Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942583
Mayuri D. Jundhare, A. Kulkarni
This paper provides an overview and current status on the newly developed and quickly changing field of femtocells in 5G. There are lots of development from 1G, 2G, 3G, and 4G to 5G in the world of wireless communications. Recently, 4G has been launched to address current inadequacies of the mobile technology. To take the noteworthy steps forward, the succeeding phase of development is commencing soon which is named as 5G. The self-organisation, mobility management, Interference mitigation, handoffs and security are real challenges in femtocells. Also, the call dropping and poor quality occurs in homes and offices. The solution on these problems is also discussed in this paper.
{"title":"An overview and current development of femtocells in 5G technology","authors":"Mayuri D. Jundhare, A. Kulkarni","doi":"10.1109/ICAECCT.2016.7942583","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942583","url":null,"abstract":"This paper provides an overview and current status on the newly developed and quickly changing field of femtocells in 5G. There are lots of development from 1G, 2G, 3G, and 4G to 5G in the world of wireless communications. Recently, 4G has been launched to address current inadequacies of the mobile technology. To take the noteworthy steps forward, the succeeding phase of development is commencing soon which is named as 5G. The self-organisation, mobility management, Interference mitigation, handoffs and security are real challenges in femtocells. Also, the call dropping and poor quality occurs in homes and offices. The solution on these problems is also discussed in this paper.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"6 1","pages":"204-209"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85276388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942548
Chhagan Charan, R. Pandey
In this paper, a reliable spectrum sensing scheme based on sample covariance matrix of received signal at secondary user is proposed. The reliability in terms of sufficient protection to primary user (PU) from the interference caused by secondary user (SU). The energy based spectrum sensing method is highly vulnerable at noise uncertainty and covariance based method overcomes it. However, the performance of existing covariance based method degrades at low signal to noise ratio (SNR). The problem of performance degradation at low SNR is addressed by proposed reliable spectrum sensing scheme. The reliable spectrum sensing method overcomes the low SNR and noise uncertainty problem and outperform the existing spectrum sensing schemes. The simulation results show that the presented method performs better than existing spectrum sensing methods.
{"title":"A reliable spectrum sensing scheme using sample covariance matrix for cognitive radio","authors":"Chhagan Charan, R. Pandey","doi":"10.1109/ICAECCT.2016.7942548","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942548","url":null,"abstract":"In this paper, a reliable spectrum sensing scheme based on sample covariance matrix of received signal at secondary user is proposed. The reliability in terms of sufficient protection to primary user (PU) from the interference caused by secondary user (SU). The energy based spectrum sensing method is highly vulnerable at noise uncertainty and covariance based method overcomes it. However, the performance of existing covariance based method degrades at low signal to noise ratio (SNR). The problem of performance degradation at low SNR is addressed by proposed reliable spectrum sensing scheme. The reliable spectrum sensing method overcomes the low SNR and noise uncertainty problem and outperform the existing spectrum sensing schemes. The simulation results show that the presented method performs better than existing spectrum sensing methods.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"17-20"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89984123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942550
Tushar Rajendra Baviskar, B. Jadhav
The exactness of change detection on surface of earth is vital for comprehension the connections and associations amongst human and normal properties. Remote Sensing and Geographic Information Systems (GIS) can possibly give precise data in regards to land use and Land cover changes. Now days the population of urban area is increasing drastically, to manage the resource of urban areas, automate change detection method using satellite images is estimate. In this system we propose the change detection of urban areas using supervised and unsupervised technique and compare their performance with other state of the art technique. Change vector analysis is convoluted to actualize, however it is important to to demonstrating course and extent of progress. Nowadays, ANN, K mean and Isodata algorithm are used. Zonal change and image differencing have been rarely utilised in change detection. Similarly urban mapping is also possible in change detection and also new research area for change detection. Using remote sensing, we analyze all necessary changes of urban areas and compare with other techniques and validate the result.
