2017 International Conference on Information Communication and Embedded Systems (ICICES)最新文献

筛选
英文 中文
Survey on compressive data collection techniques for wireless sensor networks 无线传感器网络压缩数据采集技术综述
Denis Infanteena
{"title":"Survey on compressive data collection techniques for wireless sensor networks","authors":"Denis Infanteena","doi":"10.1109/ICICES.2017.8070765","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070765","url":null,"abstract":"The sensor nodes in Wireless Sensor Network sense the physical environment and the sensed information is transferred to the destination. Data Collection is a crucial function of a sensor node, as it requires more energy from the network. Different data collection techniques are formulated, among which the Compressive Sensing technique plays a vital role. Compressive Sensing aims at conserving energy, by reconstructing the sparse or compressed signals from smaller measurements with high probability. This paper presents the different compressive data collection techniques and analyses their features.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile recharging framework with secured packet scheduling for named data networking based WSN 基于无线传感器网络的命名数据网络安全分组调度移动充值框架
K. Arumugam, M. Sathish, S. Neelavathy Pari
{"title":"Mobile recharging framework with secured packet scheduling for named data networking based WSN","authors":"K. Arumugam, M. Sathish, S. Neelavathy Pari","doi":"10.1109/ICICES.2017.8070710","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070710","url":null,"abstract":"One of the main problem faced by WSNs (Wireless Sensor Networks) is its extent lifetime due to scarce energy supply limited during their operation. In this paper, we are going to an modified real-time wireless recharging for WSN along with Dynamic Recharging Multilevel Priority (DRMP) Data scheduling. For that firstly a Real-time are charging scheme is adopted. An NDN(Named Data Networking) based Real time Wireless recharging scheme is one of the good recharging schemes which uses more mobile vehicles for recharging and also provides more security and robustness. In this proposed work, an efficient real-time wireless recharging protocol which is named as, Mobile Recharging Framework with Secured Packet Scheduling is developed, by including DRMP packet scheduling along with above mentioned NDN based real-time recharging scheme. By adopting DRMP packet scheduling scheme along with the Real time recharging framework further improves the network parameters.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134197272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Studies on open source real time operating systems: For vehicle suspension control 面向车辆悬架控制的开源实时操作系统研究
M. Balasubramanian, N. Usha
{"title":"Studies on open source real time operating systems: For vehicle suspension control","authors":"M. Balasubramanian, N. Usha","doi":"10.1109/ICICES.2017.8070787","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070787","url":null,"abstract":"Studying the TIMELINESS of PERIODIC tasks of real time operating systems available in open source, to determine the reliability and efficiency of the systems for implementing them in suspension control of ground vehicles. We take several operating systems which are open source and are available to the public through GNU license (ex: Linux). The Kernels, which are the building blocks of the operating systems which connect hardware and software, are patched using selective real time patches which makes the operating system real time. This is done in order to unlock real time capabilities such as unbounded latencies and real time priorities. These operating systems are tested for their efficiency and timeliness. The results are compared with the test logs of non-real time operating system. These kernels are then cross compiled and built for ARM architecture. This kernel is then applied to an embedded system which is then tested using the same afore mentioned tests. The results are logged and analyzed.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on IOT with reference of M2M and WiFi 参考M2M和WiFi的物联网研究
N. Kumar, B. Praveen, A. V. S. Reddy, B. Sam
{"title":"Study on IOT with reference of M2M and WiFi","authors":"N. Kumar, B. Praveen, A. V. S. Reddy, B. Sam","doi":"10.1109/ICICES.2017.8070754","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070754","url":null,"abstract":"The vision of network connectivity and computing capability divulge into future enhancement in the field of technology named as IOT. IOT refers as “Internet of Things” which extends as sensors, actuators, RFID, software, electronics that enable these objects to collect and exchange information remotely. In this paper we are motivated to learn about the internet of things and how devices are being connected and communicated using sensors and various wireless technologies. In addition to that we are discussing about the prospects of machine to machine communication (M2M) including its widespread usage in the real life applications and also its drawbacks. We are also studying about wireless technologies like Wireless Fidelity and also the need for Wi-Fi including the problems that are associated with wireless fidelity.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated SPAM detection for multilingual emails 综合垃圾邮件检测多语言电子邮件
