{"title":"A survey on personal identification of left and right palmprint images","authors":"B. Sam, Devina, Shalini, S. Sterlin","doi":"10.1109/ICICES.2017.8070738","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070738","url":null,"abstract":"Biometrics is the art of setting up the character of an individual in view of the physical, concoction or behavioral properties of the individual. Palm Print recognizable proof is an imperative individual ID innovation and it has pulled in much consideration. The palm print contains standard bends and wrinkles as well as rich surface and miniscule focuses, so the palm print ID can accomplish a high exactness. In this paper, we provide an overview of biometric and multibiometric, review of work is based on palm print technology, mulltibiometric technology and Similarity between the Left and Right palm prints and also discussed about biometric system concepts.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on medical image denoising using optimisation technique and classification","authors":"D. Priya, B. Sam, S. Lavanya, A. Sajin","doi":"10.1109/ICICES.2017.8070729","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070729","url":null,"abstract":"In the field of medical science and technology, Image is often subjected to various types of noise distortion during the process of collection, acquisition, and transmission. The images plays an vital role in examining the patients trouble. While examining, the image comprises of more noises. These noises are the major factor affecting the quality of the image which has greatly impeded people from extracting the useful information from the image. In order to overcome this kind of obstacle we apply image denoising. The main intension of image denoising is to restore the original image without noise from the noising image and also the same time to maintain the detailed information of the image as much as possible. In this paper, we provide the combination of cuckoo search algorithm and artificial neural network where the noise in the image can be filtered and removed effectively using adaptive non-linear Zernike filter. The simulation result shows that the algorithm proposed in this paper can maintain the edges of the images and other important features while removing the noise, so as to obtain better denoising affect. The quality of the resultant image is being measured by using Peak Signal to Noise Ratio (PSNR) and Root Mean Square Error (RMSE).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127284270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective spectrum resource sharing with dynamic handoff process in cognitive radio networks","authors":"N. Suganthi, S. Meenakshi","doi":"10.1109/ICICES.2017.8070732","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070732","url":null,"abstract":"With rapid development in wireless applications, there arises a demand for available spectrum. Cognitive radio technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Since unlicensed users are temporary visitors to the licensed spectrum, they are required to vacate the spectrum when a licensed user reclaims it. Due to the randomness of the appearance of licensed users, disruptions to both licensed and unlicensed communications are often difficult to prevent, which may lead to low throughput of both licensed and unlicensed communications. This paper avoids the congestion and reduces the waiting time of the secondary user by implementing Channel Allocation Algorithm for Primary and Secondary Users separately in Cognitive Radio Networks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using wide area monitoring WSN","authors":"Sonar Padwal, Ashwini Holkar, Shubhangi Khote, Prajakta Maral, Vidya Kadam","doi":"10.1109/ICICES.2017.8070736","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070736","url":null,"abstract":"The advent of ultra technological devices in our day to day lives has made us smart and efficient. Such a transformation is required for any developing city for efficient management of citywide activities and Become a smart city. By the use of wireless sensor nodes, various types of data can be collected like weather conditions, sound and air quality and data of high priority structures. Such data would also be useful monitoring and surveillance. We propose a sample integrated system that can be used as per requirement for monitoring of weather conditions like temperature, humidity and rain and air quality for detection of hazardous gasses. Also, to prevent accidents or structural disasters of flyovers and bridges, we include a load cell to present continuous monitoring of these structures. The city administration can benefit from this data for all important planning and decision making and users would use it for managing their day-wide activities.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent gateway for real time train tracking and railway crossing including emergency path using D2D communication","authors":"G. H. Kumar, G. Ramesh","doi":"10.1109/ICICES.2017.8070779","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070779","url":null,"abstract":"Human development is directly related to the transport facility. India has been starting its transport through railways since 19th century. The Indian railway system is very big and very complicated. When generation moves forward, the technology and complexity are also moves to its higher levels. Now days, there is no exact communication between Indian railways and passengers. When the passenger wants to know the exact position of the train he may not get it because we didn't have any tracking equipment. When the train leaves the station then the station master immediately gives the information to the Gate man and next station. The gate man doesn't know any details regarding the exact position. If the train gets any internal or external issues then it creates a traffic issue at gate. In this project we will solve the traffic issue and provides the exact position of the train by using GPS. The communication between the train and passenger made through SMS. The second objective of this project is to provide an automatic spike control at a level crossing replacing the gates operated by the gatekeeper. It deals with two things. Firstly, it deals with the reduction of time for which the gate is being kept closed. Secondly, to reduce the traffic at the crossing and also provides emergency path for ambulance.