S. Mohanalakshmi, Smt. Swarna Ramesh, Shri K K Radhakrishnan, Shri G. Rajesh Kannan, Shri V. Sathyanarayanan
{"title":"Bit error rate measurements of fiber optic network through ethernet analysers","authors":"S. Mohanalakshmi, Smt. Swarna Ramesh, Shri K K Radhakrishnan, Shri G. Rajesh Kannan, Shri V. Sathyanarayanan","doi":"10.1109/ICICES.2017.8070775","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070775","url":null,"abstract":"This paper describes the end-to-end performance of single mode Fiber Optic Network (FON), implemented for Unmanned Surveillance System (USS) application for the detection and tracking of land and sea based moving targets. Optical fibers are widely in fiber optic communications which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. Bit Error Rate (BER) is the ultimate key index parameter in assessing the FON for transmission of digital data from one location to another location. In this paper, in addition to BER, throughput and RFC 2544 testing were also performed over the FON using dual port VeEX ethernet analyzers. Both the fiber and copper ports of ethernet analyzers were exercised for obtaining the performance metric parameters of FON. Apart from BER measurements using ethernet analyzers, Optical Time Domain Reflectometer (OTDR) has also been used for checking the optical signal loss over FON. The performance analysis of BER at different data rates and the factors affecting BER are also discussed in this paper.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validating product correctness of persistent itemset mining as a service prototype","authors":"B. Ahamed, P. Chandu","doi":"10.1109/ICICES.2017.8070741","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070741","url":null,"abstract":"Cloud computing proposes a policy to user where the data to be retrieved can be swapped between the user and the server. The information being given to a third party server comprises confidencial threats as users with fragile computational power cannot validate the correctness of the data that are grouped. This paper, aims at the broken itemsets, in which the server is not reliable and outbursts the verification repetition by testing its current capability of the installed content. It involves various approaches that can be used to expand the risk organisation. The probabilistic access authenticates veracity of the information that is mined. The deterministic access authenticates certainty of the information collected and deposited. The main aim of this project is to certify the accuracy of the outsourced frequent item set mining as a prototype of service. The data of a particular item is warehoused in local mining and third party mining. This correctness of the data is substantiated by equating the outcome of the local mining and the third party mining. If the data is not same, then it is considered that the data is altered. To overcome this problem, the forms that are being sent to third party for obtaining the results, should be different. This will make sure that the third party results are not manipulated.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of various authentication schemes for passwords using images to enhance network security through online services","authors":"P. Sahaya Suganya Princes, J. Andrews","doi":"10.1109/ICICES.2017.8070717","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070717","url":null,"abstract":"In this paper, we survey different authentication schemes for graphical passwords utilized in online services. Click-based graphical password scheme is used to garner click-points or pixel-points from users and to portend the hotspots. CAPTCHA scheme gives protection against spyware attacks. In the case of Face DCAPTCHA scheme, the users must recognize visually-distorted human faces from complex images in an accurate manner. A Password Guessing Resistant Protocol (PGRP) can limit large number of login attempts from unknown remote hosts to resist large-scale online password guessing attacks. An Image Recognition CAPTCHA (IRC) called Cortcha is designed to provide protection against machine learning attacks. In the Pass-Go scheme, the user has to select PassPoints on a grid to input the password. Creation of cryptographic primitives makes the graphical passwords invisible to attackers and hackers. A Hotspot or a PassPoint in an image can be generated as a Captcha as gRaphical Passwords (CaRP) image, which is our proposed work, for reducing security problems occurred by online password guessing attacks, relay attacks, dictionary attacks and shoulder-surfing attacks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water bodies identification from multispectral images using Gabor filter, FCM and canny edge detection methods","authors":"T. Vignesh, K. Thyagharajan","doi":"10.1109/ICICES.2017.8070767","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070767","url":null,"abstract":"Water bodies identification using multispectral images is a very useful application of image processing. This paper proposed a novel method for water bodies identification from multispectral images using Gabor filter, Fuzzy c-means and canny edge detection algorithm. Gabor filter is a combination of lowpass filter and bandpass filter. This two filters extracting the importance features from satellite images. From the extracted features fuzzy c-means algorithm clustered the various land use and land cover classes. Finally water bodies are identified from land use and land cover classes with the use of canny edge detection methods. The proposed approach was experimented with the use of Landsat-7, Landsat-8 satellite images. Our experimental results proved that proposed methods provides better result for water identification with high efficiency.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image based password authentication system for banks","authors":"S. Sukanya, M. Saravanan","doi":"10.1109/ICICES.2017.8070764","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070764","url":null,"abstract":"Nowadays, Banking is a essential of human life. Customer's informationis stored by the bank. This information is private and saving securely in the database. Customer can process transactions tasks both online and offline manner. Bank transactional activities the attacker easy to hack the details. In this situation we have to protect the bank account. At the point when user input their passwords in an open place, they might be at danger of attackers taking their secret word. A hacker can catch a secret word by direct perception or by recording the individual's transactions. This is type of a shoulder-surfing. To defeat this issue, we show a safe graphical confirmation framework named pass grid to oppose bear surfing assaults with a one — time legitimate login marker and circulative even and vertical bars covering the whole extent of pass-pictures.