Akash Iyengar, G. Kalpana, S. Kalyankumar, S. Gunanandhini
{"title":"Integrated SPAM detection for multilingual emails","authors":"Akash Iyengar, G. Kalpana, S. Kalyankumar, S. Gunanandhini","doi":"10.1109/ICICES.2017.8070784","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070784","url":null,"abstract":"Emails and social communication is the newest and easiest way of data communication. Although Electronic communications are facile in nature, it is equally easy to attack these services with an intention of fraud and trickery motivation. The cyberpunks use emails to obtain valuable credentials which could be used in many ways. A simple looking mail can include phishing URLs for purloin of important information. To avoid such criminal activities, perceive and filter such kinds of mails, an integrated approach is used. Each email provider has their own filtering system or technique, but most of them don't work to their full capacity. There are instances where an email in native language or any other language other than English can be considered genuine. The objective of the paper is to overcome this problem by using an integrated technique to increase the efficiency of detecting and filtering the emails.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of tuberculosis bacilli from Ziehl Neelson stained sputum smear images 痰涂片Ziehl - Neelson染色检测结核杆菌
G. E. Sugirtha, G. Murugesan, S. Vinu
{"title":"Detection of tuberculosis bacilli from Ziehl Neelson stained sputum smear images","authors":"G. E. Sugirtha, G. Murugesan, S. Vinu","doi":"10.1109/ICICES.2017.8070751","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070751","url":null,"abstract":"Tuberculosis is a contagious illness caused by the Mycobacterium Tuberculosis, also known as Koch bacillus. Many developing countries follow the manual method for diagnosing TB, which causes false alarms in the detection of TB positive or negative. In order to reduce the intervention of human we have developed an effective algorithm for the detection of tuberculosis bacilli as an automated system. This paper proposes a color segmentation and classification approach for automatic detection of Mycobacterium Tuberculosis, which causes TB from the image of Ziehl-Nielsen stained sputum smear obtained from a bright microscope. Segment the bacilli called candidate bacilli using its characteristics from the image using Particle Swarm Optimization technique, depending on pixel intensities, each bacillus is segmented by extracting blue component of pixel values. The candidate bacilli are then grouped together using connected component analysis after using morphological operations. Detection of Tuberculosis bacilli from sputum smear by random forest technique is a prominent method used in diagnosing the tuberculosis by classifying the subject samples. The combination of particle swarm optimization and random forest classification provides better results and correct diagnosis in term of infection level. The experimental result shows that our approach is significantly better compared to the existing approaches.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of a novel hybrid boosting converter for renewable energy applications 一种新型可再生能源混合式升压变换器的性能分析
Rajendera Prasad, S. Singh, A. Goswami, N. Sinha
{"title":"Performance analysis of a novel hybrid boosting converter for renewable energy applications","authors":"Rajendera Prasad, S. Singh, A. Goswami, N. Sinha","doi":"10.1109/ICICES.2017.8070733","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070733","url":null,"abstract":"The design of hybrid boosting converter has gained significant advantage of voltage regulation from its boost structure by the gain enhancement from its voltage multiplier structure. Many works are reported for the design of hybrid boost converter which consists of single switch, single inductor by employing bipolar voltage multiplier. The converters are designed with less component stress and small amount of output ripple. The investigations for the performance analysis of the converter achieves extremely large voltage conversion ratio. The proposed design can boost the input voltage nearly to a significant level with less number of switches and inductors while maintaining high efficiency compared to recently reported works in the literature.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering methodology to prolong lifetime in wireless sensor networks 延长无线传感器网络寿命的聚类方法
J. K. Deepak Keynes, D. Punithavathani
