":"10.1109/WICT.2012.6409044","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409044","url":null,"abstract":"High performance 4:2 Encoder design using standard CMOS (Complementary Metal Oxide Semiconductor) logic gates is proposed. The proposed encoder design implementation accommodates both high and low current/power characteristics with scalable design structure through MTCMOS (Multi threshold CMOS) technique. This technique is applied to minimize the entire power and shows significant improvement in terms of speed. During the simulation we simulate the encoder by regular CMOS scheme and then proposed MTCMOS technique consists of sleep transistors connect with the logic circuit. The leakage current reduces to 54.56% and leakage power is 57.71%.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125188407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409190
S. Shukla, S. Dandapat, S. Prasanna
This paper proposes a novel subspace projection based approach for analysis of stressed speech signal. The projection of stressed speech vectors onto the neutral speech subspace can separate speech specific information from stress information. Orthogonality between speech and stress is assumed to separate these two information. The orthogonal relation between speech and stress subspaces is verified using speech and stress recognition techniques with a stressed speech database consisting of four stress conditions namely, neutral, angry, sad and Lombard from 30 words vocabulary. Studies show that the speech and stress specific information are present in their respective subspaces which proves orthogonality between these two subspaces.
{"title":"Subspace projection based analysis of speech under stressed condition","authors":"S. Shukla, S. Dandapat, S. Prasanna","doi":"10.1109/WICT.2012.6409190","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409190","url":null,"abstract":"This paper proposes a novel subspace projection based approach for analysis of stressed speech signal. The projection of stressed speech vectors onto the neutral speech subspace can separate speech specific information from stress information. Orthogonality between speech and stress is assumed to separate these two information. The orthogonal relation between speech and stress subspaces is verified using speech and stress recognition techniques with a stressed speech database consisting of four stress conditions namely, neutral, angry, sad and Lombard from 30 words vocabulary. Studies show that the speech and stress specific information are present in their respective subspaces which proves orthogonality between these two subspaces.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409206
M. A. Thorat, V. Deshpande
Wireless sensor network (WSN) consists of spatially distributed sensors to monitor environmental conditions. WSN has ability to cope up with the node failure, power consumption, data transfer. Performance characteristics of transport layer are reliability, congestion control, fairness, throughput etc. Performance of transport layer protocol is evaluated by these characteristics. Sensor nodes closer to the sink carries large number of packets. To avoid the congestion and reduce the probability of packet loss we have to reduce the number of packets processed by near sink nodes. So handling fairness in wireless sensor network is very essential. Fairness maintains the network traffic and helps to avoid congestion. To achieve fairness it is necessary to adjust packet transmission rate. In this paper we discuss different techniques used to achieve the fairness. And finally we discuss factors affecting fairness and requirement of traffic to be fair.
{"title":"Handling fairness in wireless sensor network","authors":"M. A. Thorat, V. Deshpande","doi":"10.1109/WICT.2012.6409206","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409206","url":null,"abstract":"Wireless sensor network (WSN) consists of spatially distributed sensors to monitor environmental conditions. WSN has ability to cope up with the node failure, power consumption, data transfer. Performance characteristics of transport layer are reliability, congestion control, fairness, throughput etc. Performance of transport layer protocol is evaluated by these characteristics. Sensor nodes closer to the sink carries large number of packets. To avoid the congestion and reduce the probability of packet loss we have to reduce the number of packets processed by near sink nodes. So handling fairness in wireless sensor network is very essential. Fairness maintains the network traffic and helps to avoid congestion. To achieve fairness it is necessary to adjust packet transmission rate. In this paper we discuss different techniques used to achieve the fairness. And finally we discuss factors affecting fairness and requirement of traffic to be fair.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130852001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409093
S. M. Handigund, C. Pushpa
The Software Requirements Specification (SRS) is prepared by the strategic management of the client organization, after collecting the end users requirements. The developer makes the feasibility study for cost estimation, availability of human & other resources and scope identification in consultation with the client for appropriate modification in the SRS. After the delivery of the software product, the end user is deprived of the modifications made in the SRS and the software architecture of the product as configured to the changing needs of the client. If the software product is used without the Product Data Flow Diagram (PdDFD), the incorporated modifications are invisible to the end users; as a result the product software becomes peripeteia with respect to client's perspective. To avoid this, it is preferable to design PdDFD by the developer. Unfortunately, in the absence of domain knowledge, the developer may not design correct and complete PdDFD. Therefore, there is an urgent need to delink the design task from the domain knowledge. As a sophomore attempt in the design of PdDFD, this paper attempts to develop the automated methodology for the abstraction of the model elements along with their values required for the PdDFD from the SRS. In this design, virtually we have narrowed down the art of defining the usecase, work process & work into engineering. In our proposed research paper, as an intermediate product we have also developed the product Work break down structure (PdWBS). This designed intermediate PdWBS can serve as the base for the design of software architecture. We have also represented the PdDFD in the tabular form without compromising its sensitive nature.