{"title":"Change detection of urban area using remote sensing","authors":"Tushar Rajendra Baviskar, B. Jadhav","doi":"10.1109/ICAECCT.2016.7942550","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942550","url":null,"abstract":"The exactness of change detection on surface of earth is vital for comprehension the connections and associations amongst human and normal properties. Remote Sensing and Geographic Information Systems (GIS) can possibly give precise data in regards to land use and Land cover changes. Now days the population of urban area is increasing drastically, to manage the resource of urban areas, automate change detection method using satellite images is estimate. In this system we propose the change detection of urban areas using supervised and unsupervised technique and compare their performance with other state of the art technique. Change vector analysis is convoluted to actualize, however it is important to to demonstrating course and extent of progress. Nowadays, ANN, K mean and Isodata algorithm are used. Zonal change and image differencing have been rarely utilised in change detection. Similarly urban mapping is also possible in change detection and also new research area for change detection. Using remote sensing, we analyze all necessary changes of urban areas and compare with other techniques and validate the result.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"70 1","pages":"28-32"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80371135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text to Scene conversion system automatically converts the given natural language text in to its visual representation such as readymade image, composite scene or animation. Natural language is a language in which we, humans interact with each other. We have built a system which converts the natural language text into the composite scene. It basically converts the sentences with spatial relationships into virtual scene. It involves the natural language processing and 3D computer graphics techniques. System consists of two main modules: text processing module and graphics module. Text processing module plays an important role. It processes the text given by user and finds the objects to create the scene. Graphics module takes this information as input and generates scene by placing those objects in relative position. As students can understand the concepts easily with the visualization, we have proposed a system of text to scene conversion to visualize maths problems, which can be useful to understand the problem statement and solve it. Application of this system in education domain can be useful in developing efficient methodology.
{"title":"Text to Scene conversion for smart learning","authors":"Rehana Delair, Hiral Sojitra, Krupa Patel, Krupa Bhatt, Kinjal N. Gharia, Rutal Mahajan","doi":"10.1109/ICAECCT.2016.7942559","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942559","url":null,"abstract":"Text to Scene conversion system automatically converts the given natural language text in to its visual representation such as readymade image, composite scene or animation. Natural language is a language in which we, humans interact with each other. We have built a system which converts the natural language text into the composite scene. It basically converts the sentences with spatial relationships into virtual scene. It involves the natural language processing and 3D computer graphics techniques. System consists of two main modules: text processing module and graphics module. Text processing module plays an important role. It processes the text given by user and finds the objects to create the scene. Graphics module takes this information as input and generates scene by placing those objects in relative position. As students can understand the concepts easily with the visualization, we have proposed a system of text to scene conversion to visualize maths problems, which can be useful to understand the problem statement and solve it. Application of this system in education domain can be useful in developing efficient methodology.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"84 1","pages":"76-81"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80865197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942596
P. Pol, Amrit Priyadarshi
In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by public key encryption. The valid user can access their information using their private key and the global secret key information which is regulate during or after authentication process. System does not bother if secrete key either hack, the intruder cannot access the data while it can be decrypted only by using a private key. Here is no importance to send associate key and its file. All data will be encrypted by the global Secret Key. So data will be protected at a cloud place. Consumers who need file or information will access the data using their private key so file and its key not required.
{"title":"Secured Cloud data sharing using auditable Aggregate key","authors":"P. Pol, Amrit Priyadarshi","doi":"10.1109/ICAECCT.2016.7942596","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942596","url":null,"abstract":"In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by public key encryption. The valid user can access their information using their private key and the global secret key information which is regulate during or after authentication process. System does not bother if secrete key either hack, the intruder cannot access the data while it can be decrypted only by using a private key. Here is no importance to send associate key and its file. All data will be encrypted by the global Secret Key. So data will be protected at a cloud place. Consumers who need file or information will access the data using their private key so file and its key not required.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"66 1","pages":"267-272"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80225048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942575
C. Choubey, A. Sahani, S. K. Paul
This paper presents the design of a dynamic threshold voltage MOS transistor (DTMOS) based ultra-low power comb filter to eliminate the power line interference from biomedical signals like ECG and EEG signals. The approach used to design the comb filter successfully demonstrates the application of low power second generation current conveyor (CCII) whose power consumption is as low as 0.214µW. In this approach, a number of inverted band pass filters (IBPFs) of various center frequencies and quality factors have been used. All Inverted Band Pass Filters have been designed using low power CCII and passive components (resistors and capacitors). The DTMOS technique used makes the comb circuit capable of working under a low supply voltage with total power consumption of 7.54µW only. The functionality and effectiveness of the presented design is investigated through PSPICE simulations.
