{"title":"Survey on compressive data collection techniques for wireless sensor networks","authors":"Denis Infanteena","doi":"10.1109/ICICES.2017.8070765","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070765","url":null,"abstract":"The sensor nodes in Wireless Sensor Network sense the physical environment and the sensed information is transferred to the destination. Data Collection is a crucial function of a sensor node, as it requires more energy from the network. Different data collection techniques are formulated, among which the Compressive Sensing technique plays a vital role. Compressive Sensing aims at conserving energy, by reconstructing the sparse or compressed signals from smaller measurements with high probability. This paper presents the different compressive data collection techniques and analyses their features.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile recharging framework with secured packet scheduling for named data networking based WSN","authors":"K. Arumugam, M. Sathish, S. Neelavathy Pari","doi":"10.1109/ICICES.2017.8070710","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070710","url":null,"abstract":"One of the main problem faced by WSNs (Wireless Sensor Networks) is its extent lifetime due to scarce energy supply limited during their operation. In this paper, we are going to an modified real-time wireless recharging for WSN along with Dynamic Recharging Multilevel Priority (DRMP) Data scheduling. For that firstly a Real-time are charging scheme is adopted. An NDN(Named Data Networking) based Real time Wireless recharging scheme is one of the good recharging schemes which uses more mobile vehicles for recharging and also provides more security and robustness. In this proposed work, an efficient real-time wireless recharging protocol which is named as, Mobile Recharging Framework with Secured Packet Scheduling is developed, by including DRMP packet scheduling along with above mentioned NDN based real-time recharging scheme. By adopting DRMP packet scheduling scheme along with the Real time recharging framework further improves the network parameters.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134197272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studies on open source real time operating systems: For vehicle suspension control","authors":"M. Balasubramanian, N. Usha","doi":"10.1109/ICICES.2017.8070787","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070787","url":null,"abstract":"Studying the TIMELINESS of PERIODIC tasks of real time operating systems available in open source, to determine the reliability and efficiency of the systems for implementing them in suspension control of ground vehicles. We take several operating systems which are open source and are available to the public through GNU license (ex: Linux). The Kernels, which are the building blocks of the operating systems which connect hardware and software, are patched using selective real time patches which makes the operating system real time. This is done in order to unlock real time capabilities such as unbounded latencies and real time priorities. These operating systems are tested for their efficiency and timeliness. The results are compared with the test logs of non-real time operating system. These kernels are then cross compiled and built for ARM architecture. This kernel is then applied to an embedded system which is then tested using the same afore mentioned tests. The results are logged and analyzed.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on IOT with reference of M2M and WiFi","authors":"N. Kumar, B. Praveen, A. V. S. Reddy, B. Sam","doi":"10.1109/ICICES.2017.8070754","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070754","url":null,"abstract":"The vision of network connectivity and computing capability divulge into future enhancement in the field of technology named as IOT. IOT refers as “Internet of Things” which extends as sensors, actuators, RFID, software, electronics that enable these objects to collect and exchange information remotely. In this paper we are motivated to learn about the internet of things and how devices are being connected and communicated using sensors and various wireless technologies. In addition to that we are discussing about the prospects of machine to machine communication (M2M) including its widespread usage in the real life applications and also its drawbacks. We are also studying about wireless technologies like Wireless Fidelity and also the need for Wi-Fi including the problems that are associated with wireless fidelity.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akash Iyengar, G. Kalpana, S. Kalyankumar, S. Gunanandhini
{"title":"Integrated SPAM detection for multilingual emails","authors":"Akash Iyengar, G. Kalpana, S. Kalyankumar, S. Gunanandhini","doi":"10.1109/ICICES.2017.8070784","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070784","url":null,"abstract":"Emails and social communication is the newest and easiest way of data communication. Although Electronic communications are facile in nature, it is equally easy to attack these services with an intention of fraud and trickery motivation. The cyberpunks use emails to obtain valuable credentials which could be used in many ways. A simple looking mail can include phishing URLs for purloin of important information. To avoid such criminal activities, perceive and filter such kinds of mails, an integrated approach is used. Each email provider has their own filtering system or technique, but most of them don't work to their full capacity. There are instances where an email in native language or any other language other than English can be considered genuine. The objective of the paper is to overcome this problem by using an integrated technique to increase the efficiency of detecting and filtering the emails.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of tuberculosis bacilli from Ziehl Neelson stained sputum smear images","authors":"G. E. Sugirtha, G. Murugesan, S. Vinu","doi":"10.1109/ICICES.2017.8070751","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070751","url":null,"abstract":"Tuberculosis is a contagious illness caused by the Mycobacterium Tuberculosis, also known as Koch bacillus. Many developing countries follow the manual method for diagnosing TB, which causes false alarms in the detection of TB positive or negative. In order to reduce the intervention of human we have developed an effective algorithm for the detection of tuberculosis bacilli as an automated system. This paper proposes a color segmentation and classification approach for automatic detection of Mycobacterium Tuberculosis, which causes TB from the image of Ziehl-Nielsen stained sputum smear obtained from a bright microscope. Segment the bacilli called candidate bacilli using its characteristics from the image using Particle Swarm Optimization technique, depending on pixel intensities, each bacillus is segmented by extracting blue component of pixel values. The candidate bacilli are then grouped together using connected component analysis after using morphological operations. Detection of Tuberculosis bacilli from sputum smear by random forest technique is a prominent method used in diagnosing the tuberculosis by classifying the subject samples. The combination of particle swarm optimization and random forest classification provides better results and correct diagnosis in term of infection level. The experimental result shows that our approach is significantly better compared to the existing approaches.