2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

筛选
英文 中文
Low Power Emg Front-End For Face Paralysis 用于面瘫的低功率肌电信号前端
Aanchal Jha, Ganesh Lakshamana Kumar M
{"title":"Low Power Emg Front-End For Face Paralysis","authors":"Aanchal Jha, Ganesh Lakshamana Kumar M","doi":"10.1109/ICAECC.2018.8479503","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479503","url":null,"abstract":"Facial paralysis patients have a high risk of loosing the vision of eye, so Functional Electrical Simulation(FES) has the potential to solve this problem but people are looking for the low power to minimize the pain and the low power EMG Extraction device is designed here using an inverter. Inverter based OTA is designed to achieve low power with low voltage supply. This EMG Extractor is designed with UMC 180nm technology consuming 1.5μW with supply of 1V.For designing EMG EXTRACTOR preamplifier is designed as it can bring the signal to the required voltage, then Band pass filter is used as we require strong filtration. Programmable gain amplifier is also used as it provides differential gain and to maintain one level of signal such that ADC can detect the variation. The amplifier circuit unity gain bandwidth is 2.51189 MHz, gain is 63.427 dB, input referred noise of the circuit @ 270 Hz is 91.5858 nV/sqrt(Hz) and @ 470 Hz is 76.8615 nV/sqrt(Hz). The power supply rejection ratio of the circuit is 80 dB. Programmable Gain is achieved from 0 dB to 23 dB @ 47 Hz to 78 Hz. Here all the circuits are operating at a frequency range of 270 Hz to 470 Hz. Area of the amplifier 61.99μW × 79.78 μW, preamplifier and programmable gain amplifier area is 262.73μW × 423.77μW.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On sparse Audio Data Watermarking by Exploiting Haar Transform Structure 利用Haar变换结构的稀疏音频数据水印
Electa Alice Jayarani. A, M. R. Bhatt, G. D
{"title":"On sparse Audio Data Watermarking by Exploiting Haar Transform Structure","authors":"Electa Alice Jayarani. A, M. R. Bhatt, G. D","doi":"10.1109/ICAECC.2018.8479528","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479528","url":null,"abstract":"In the past decade the world has seen a monumental growth in technology. At the same time the technology has lead the human kind to a threat as always there is an exploit of the invention. The current trend is posting all multimedia files on internet instantly without any security. This has lead to tremendous problem to the owners of multimedia file. Thus prevention of multimedia file has given higher priority in recent years. In this paper on sparse audio data watermarking by exploiting Haar transform structure is discussed. Experimental results are provided to analysis the proposed algorithm without degrading the quality of the audio.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPMS: A Scientific Decision Framework forbSmartphone Manufacturer Selection using Linguistic Preferences SPMS:使用语言偏好进行智能手机制造商选择的科学决策框架
R. Krishankumar, K. S. Ravichandran, J. Premaladha, M. I. Ahmed
{"title":"SPMS: A Scientific Decision Framework forbSmartphone Manufacturer Selection using Linguistic Preferences","authors":"R. Krishankumar, K. S. Ravichandran, J. Premaladha, M. I. Ahmed","doi":"10.1109/ICAECC.2018.8479520","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479520","url":null,"abstract":"The usage of smart phones by Indian students is tremendously growing at faster pace. To cope with the high-end demand, mobile manufacturers have to make rational decisions regarding the market expansion and quality improvement. To critical decision, in this paper, a new scientific decision framework called SPMS is (smart phone manufacturer selector) presented. The SPMS consist of three stages viz., data acquisition and pre-processing stage, data fusion and criteria weighting stage and selection/ranking stage. The data is collected from questionnaires which are completed by students of colleges in and around Thanjavur district. The missing information in the dataset are completed using bin by mean method, followed by feature set reduction is done using Gini index method. In the second stage, linguistic information are aggregated using frequency match aggregation (FMA) operator with unconstrained weight values. Further, criteria weights are determined using standard variance (SV) method under linguistic context. Finally, ranking of smart phone manufacturers is done using VIKOR method under linguistic context. The practicality and usefulness of the proposed framework is demonstrated using a case study for smart phone selection. The strength and weakness of the proposal is also realized by comparison with other state-of-art frameworks.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel LCP substrate dual band antenna loaded with T-shaped resonator and Circular slot 一种新型的带t型谐振腔和圆形槽的LCP基板双频天线
Imran Khan, G. D, S. R., T. Ali, R. Biradar
{"title":"A Novel LCP substrate dual band antenna loaded with T-shaped resonator and Circular slot","authors":"Imran Khan, G. D, S. R., T. Ali, R. Biradar","doi":"10.1109/ICAECC.2018.8479428","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479428","url":null,"abstract":"A novel Liquid Crystal Polymer (LCP) substrate based dual band antenna for C-band and satellite applications is proposed. The novel LCP substrate is made by suitable proportionate concentration of Liquid Crystal and a Polymer. The antenna designed by this substrate shows the resonance at 4.45 & 6.9GHz with $S_{11} < -10$dB bandwidth of about 6.02% (4.31-4.584GHz) and 2.89% (6.83–7.03GHz) respectively. The proposed design has a compact size of $0.59lambda_{l}times0.59lambda_{l}times 0.01lambda_{l}$ at a lowest resonant frequency of 4.45GHz. The proposed antenna exhibits good impedance matching and overall radiation characteristics.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130918232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two Layer Cloud Security Set Architecture On Hypervisor Hypervisor上的两层云安全集架构
Nivedha Sathyanarayanan, M. Nanda
{"title":"Two Layer Cloud Security Set Architecture On Hypervisor","authors":"Nivedha Sathyanarayanan, M. Nanda","doi":"10.1109/ICAECC.2018.8479440","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479440","url":null,"abstract":"In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart-Cart for Smart-Cities 智慧城市的智慧车
P. G, Sushruth B Bangre, K. M, V. M, Anupama R