{"title":"Ultra-low power comb filter","authors":"C. Choubey, A. Sahani, S. K. Paul","doi":"10.1109/ICAECCT.2016.7942575","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942575","url":null,"abstract":"This paper presents the design of a dynamic threshold voltage MOS transistor (DTMOS) based ultra-low power comb filter to eliminate the power line interference from biomedical signals like ECG and EEG signals. The approach used to design the comb filter successfully demonstrates the application of low power second generation current conveyor (CCII) whose power consumption is as low as 0.214µW. In this approach, a number of inverted band pass filters (IBPFs) of various center frequencies and quality factors have been used. All Inverted Band Pass Filters have been designed using low power CCII and passive components (resistors and capacitors). The DTMOS technique used makes the comb circuit capable of working under a low supply voltage with total power consumption of 7.54µW only. The functionality and effectiveness of the presented design is investigated through PSPICE simulations.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"139 1","pages":"164-166"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77820180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942576
Y. Angal, Anita Gade
There is significant interest in industry, library and warehouse automation, which frequently involves pick-and-place tasks for products located in shelving units. This system identifies the object, picks that object from source location and places at desired location. The objective of this paper is to control robotic arm using NI myRIO. In industry we need labour for handling and movement of objects. To defeat this problem we suggest robotic arm with degrees of freedom. To implement above mentioned tasks we have used National Instruments myRIO model which has wide variety of sensors, actuators, and displays. The myRIO is control unit of this system. A robot is virtual agent, usually an electromechanical device that is guided by LabVIEW programming. This system has tested for library management application.
{"title":"LabVIEW controlled robot for object handling using NI myRIO","authors":"Y. Angal, Anita Gade","doi":"10.1109/ICAECCT.2016.7942576","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942576","url":null,"abstract":"There is significant interest in industry, library and warehouse automation, which frequently involves pick-and-place tasks for products located in shelving units. This system identifies the object, picks that object from source location and places at desired location. The objective of this paper is to control robotic arm using NI myRIO. In industry we need labour for handling and movement of objects. To defeat this problem we suggest robotic arm with degrees of freedom. To implement above mentioned tasks we have used National Instruments myRIO model which has wide variety of sensors, actuators, and displays. The myRIO is control unit of this system. A robot is virtual agent, usually an electromechanical device that is guided by LabVIEW programming. This system has tested for library management application.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"19 17-19 1","pages":"167-171"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78146352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942558
D. B. Kshirsagar, U. Kulkarni
A generalized Neuro-Fuzzy Content Based Image Retrieval (CBIR) system is proposed. The system is trained using General Reflex Fuzzy Min-Max Neural Network (GRFMN) where it can take any number and type of different input features. The existing architecture is simplified and the system is trained in pure clustering mode for colour and texture features. The concept of class labels assigned for each hyperbox after unsupervised training adds the flexibility and robustness. By controlling user defined parameters, the system can categorize images as per the users need. With modifications in bucket size and connecting components better coherency is added to understand the colour contents of the image. Further with selected texture element patterns derived from Texture Unit Spectrum (TUS), better feature vector is obtained for training the GRFMN. With this improved feature extraction combining heterogeneous features, the proposed CBIR system gives an efficient automated retrieval of similar images.
