Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229865
Zaheeruddin, A. Pathak
A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions (eg. resource exploration in hostile locations, wildlife safety etc). Dividing the sensing area into clusters is advantages in wireless sensor network to enhance network lifetime. In this paper, Bee colony inspired clustering protocol is introduced which takes of inspiration for achieving high efficiency and stability performance from bee colonies. Experimental results demonstrate the efficiency of proposed protocol to strike the appropriate performance in the lifetime of the wireless sensor network.
{"title":"A Bee colony inspired clustering protocol for wireless sensor networks","authors":"Zaheeruddin, A. Pathak","doi":"10.1109/CCAA.2017.8229865","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229865","url":null,"abstract":"A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions (eg. resource exploration in hostile locations, wildlife safety etc). Dividing the sensing area into clusters is advantages in wireless sensor network to enhance network lifetime. In this paper, Bee colony inspired clustering protocol is introduced which takes of inspiration for achieving high efficiency and stability performance from bee colonies. Experimental results demonstrate the efficiency of proposed protocol to strike the appropriate performance in the lifetime of the wireless sensor network.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"54 1","pages":"570-575"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84744666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229843
Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar
Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.
{"title":"Edge detection using particle swarm optimization technique","authors":"Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar","doi":"10.1109/CCAA.2017.8229843","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229843","url":null,"abstract":"Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"6 1","pages":"363-367"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229895
A. Basnet, S. Shakya, Mandira Thapa
Latest technology requires increase in spectral efficiency by optimum utilization of the spectrum band with higher power efficiency. In this paper first, Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and then maximum allowable total power that interferes below than limit is adaptively calculated. For power distribution, two power and capacity optimization algorithm; namely Water filling and Iterative water filling are used. The paper is also able to calculate and distribute power in different subcarrier for multiple nodes to maximize total system data rate or spectrum efficiency.
{"title":"Power and capacity optimization for wireless sensor network (WSN)","authors":"A. Basnet, S. Shakya, Mandira Thapa","doi":"10.1109/CCAA.2017.8229895","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229895","url":null,"abstract":"Latest technology requires increase in spectral efficiency by optimum utilization of the spectrum band with higher power efficiency. In this paper first, Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and then maximum allowable total power that interferes below than limit is adaptively calculated. For power distribution, two power and capacity optimization algorithm; namely Water filling and Iterative water filling are used. The paper is also able to calculate and distribute power in different subcarrier for multiple nodes to maximize total system data rate or spectrum efficiency.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"8 1","pages":"434-439"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87821063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229983
Rahul Dev, Ruqaiya Khanam
In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.
{"title":"Review on finger vein feature extraction methods","authors":"Rahul Dev, Ruqaiya Khanam","doi":"10.1109/CCAA.2017.8229983","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229983","url":null,"abstract":"In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"11 6 1","pages":"1209-1213"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84025399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229988
T. V. M. Rao, Yarramalle Srinivas
Content Based Image Retrievals has become the most abbreviated thrust area today. The article we propose is a methodology for identifying the images based on relevancy using Kullback-Leibler method together with Generalized Gamma mixture model. The experimentation is carried out on the medical dataset namely med.univ-rennes1.fr and the results derived are compared for accuracy in terms of better perception. The results showcase that the performance of the method is about 84% and it is also performing efficiently in case of huge datasets.
{"title":"A medical image identification system based on mixture models","authors":"T. V. M. Rao, Yarramalle Srinivas","doi":"10.1109/CCAA.2017.8229988","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229988","url":null,"abstract":"Content Based Image Retrievals has become the most abbreviated thrust area today. The article we propose is a methodology for identifying the images based on relevancy using Kullback-Leibler method together with Generalized Gamma mixture model. The experimentation is carried out on the medical dataset namely med.univ-rennes1.fr and the results derived are compared for accuracy in terms of better perception. The results showcase that the performance of the method is about 84% and it is also performing efficiently in case of huge datasets.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"10 1","pages":"1235-1239"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82218940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229996
A. Firos, Seema Khanum
This paper presents an approach for developing virtual computing layer which is used by the cloud terminals during the virtual infrastructure downloading. The virtual computing layer is cable of image creation, maintenance and downloading on behalf of the cloud terminals. Using such virtual computing layer will considerably reduce the load maintained between the virtual computing client and the server. It also schedules the image downloading in the cloud infrastructure based on software image windows. The Honey bee foraging algorithm performs the work in different phases while creation of virtual images. The forage bees will search for the suitable image portion in the neighborhood and the scout bees will bring the found portion from the location indicated by the forage bees.
