{"title":"Development of non-invasive diagnostic tool for diseases using Photo Plethysmography","authors":"S. More, Pranali C. Chaudhari","doi":"10.1109/WISPNET.2016.7566387","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566387","url":null,"abstract":"Photo plethysmography (PPG) uses infrared light to measure the blood volumetric changes occurring in the various parts of the body. PPG is non-invasive, inexpensive, and convenient diagnostic tool. Photo plethysmography (PPG) sensor is one among the wide variety of optical sensors available. PPG signal is information source related to cardio-pulmonary system. Traditionally, it's been used to measure the oxygen saturation, blood pressure and for assessing autonomic functions. Recent studies emphasize the potential information embedded in the PPG waveform signal and require attention for its possible applications beyond pulse oximetry and heart-rate calculation. Therefore, this paper discusses different types of plethysmography signal, characteristic features of PPG waveform, and algorithm to denoise the signal, and proposes algorithm to develop indexes to diagnose diseases using PPG signal.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm for pre-processing chest-x-ray using multi-level enhancement operation","authors":"S. Savitha, N. Naveen","doi":"10.1109/WISPNET.2016.7566529","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566529","url":null,"abstract":"Accuracy in diagnostics of life-threatening disease based on chest x-ray images is an atmost importance in healthcare sector, where medical image processing has already played a contributory role from more than a decade. In this regards, image enhancement plays a critical role in exposing more information to the foreground image of clinical importance. We have reviewed the most existing system pertaining to chest image enhancement and found that more enhancements could be done to enhance the signal quality. Therefore, we present a sophisticated algorithm that performs multiple operations for enhancing the chest x-rays. The proposed paper introduces techniques for enhancing chest x-rays using non-linear enhancement, primary enhancement, secondary enhancement algorithms on JSRT database. The proposed system shows better quality of enhanced region in comparison to the most frequently adopted techniques for medical image enhancement.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data compression in Wireless visual Sensor networks using wavelets","authors":"S. Sofi, Roohie Naaz","doi":"10.1109/WISPNET.2016.7566344","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566344","url":null,"abstract":"Wireless Sensor Networking is a sensor information gathering technology that has a wide range of applications in numerous fields. However due to the fact that sensor nodes have limited battery and are deployed in remote and harsh environments, energy efficient and real time transmission of the information are still open challenges. Since in a wireless sensor network data transmission is the most power consuming task, so far most useful techniques for the purpose of energy efficient and real time transmissions are based on data compression, the majority of them are based on wavelet transform. This paper give performance analysis of different wavelets for energy efficient and real time image data transmission in application like environment monitoring using wireless visual sensor networks. The performance evaluation shows that Haar wavelet is better in terms of energy efficiency and transmission time.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of simulation tools in cloud computing","authors":"ASHALATHA RAMEGOWDA, Jayashree Agarkhed, S. Patil","doi":"10.1109/WISPNET.2016.7566233","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566233","url":null,"abstract":"For any large scale cloud applications coming around large geographic distribution, the large requirements have to be evaluated by the developers. Simulation procedures are very much useful for the researchers during their research process. Their own algorithms can be tested in a cloud environment using any type of simulators. Therefore, the common toolsets have to be used for evaluation and modeling for large cloud applications. In this regard, common simulation tools are defined in this paper for large cloud environments which takes care of computing services and user workloads.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy aware Genetic Algorithm Multipath Distance Vector Protocol for efficient routing","authors":"J. Seetaram, P. S. Kumar","doi":"10.1109/WISPNET.2016.7566488","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566488","url":null,"abstract":"Mobile Adhoc Networks (MANETs) are networks that are dynamic and lacking infrastructure, with a set of wireless mobile nodes transmitting with one another with wireless links. MANET has no central controlling device and has constantly shifting topologies. Routing algorithms have a major part in communicating information over a system. Routing protocols has two noteworthy arrangements are unipath and multipath. The current work assesses execution of an on-demand multipath routing protocol called Adhoc On-demand Multipath Distance Vector (AOMDV) routing. This paper suggests an energy-aware Genetic Algorithm (GA) based Multipath Distance Vector Protocol. GA has been viewed as one of the meta-heuristic strategies created to take care of the optimization issues utilizing the simulation of the conduct of the hereditary operators. Simulation results demonstrate the high accuracy and quality of the suggested technique for the optimization strategies achieved by the GA.