{"title":"A generalized Neuro-Fuzzy Based Image Retrieval system with modified colour coherence vector and Texture element patterns","authors":"D. B. Kshirsagar, U. Kulkarni","doi":"10.1109/ICAECCT.2016.7942558","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942558","url":null,"abstract":"A generalized Neuro-Fuzzy Content Based Image Retrieval (CBIR) system is proposed. The system is trained using General Reflex Fuzzy Min-Max Neural Network (GRFMN) where it can take any number and type of different input features. The existing architecture is simplified and the system is trained in pure clustering mode for colour and texture features. The concept of class labels assigned for each hyperbox after unsupervised training adds the flexibility and robustness. By controlling user defined parameters, the system can categorize images as per the users need. With modifications in bucket size and connecting components better coherency is added to understand the colour contents of the image. Further with selected texture element patterns derived from Texture Unit Spectrum (TUS), better feature vector is obtained for training the GRFMN. With this improved feature extraction combining heterogeneous features, the proposed CBIR system gives an efficient automated retrieval of similar images.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"19 1","pages":"68-75"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77594917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942617
M. B. Siddiqui, S. N. Ahmad, M. Beg
Reduced Ordered Binary Decision Diagram (also called ROBDD or simply BDD) are graphical representation of Boolean functions, which can be easily manipulated using modern VLSI CAD tools. The order of input variables has a considerable effect on the size of the constructed BDD. Many algorithmic approaches have been proposed to find the optimal variable ordering. In this paper, a new modified genetic algorithm based method for variable ordering is proposed which use different modified crossover and modified mutation operators. The results have shown that the proposed method yields a good improvement in the size of the BDD constructed for many digital benchmark circuits.
{"title":"Modified GA method for variable ordering in BDD for MIMO digital circuits","authors":"M. B. Siddiqui, S. N. Ahmad, M. Beg","doi":"10.1109/ICAECCT.2016.7942617","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942617","url":null,"abstract":"Reduced Ordered Binary Decision Diagram (also called ROBDD or simply BDD) are graphical representation of Boolean functions, which can be easily manipulated using modern VLSI CAD tools. The order of input variables has a considerable effect on the size of the constructed BDD. Many algorithmic approaches have been proposed to find the optimal variable ordering. In this paper, a new modified genetic algorithm based method for variable ordering is proposed which use different modified crossover and modified mutation operators. The results have shown that the proposed method yields a good improvement in the size of the BDD constructed for many digital benchmark circuits.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"23 1","pages":"378-382"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86514221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942620
Sudarshana A. Abbad, S. Godse
In the era computing, there is huge research is going in VANET since last few years. VANET is ad-hoc communication network which is formed by connecting vehicles. The navigation system needs to be more intelligent at the same time security should not be compromised. The comprehensive literature survey shows there is a need for intelligent and secure navigation system. There are lots issues need to address. This paper proposes a navigation system that efficiently works in real time scenario. In the proposed architecture some security aspects also considered like authentication, confidentiality and privacy of vehicle and driver. The performance of proposed system evaluated against QoS parameter. In proposed system find shortest path of vehicle depend on real road condition, therefore it display shortest path by skipping accidental road. It also provides priority to broadcast message.
{"title":"Priority based emergency message forwarding scheme for time critical models in VANET","authors":"Sudarshana A. Abbad, S. Godse","doi":"10.1109/ICAECCT.2016.7942620","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942620","url":null,"abstract":"In the era computing, there is huge research is going in VANET since last few years. VANET is ad-hoc communication network which is formed by connecting vehicles. The navigation system needs to be more intelligent at the same time security should not be compromised. The comprehensive literature survey shows there is a need for intelligent and secure navigation system. There are lots issues need to address. This paper proposes a navigation system that efficiently works in real time scenario. In the proposed architecture some security aspects also considered like authentication, confidentiality and privacy of vehicle and driver. The performance of proposed system evaluated against QoS parameter. In proposed system find shortest path of vehicle depend on real road condition, therefore it display shortest path by skipping accidental road. It also provides priority to broadcast message.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"8 1","pages":"393-398"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86532884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}