{"title":"An ameliorated methodology for the design of Product Data Flow Diagram","authors":"S. M. Handigund, C. Pushpa","doi":"10.1109/WICT.2012.6409093","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409093","url":null,"abstract":"The Software Requirements Specification (SRS) is prepared by the strategic management of the client organization, after collecting the end users requirements. The developer makes the feasibility study for cost estimation, availability of human & other resources and scope identification in consultation with the client for appropriate modification in the SRS. After the delivery of the software product, the end user is deprived of the modifications made in the SRS and the software architecture of the product as configured to the changing needs of the client. If the software product is used without the Product Data Flow Diagram (PdDFD), the incorporated modifications are invisible to the end users; as a result the product software becomes peripeteia with respect to client's perspective. To avoid this, it is preferable to design PdDFD by the developer. Unfortunately, in the absence of domain knowledge, the developer may not design correct and complete PdDFD. Therefore, there is an urgent need to delink the design task from the domain knowledge. As a sophomore attempt in the design of PdDFD, this paper attempts to develop the automated methodology for the abstraction of the model elements along with their values required for the PdDFD from the SRS. In this design, virtually we have narrowed down the art of defining the usecase, work process & work into engineering. In our proposed research paper, as an intermediate product we have also developed the product Work break down structure (PdWBS). This designed intermediate PdWBS can serve as the base for the design of software architecture. We have also represented the PdDFD in the tabular form without compromising its sensitive nature.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409063
A. Bongale, N. Nithin, L. Jyothi
This paper presents treatment of incoming traffic in Multi-Protocol Label Switching (MPLS) enabled Open Shortest Path First (OSPF) network where traffic is classified based on its type. In this paper, the network is simulated with incoming traffic as a mixture of delay sensitive voice and web browsing data. End-to-end Quality of Service (QoS) is ensured using Forward Equivalence Class (FEC) and thus voice packets are given primary importance. Comparison is drawn between the OSPF network and MPLS enabled OSPF network to show the low voice delays and increase in number of http object responses in MPLS core.
{"title":"Traffic prioritization in MPLS enabled OSPF network","authors":"A. Bongale, N. Nithin, L. Jyothi","doi":"10.1109/WICT.2012.6409063","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409063","url":null,"abstract":"This paper presents treatment of incoming traffic in Multi-Protocol Label Switching (MPLS) enabled Open Shortest Path First (OSPF) network where traffic is classified based on its type. In this paper, the network is simulated with incoming traffic as a mixture of delay sensitive voice and web browsing data. End-to-end Quality of Service (QoS) is ensured using Forward Equivalence Class (FEC) and thus voice packets are given primary importance. Comparison is drawn between the OSPF network and MPLS enabled OSPF network to show the low voice delays and increase in number of http object responses in MPLS core.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409257
Jianying Zhang, Hongbo Liu, Hong Yu
When traditional database theories applied to large scale computing environments like cloud computing, difficulties encountered in many aspects, such as ACID transaction, closed-world assumption, data consistency, security, and scalability. In this paper, on the basis of analyzing the limitation of closed world assumption for massively computing environments, and from the viewpoint of complex giant system, a high level data model of relational database outlining a solution to large scale computing environments is proposed, in which semantic clusters of data, called data multitrees are taken as distribution units. We mainly investigate the motive for constructing such a data model, and briefly introduce the model to make the paper complete.