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey paper on big data analytics","authors":"M. Praveena, Dr. B. Bharathi","doi":"10.1109/ICICES.2017.8070723","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070723","url":null,"abstract":"In recent years, the internet application and communication have seen a lot of development and reputation in the field of Information Technology. These internet applications and communication are continually generating the large size, different variety and with some genuine difficult multifaceted structure data called big data. As a consequence, we are now in the era of massive automatic data collection, systematically obtaining many measurements, not knowing which one will be relevant to the phenomenon of interest. For example, E-commerce transactions include activities such as online buying, selling or investing. Thus they generate the data which are high in dimensional and complex in structure. The traditional data storage techniques are not adequate to store and analyses those huge volume of data. Many researchers are doing their research in dimensionality reduction of the big data for effective and better analytics report and data visualization. Hence, the aim of the survey paper is to provide the overview of the big data analytics, issues, challenges and various technologies related with Big Data.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133949712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai
{"title":"Stealthy DDoS detecting mechanism for cloud resilience system","authors":"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai","doi":"10.1109/ICICES.2017.8070740","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070740","url":null,"abstract":"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent digital system for visually impaired person (vip's)","authors":"M. Preetha, K. Elavarasi, K. Ramyadevi","doi":"10.1109/ICICES.2017.8070769","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070769","url":null,"abstract":"This paper bring the decision about the problem facing by the visual impaired person. Here, We designed the device to system for the visually impaired person to handle problem in the environment. They face difficulties in independent accessing public transport since they cannot read the route number and unsure about the physical location of the bus, identifying the person, and also they find difficulty in crossing the road. We focus on presenting the main advantages and limitations of each technique in effort to inform the scientific community about the progress in the area of system and also offer users a review about the capabilities of each system.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graphical passwords implies on tolerance password, image choice, and puzzle login security","authors":"L. Gunaseeli, R. Canessane","doi":"10.1109/ICICES.2017.8070758","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070758","url":null,"abstract":"In this proposed scheme, we presenting a new-fangled security primordial using on firm AI harms click spell, It may nothing only tries equal to progress together and make it to defence as well as using of puzzle. The aims it may to develop the security of puzzle IMAGE. Click spell, Stab to do these different goals like security-Puzzle Login using bubble sort; This may use-to develops the login of passing the test values; to afford a dictionary function for abusers to learn with reference to the importance and the spelling of alphabet words. In the addition, the user & password can be placed on the top of Image Selection. Security-Image puzzles solving using AES algorithm and OTP Generation. Security primordial is based on firm AI harms. A fundamental user & password security is to create Image Selection. Using Image Captcha and verification using Bitmap pattern, verification using images as convert into Binary.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of multi-port converter under various modulation indices","authors":"C. Kishore, G. Ramesh","doi":"10.1109/ICICES.2017.8070781","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070781","url":null,"abstract":"Multi Port Converter with PV and the Wind Energy Conversion System presented. The proposed work consists of the operation of the proposed converter system under low wind power generation by which the excess of energy extracted from PV System. It can be achieved by changing the modulation indices of the Control Switch Sw1, while the complexity of the entire system is reduced. The Proposed system with varying modulation indices can improve the operating capability of the multi-port converter system, which can be utilised for balancing the Loads where High Voltage is required with low wind speeds. The improvements in the output voltage, power and Peak Diode Current across the Diode are validated using MATLAB/Simulink Software.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}