{"title":"Clustering methodology to prolong lifetime in wireless sensor networks","authors":"J. K. Deepak Keynes, D. Punithavathani","doi":"10.1109/ICICES.2017.8070721","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070721","url":null,"abstract":"Wireless sensor network (WSN) is a low-powered network formed by the sensor nodes that finds application in civilian, military, visual sense models and many others. Improved network lifetime is an important task to be achieved by these sensor networks. The conservative routing protocols cannot be applied here due to its battery powered nodes. To provision energy efficiency, nodes are frequently clustered in to non-overlapping clusters. This paper gives a brief overview on clustering process in wireless sensor networks. A hybrid energy efficient distributed clustering methodology for dense wireless sensor networks, the Capacity based Clustering Low Energy Adaptive Clustering Hierarchy (CC-LEACH) has been proposed and the results have been evaluated against the existing Low Energy Adaptive Clustering Hierarchy (LEACH) clustering methodology. Simulation results clearly show an excellent improvement in throughput, packet delivery ratio and number of packets received at the base station. Also, the proposed clustering methodology show a reduction in packet drop, energy consumption and end to end latency for dense wireless sensor networks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131758604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data protection and outsourcing in cloud with Linear programming and image based OTP 基于线性规划和基于图像的OTP的云数据保护和外包
Rahul Kumar, A. Pravin
{"title":"Data protection and outsourcing in cloud with Linear programming and image based OTP","authors":"Rahul Kumar, A. Pravin","doi":"10.1109/ICICES.2017.8070745","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070745","url":null,"abstract":"Distributed computing has turned into a reality which is capable of empowering overall population and associations to make utilization of colossal computational assets without capital interest in pay per utilize form. This new worldview permits clients who have so much computational assets to outsource their costly workloads related to computation which is in return connected to cloud as well as obtain advantages of its stockpiling, servers, organizing and a few offices. In this manner distributed computing has endless conceivable outcomes as a result a person could realize a global standard foundation and offices in her own PC sans venture. In spite of the fact that cloud specialist organizations deal with security client have their own worries regarding insurance of their touchy information. Along these lines, it is groundbreaking to have secure system to ensure information of clients furthermore guarantee the information respectability. This will empower clients to outsource their works courageously. This proposed framework concentrates on the Linear programming calculations that happen over cloud with excellent security. Keeping in mind the eventually goal is to accomplish reasonable effectiveness, our system configuration unequivocally separate the Linear Programming (LP) computation outsourcing into open LP solvers functioning on the cloud as well as private LP parameters possessed by the client. The subsequent adaptability permits us to observe fitting security tradeoff by means of larger amount deliberation LP calculations than the general circuit representation. Furthermore for keep up information protection in cloud we utilize blow fish and picture based one-time secret password. It is likewise found that the outcome confirmation of the framework is computationally proficient does not acquire extra charge.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132424253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improving the spectrum aware mobility management in cognitive radio network 改进认知无线网络中频谱感知移动性管理
K. Priyanka, K. Rajakumari
{"title":"Improving the spectrum aware mobility management in cognitive radio network","authors":"K. Priyanka, K. Rajakumari","doi":"10.1109/ICICES.2017.8070761","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070761","url":null,"abstract":"Wireless spread spectrum is a standout amongst the most valuable assets. With the fast development of the quantity of remote gadgets, interchanges over the unlicensed range groups get to be extremely swarmed. Data dissemination in the wireless environment is usually characterized as the spreading of data to numerous goals through communicating. The principle target is to achieve the most extreme number of neighbors with each sent parcel. The main objective of the paper is to find the best routing and resource allocation strategies in order to minimize the average end-to-end delay of multiple data connections in the cognitive radio based wireless mesh network. Wireless mesh nodes utilize the cognitive radio to share the spectrum with primary users. Depending on the primary user's activities, the spectrum resources available to the cognitive mesh nodes are varying in both space and time. In this joint design scheme can accommodate the traffic load, or achieve half the delay compared to the disjoint methods.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信