{"title":"Efficient distribution of virtual machines using Honey bee windowing in cloud computing","authors":"A. Firos, Seema Khanum","doi":"10.1109/CCAA.2017.8229996","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229996","url":null,"abstract":"This paper presents an approach for developing virtual computing layer which is used by the cloud terminals during the virtual infrastructure downloading. The virtual computing layer is cable of image creation, maintenance and downloading on behalf of the cloud terminals. Using such virtual computing layer will considerably reduce the load maintained between the virtual computing client and the server. It also schedules the image downloading in the cloud infrastructure based on software image windows. The Honey bee foraging algorithm performs the work in different phases while creation of virtual images. The forage bees will search for the suitable image portion in the neighborhood and the scout bees will bring the found portion from the location indicated by the forage bees.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"19 1","pages":"1292-1295"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84378614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore the latest developments in Facial Expression Recognition domain. Our work identified the different models that are being utilized for feature extraction, the methods used for feature selection process and the classifiers employed for the purpose of expression classification. We gathered all the data like the methods used in different publications and their main contribution in this field and assembled the information in a tabulated form. We also tried to find out what could be the upcoming developments in Facial Expression Recognition Systems as future scope.
{"title":"Recent advancements in facial expression recognition systems: A survey","authors":"Uzair Asad, Nirbhay Kashyap, Shailendra Narayan Singh","doi":"10.1109/CCAA.2017.8229981","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229981","url":null,"abstract":"A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore the latest developments in Facial Expression Recognition domain. Our work identified the different models that are being utilized for feature extraction, the methods used for feature selection process and the classifiers employed for the purpose of expression classification. We gathered all the data like the methods used in different publications and their main contribution in this field and assembled the information in a tabulated form. We also tried to find out what could be the upcoming developments in Facial Expression Recognition Systems as future scope.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"2 3 1","pages":"1203-1208"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89944557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8230014
N. Sharma, Zeenat Shareef, S. Reddy
Many wearable devices have been developed with different technologies to track the fitness of human body. Smart watches, wrist bands, smart phones have been designed to support such applications. But many of them are unaffordable because of very high cost and high power consumption. This paper deals with the design and development of a smart wearable device called “Fit-Wit” as this device will witness the fitness of an individual. This device informs the user about their body temperature, heart-rate and motion. The device is based on Intel Genuino 101 development platform as it is specifically designed for wearable healthcare technology due to its small size and lower power dissipation. Effort is being taken to make this device simple, small size, portable and easy to use. Further, an analysis is conducted which ensures consistency and accuracy of the device.
{"title":"Fit-Wit: Design and development of wearable healthcare device based on Intel Curie platform","authors":"N. Sharma, Zeenat Shareef, S. Reddy","doi":"10.1109/CCAA.2017.8230014","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230014","url":null,"abstract":"Many wearable devices have been developed with different technologies to track the fitness of human body. Smart watches, wrist bands, smart phones have been designed to support such applications. But many of them are unaffordable because of very high cost and high power consumption. This paper deals with the design and development of a smart wearable device called “Fit-Wit” as this device will witness the fitness of an individual. This device informs the user about their body temperature, heart-rate and motion. The device is based on Intel Genuino 101 development platform as it is specifically designed for wearable healthcare technology due to its small size and lower power dissipation. Effort is being taken to make this device simple, small size, portable and easy to use. Further, an analysis is conducted which ensures consistency and accuracy of the device.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"13 1","pages":"1271-1276"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90179427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229854
Pankaj Kumar, Vishnu Sharma
Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.
{"title":"A comment on efficient certificateless aggregate signature scheme","authors":"Pankaj Kumar, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229854","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229854","url":null,"abstract":"Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"20 1","pages":"515-519"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90455015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.1109/CCAA.2017.8229866
A. Saxena, S. Sinha, P. Shukla
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.
{"title":"General study of intrusion detection system and survey of agent based intrusion detection system","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/CCAA.2017.8229866","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229866","url":null,"abstract":"In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"59 1","pages":"471-421"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90461057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}