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of a novel hybrid boosting converter for renewable energy applications","authors":"Rajendera Prasad, S. Singh, A. Goswami, N. Sinha","doi":"10.1109/ICICES.2017.8070733","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070733","url":null,"abstract":"The design of hybrid boosting converter has gained significant advantage of voltage regulation from its boost structure by the gain enhancement from its voltage multiplier structure. Many works are reported for the design of hybrid boost converter which consists of single switch, single inductor by employing bipolar voltage multiplier. The converters are designed with less component stress and small amount of output ripple. The investigations for the performance analysis of the converter achieves extremely large voltage conversion ratio. The proposed design can boost the input voltage nearly to a significant level with less number of switches and inductors while maintaining high efficiency compared to recently reported works in the literature.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering methodology to prolong lifetime in wireless sensor networks","authors":"J. K. Deepak Keynes, D. Punithavathani","doi":"10.1109/ICICES.2017.8070721","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070721","url":null,"abstract":"Wireless sensor network (WSN) is a low-powered network formed by the sensor nodes that finds application in civilian, military, visual sense models and many others. Improved network lifetime is an important task to be achieved by these sensor networks. The conservative routing protocols cannot be applied here due to its battery powered nodes. To provision energy efficiency, nodes are frequently clustered in to non-overlapping clusters. This paper gives a brief overview on clustering process in wireless sensor networks. A hybrid energy efficient distributed clustering methodology for dense wireless sensor networks, the Capacity based Clustering Low Energy Adaptive Clustering Hierarchy (CC-LEACH) has been proposed and the results have been evaluated against the existing Low Energy Adaptive Clustering Hierarchy (LEACH) clustering methodology. Simulation results clearly show an excellent improvement in throughput, packet delivery ratio and number of packets received at the base station. Also, the proposed clustering methodology show a reduction in packet drop, energy consumption and end to end latency for dense wireless sensor networks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131758604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data protection and outsourcing in cloud with Linear programming and image based OTP","authors":"Rahul Kumar, A. Pravin","doi":"10.1109/ICICES.2017.8070745","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070745","url":null,"abstract":"Distributed computing has turned into a reality which is capable of empowering overall population and associations to make utilization of colossal computational assets without capital interest in pay per utilize form. This new worldview permits clients who have so much computational assets to outsource their costly workloads related to computation which is in return connected to cloud as well as obtain advantages of its stockpiling, servers, organizing and a few offices. In this manner distributed computing has endless conceivable outcomes as a result a person could realize a global standard foundation and offices in her own PC sans venture. In spite of the fact that cloud specialist organizations deal with security client have their own worries regarding insurance of their touchy information. Along these lines, it is groundbreaking to have secure system to ensure information of clients furthermore guarantee the information respectability. This will empower clients to outsource their works courageously. This proposed framework concentrates on the Linear programming calculations that happen over cloud with excellent security. Keeping in mind the eventually goal is to accomplish reasonable effectiveness, our system configuration unequivocally separate the Linear Programming (LP) computation outsourcing into open LP solvers functioning on the cloud as well as private LP parameters possessed by the client. The subsequent adaptability permits us to observe fitting security tradeoff by means of larger amount deliberation LP calculations than the general circuit representation. Furthermore for keep up information protection in cloud we utilize blow fish and picture based one-time secret password. It is likewise found that the outcome confirmation of the framework is computationally proficient does not acquire extra charge.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132424253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the spectrum aware mobility management in cognitive radio network","authors":"K. Priyanka, K. Rajakumari","doi":"10.1109/ICICES.2017.8070761","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070761","url":null,"abstract":"Wireless spread spectrum is a standout amongst the most valuable assets. With the fast development of the quantity of remote gadgets, interchanges over the unlicensed range groups get to be extremely swarmed. Data dissemination in the wireless environment is usually characterized as the spreading of data to numerous goals through communicating. The principle target is to achieve the most extreme number of neighbors with each sent parcel. The main objective of the paper is to find the best routing and resource allocation strategies in order to minimize the average end-to-end delay of multiple data connections in the cognitive radio based wireless mesh network. Wireless mesh nodes utilize the cognitive radio to share the spectrum with primary users. Depending on the primary user's activities, the spectrum resources available to the cognitive mesh nodes are varying in both space and time. In this joint design scheme can accommodate the traffic load, or achieve half the delay compared to the disjoint methods.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}