{"title":"Smart-Cart for Smart-Cities","authors":"P. G, Sushruth B Bangre, K. M, V. M, Anupama R","doi":"10.1109/ICAECC.2018.8479485","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479485","url":null,"abstract":"In the current scenario, smart devices and smart technology are gaining high momentum for Automatic Identification and Data Capture(AIDC). Radio Frequency Identification and Detection(RFID) are one of the promising solutions for AIDC. Here, we present a smart solution for automatic billing enabled by RFID. We have proposed new methodology to simplify the billing process and reduce the time spent in searching products in the supermarket. Every product and customers details is uniquely identified by the RFID. An Authenticated customer can choose the products from the list displayed on the user interface. Then the smart cart automatically routes itself to the location of the product. Every purchased products price and weight is to be read by the RFID reader on the Smart-Cart through RFID tag on the product. Concurrent billing and calculation is done by the website developed. When the shopping is completed, the amount gets debited from the customers prepaid account.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Relay Assisted Cooperative Communication for Wireless Sensor Networks 无线传感器网络中继辅助协同通信
M. Aishwarya, S. Kirthiga
{"title":"Relay Assisted Cooperative Communication for Wireless Sensor Networks","authors":"M. Aishwarya, S. Kirthiga","doi":"10.1109/ICAECC.2018.8479524","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479524","url":null,"abstract":"In this proposed work, Cooperative Communica-tion in Wireless Sensor Networks is analyzed.The Cooperative Communication helps in reliable information transfer consuming minimum energy and ensuring reduced error performance. Energy Efficiency and error performance are critical in the design of cooperation in a Wireless Sensor Network System as they decide node lifespan. In this paper, a $100times 100$ sq m farm area is considered for isolating crop disease. The information required for the crop disease is transferred to the remote destination in three ways Direct path, Singlehop and Multihop depending on the Channel State Information and Farm area.One of the above configuration is chosen based on the Bit error rate and energy efficiency. It is found that the Multihop has better energy efficiency compared to Singlehop and Directpath.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Code obfuscating a Kotlin-based App with Proguard 用Proguard混淆基于kotlin的应用程序的代码
Y. Shah, Jimil Shah, Krishna B. Kansara
{"title":"Code obfuscating a Kotlin-based App with Proguard","authors":"Y. Shah, Jimil Shah, Krishna B. Kansara","doi":"10.1109/ICAECC.2018.8479507","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479507","url":null,"abstract":"The convenience of using Android-based smartphones has made Android immensely popular. Until now, Java dominated other Android App Development languages such as C# and Corona, while Kotlin seems to be the future of Android App Development. Though Kotlin provides additional perks to Android app developers, some loopholes still exist that provide a way for security threats to penetrate. One of the most common security threats is App Repackaging. It is a dangerous and malicious attack which exploits the open-source platform. App Repackaging can be minimized by Proguard, a multi-purpose code obfuscator. In this paper, we have implemented prevention against App Repackaging using Proguard with Kotlin-developed Android app. It aims to assist android app developers in securing their apps against App Repackaging attacks.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contextual Care Protocol using Neural Networks and Decision Trees 基于神经网络和决策树的情境关怀协议
Yash Sinha, Pranshu Malviya, Minerva Panda, Syed Mohd Ali
{"title":"Contextual Care Protocol using Neural Networks and Decision Trees","authors":"Yash Sinha, Pranshu Malviya, Minerva Panda, Syed Mohd Ali","doi":"10.1109/ICAECC.2018.8479433","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479433","url":null,"abstract":"A contextual care protocol is used by a medical practitioner for patient healthcare, given the context or situation that the specified patient is in. This paper proposes a method to build an automated self-adapting protocol which can help make relevant, early decisions for effective healthcare delivery. The hybrid model leverages neural networks and decision trees. The neural network estimates the chances of each disease and each tree in the decision trees represents care protocol for a disease. These trees are subject to change in case of aberrations found by the diagnosticians. These corrections or prediction errors are clustered into similar groups for scalability and review by the experts. The corrections as suggested by the experts are incorporated into the model.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Reconstruction of Hyperspectral Image using Bregman Iterations 基于Bregman迭代的高光谱图像稀疏重建
K. Gunasheela, H. S. Prasantha
{"title":"Sparse Reconstruction of Hyperspectral Image using Bregman Iterations","authors":"K. Gunasheela, H. S. Prasantha","doi":"10.1109/ICAECC.2018.8479473","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479473","url":null,"abstract":"Hyperspectral image processing plays an important role in satellite communication. Hyperspectral Image (HSI) processing generally requires very high ‘computational resources’ in terms of computational time and storage due to extremely large volumes of data collected by imaging spectrometers on-board the satellite. The bandwidth available to transmit the image data from satellite to the ground station is limited. As a result, Hyperspectral image compression is an active research area in the research community in past few years. The research work in the paper proposes a new scheme, Sparsification of HSI and reconstruction (SHSIR) for the reconstruction of hyperspectral image data acquired in Compressive sensing (CS) fashion. Compressed measurements similar to compressive sensing acquisition are generated using measurement matrices containing gaussian i.i. d entries. Now the reconstruction is solving the constrained optimization problem with non smooth terms. Adaptive Bregman iterations method of multipliers is used to convert the difficult optimization problem into a simple cyclic sequence problem. Experimental results from research work indicates that the proposed method performs better than the other existing techniques.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"14 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信