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of ultra wideband low noise amplifier with the negative feedback using micro strip line matching structure for multiple band application and its simulation based performance analysis","authors":"Bhushan Vidhale, M. Khanapurkar","doi":"10.1109/WISPNET.2016.7566461","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566461","url":null,"abstract":"In this paper we have discussed the design of multiple band low noise amplifier using micro strip lines structure and its simulation based performance analysis. LNA design is very difficult work in the receiver part because the signal which received is very weak and gets affected easily with the noise. Therefore it is necessary that new design must give noise figure as low as possible over a wide range. If LNA works for on wide band so it can be used for multiple band applications. Its simulation based analysis is also important to test its stability and performance before fabrication. As it is difficult to get all the characteristics of LNA perfectly therefore there is always a tradeoff between gain and noise. We have to optimize the values of the component so as to get the optimum results. To achieve this entire component, the negative feedback is used with a matching circuit which consists of micro strip line and some passive elements. The software ADS is used for simulations and to optimize design. The simulation based performance analysis done with variation of temperature. In results we are getting the Gain of LNA up to 30 db with noise figure less than 3 db. Stability that is getting for design LNA is greater than 1 for frequency band of 500 MHz to 6 GHz Design LNA can be used for multiple band applications like GSM, Bluetooth, CDMA,WiFi, WiMax & GPS.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of coplanar approximate adders in QCA","authors":"B. Aravinth, L. A. Marcilin","doi":"10.1109/WISPNET.2016.7566219","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566219","url":null,"abstract":"A approximate adder implemented with quantum-dot cellular automata (QCA) is described. The most basic arithmetic process is the adding of two binary digits, i.e. bits. In many fields the adder plays an important role but in most of the field the accuracy is not in concern. So proposed a novel approximate adder of quantum dot cellular automata (QCA).The proposed adder is used to reduce the circuit complexity and time delay with low error rate. The circuit complexity reduction is achieved by reducing the majority gate in the adder circuit. The operation of QCA circuits is simulated and verified using QCA Designer bistable vector simulation.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125485103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing security in MANETS through trust-aware routing","authors":"V. Bhargavi, S. Raju","doi":"10.1109/WISPNET.2016.7566481","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566481","url":null,"abstract":"A Mobile ad Hoc Network is a collection of nodes which is an infrastructure less network and hence can be easily established and deployed instantly. In addition to their normal operation, all the nodes in this kind of network act as routers as well. Because of the mobility and dynamic nature of the network, all the nodes are free to move randomly and hence topology of a MANET changes very frequently. This invites the complexity of routing the packets from source to destination. Also, as a MANET is a multi-hop network, the packets should pass through intermediate nodes which always need not be genuine all the time which poses many security issues in MANET's. Our paper discusses a secure routing protocol which is a trust based secure routing scheme that considers information collected from neighbouring nodes. Based on the trust information received about a node from its neighbouring nodes and its past history of transactions, we assign a trust value for every node in the network. If this value is less than a specific threshold set by the coordinator nodes, that specific node can be considered as a malicious node and hence routing paths should not involve such nodes, which guarantees secure path routing. This protocol has been implemented on NS-2 and results show that this protocol achieved better performance in terms of the packet delivery ratio and throughput when compared to existing routing schemes in literature.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on the nonlinearity of Boolean functions","authors":"Bharti","doi":"10.1109/WISPNET.2016.7566258","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566258","url":null,"abstract":"The symmetric key ciphers namely stream ciphers and block ciphers have a major role of Boolean functions in their construction. This is because they are able to provide ciphers with strengthening properties to resist known and potential cryptanalytic attacks. One of the important cryptographic properties that a strong Boolean function required is nonlinearity. A high value of nonlinearity must be possessed by Boolean functions so as to endure linear and correlation attacks. The study of lower or upper bound of nonlinearity of different types of Boolean functions such as resilient function, Carlet-feng function, MAI function, bent function, Tu-deng function etc. is the main aim of this paper.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic model for cloud computing: An overview","authors":"M. Edington, Alex, R. Kishore","doi":"10.1109/WISPNET.2016.7566345","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566345","url":null,"abstract":"In new digital era, cyber criminals uses cloud computing as their trusted sector for fraudulent activities due to owing characteristics of cloud computing. This makes cloud forensics, a new discipline in digital world. Recent survey [1] reveals that cyber criminals are adopting towards cloud computing technology for their fraudulent activities due to its essential characteristics that brings safe zone for criminals and also due to the lack of suitable digital forensic techniques for cloud environment. As a result of mitigating cloud crime, cloud forensics came up with number of challenges and issues. The objective of this paper is to put importance on the challenges faced by investigators during investigation process. Most of the research work in the literature highlights the challenges in cloud forensics and the projected solutions in literature depends on Cloud Service Provider (CSP) for forensics investigation. The dependence on CSP includes the collection of data for forensics process and there may be a chance of altering data that affects the whole investigation process. For mitigating dependence on CSP we come up with a new model for collecting forensic evidences outside cloud environment.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}