{"title":"The motive for constructing a high level data model on cloud databases","authors":"Jianying Zhang, Hongbo Liu, Hong Yu","doi":"10.1109/WICT.2012.6409257","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409257","url":null,"abstract":"When traditional database theories applied to large scale computing environments like cloud computing, difficulties encountered in many aspects, such as ACID transaction, closed-world assumption, data consistency, security, and scalability. In this paper, on the basis of analyzing the limitation of closed world assumption for massively computing environments, and from the viewpoint of complex giant system, a high level data model of relational database outlining a solution to large scale computing environments is proposed, in which semantic clusters of data, called data multitrees are taken as distribution units. We mainly investigate the motive for constructing such a data model, and briefly introduce the model to make the paper complete.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121607118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409059
Akhil Behl, Kanika Behl
Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology and related functions and aspects without upfront investment and with lower Total Cost of Ownership (TCO). Cloud computing opens doors to multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage and computing requirement fulfillment. However, despite the potential gains achieved from the cloud computing, the security of an open-ended and rather freely accessible resource is still questionable which impacts the cloud adoption. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This paper introduces a detailed analysis of the cloud security problem. It investigates the problem of security from the cloud architecture perspective, the cloud characteristics perspective, cloud delivery model perspective, and the cloud stakeholder perspective. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud model. Based on this analysis it presents a derived detailed specification of the cloud security problem and key features that should be covered by any proposed security solution for cloud computing.
{"title":"An analysis of cloud computing security issues","authors":"Akhil Behl, Kanika Behl","doi":"10.1109/WICT.2012.6409059","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409059","url":null,"abstract":"Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology and related functions and aspects without upfront investment and with lower Total Cost of Ownership (TCO). Cloud computing opens doors to multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage and computing requirement fulfillment. However, despite the potential gains achieved from the cloud computing, the security of an open-ended and rather freely accessible resource is still questionable which impacts the cloud adoption. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This paper introduces a detailed analysis of the cloud security problem. It investigates the problem of security from the cloud architecture perspective, the cloud characteristics perspective, cloud delivery model perspective, and the cloud stakeholder perspective. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud model. Based on this analysis it presents a derived detailed specification of the cloud security problem and key features that should be covered by any proposed security solution for cloud computing.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115944344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409162
S. Purkayastha
Integration of Health Information Systems (HIS) has been a challenge because of the different semantics that are used by health-care practices and different levels of health-care systems need different kinds of information. Looking through the case of two widely used open-source HIS (one patient-level and one aggregate country-level system), the paper analyses multiple approaches for integration. The paper develops a novel integration engine (HIXEn) that uses concepts of distributed hypermedia systems from RESTful architecture and Resource Descriptors from semantic web that can allow health information exchanges to flexibly connect different HIS.
{"title":"HIXEn: An integration engine for multi-vocabulary health information using REST & semantic metadata mapping","authors":"S. Purkayastha","doi":"10.1109/WICT.2012.6409162","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409162","url":null,"abstract":"Integration of Health Information Systems (HIS) has been a challenge because of the different semantics that are used by health-care practices and different levels of health-care systems need different kinds of information. Looking through the case of two widely used open-source HIS (one patient-level and one aggregate country-level system), the paper analyses multiple approaches for integration. The paper develops a novel integration engine (HIXEn) that uses concepts of distributed hypermedia systems from RESTful architecture and Resource Descriptors from semantic web that can allow health information exchanges to flexibly connect different HIS.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409234
Xu Li, Xiuyan Zhao, Fenglong Fan, Bai Liu
Unsupervised learning can address the general limitation of supervised learning that sense-tagged text is not available for most domains and is expensive to create. However, the existing unsupervised learning probabilistic models are computationally expensive and convergence slowly because of large numbers and random initialization of model parameters. This paper reduces the noise jamming and the dimensionality of the models by using proposed feature selection and initial parameter estimation. Experimental result shows the accuracy and efficiency of the proposed probabilistic model are obviously improved.
{"title":"An improved unsupervised learning probabilistic model of word sense disambiguation","authors":"Xu Li, Xiuyan Zhao, Fenglong Fan, Bai Liu","doi":"10.1109/WICT.2012.6409234","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409234","url":null,"abstract":"Unsupervised learning can address the general limitation of supervised learning that sense-tagged text is not available for most domains and is expensive to create. However, the existing unsupervised learning probabilistic models are computationally expensive and convergence slowly because of large numbers and random initialization of model parameters. This paper reduces the noise jamming and the dimensionality of the models by using proposed feature selection and initial parameter estimation. Experimental result shows the accuracy and efficiency of the proposed probabilistic model are obviously improved.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}