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy-based cluster head election mechanisms for wireless sensor networks: A review","authors":"S. Ramakrishnan, S. Shyry","doi":"10.1109/ICICES.2017.8070714","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070714","url":null,"abstract":"Cluster head election is considered as the significant entity necessary for prolonging the lifetime of the Wireless Sensor Networks (WSNs). A variety of cluster head election techniques are contributed by a number of researchers to the literature for optimal and effective cluster head election. The cluster head election mechanisms are categorized into random, probabilistic, game theory-based and fuzzy-based schemes. Fuzzy –logic based cluster election techniques are found to be predominant than the exiting approaches as they facilitate the option of electing and optimizing the cluster heads at each round of data transmission. The incorporation of fuzzy inference engine that elucidates potential input parameters like interdistance between cluster heads, interdistance between cluster members, residual energy threshold and drain rate of sensor nodes make it highly suitable in framing if-then rules. The performance improvements enabled by the existing fuzzy logic inspired cluster head election schemes are also portrayed. Finally, the pros and cons of the reviewed Fuzzy based cluster head lection schemes are presented with the specific highlight on the performance metrics used for proving its superiority.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultrasonic water level indicator and controller using AVR microcontroller","authors":"Cjestop Jeswin, B. Marimuthu, K. Chithra","doi":"10.1109/ICICES.2017.8070773","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070773","url":null,"abstract":"The consequence of level measurement cannot be overstated. Inaccurate or inappropriate measurements can cause levels in vessels to be excessively higher or lower than their measured values. Ultrasonic level measurement is one of the best technique used for continuous level measurement. In this project we are using HC-SR04 to measure the level in the water tank and AVR Microcontroller to control it from overflow. Ultrasonic sensor module “HC-SR04” uses a technique called “ECHO” which is something you get when sound reflects back after striking with a surface. The output signal of the sensor is proportional to the distance based on the echo. This output signal is then processed according to the high level programming language which is embedded into the microcontroller ATmega 16. Then the processed output is displayed in the LCD display. The motor is connected to the output port of the microcontroller through 5V relay switch. Here it has some benefits to use microcontroller for control actions than using the normal PLCs. Even though PLC itself has a microprocessor since PLCs are expensive, bulky and are not easily adapted to high speed I/O. Also compared to other non-contact type of level measurement ultrasonic sensor produces no radiations and no harmful effects to the environment. The main objective of our project is to attain accurate measurement of level and to make a safety control over it.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129274801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disaster detection system using Arduino","authors":"S. Mehra, Tanmay","doi":"10.1109/ICICES.2017.8070777","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070777","url":null,"abstract":"The author aims to reduce the number of disasters drastically in order to come up with a safer and secure environment. This paper describes a system which detects the possible disasters that one can face in a household or work-space. It is an Arduino based Disaster Detection System that contains sensors for detecting the disasters. This system is new in the sense that it incorporates detection of more than one disaster with one device and still proves to be as cheap as possible. It is also unique in the sense that it automatically informs the emergency services when a disaster is detected.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monkey algorithm for robot path planning and vehicle routing problems","authors":"R. V. Devi, S. Sathya, N. Kumar","doi":"10.1109/ICICES.2017.8070743","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070743","url":null,"abstract":"Swarm intelligence algorithms usually mimic nature or behavior of living beings such as birds, animal or insects. Swarm intelligence algorithms generally provide the meta-heuristic for optimization problems based upon the group behaviors of living beings. The living beings when in group tend to exhibit extraordinary mechanisms which form the basis for the swarm intelligence algorithms. Swarm intelligence algorithms are used to solve the NP-hard and combinatorial optimization problems. Ant colony optimization based upon ant behavior in their colony, Particle swarm optimization about the swarm of birds in the search of suitable location with better food are some of the examples. Monkey algorithm is one of the swarm intelligence algorithm which considers the behaviors of monkeys in the mountains in the search of good food. This paper discusses about the Monkey algorithm and its application to the optimization problems such as optimal robot path planning and the Open vehicle routing problems.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy efficient for WSN using mobile co-ordinator in fuzzy method","authors":"G. B. Z. Sen, G. G. Z. Sen","doi":"10.1109/ICICES.2017.8070760","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070760","url":null,"abstract":"Wireless sensor networks are used in many real-time applications. In WSN, effective use of energy resource is one of the challenging research issues as the battery limits the lifetime of sensor node. The Rumor Routing has advantages in energy saving by making full use of two features: clustering structure and next-hop scheme. This rumor routing algorithm in WSN allows query source to distribute query to identify source which helps to get timely query message but the energy efficiency is made better using hierarchical method by clustering formation, where the appropriate selection of cluster head reduces energy conservation. So we have fuzzy logic as the proposed method which is based on three features : Centrality, Energy, Distance. The mobile co-ordinator is used in this method to increase the network efficiency. Thus fuzzy logic can effectively avoid the problems that occur in RR and can provide more energy-efficient routing paths. The performance between fuzzy logic using mobile co-ordinator and RR are evaluated by simulations. This simulation results indicate that compared with RR, the fuzzy logic can save energy consumption, provide better path, and increases delivery rate.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}