{"title":"A review on VANET security attacks and their countermeasure","authors":"Deeksha, Ajay Kumar, M. Bansal","doi":"10.1109/ISPCC.2017.8269745","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269745","url":null,"abstract":"In the development of smart cities across the world VANET plays a vital role for optimized route between source and destination. The VANETs is based on infra-structure less network. It facilitates vehicles to give information about safety through vehicle to vehicle communication (V2V) or vehicle to infrastructure communication (V2I). In VANETs wireless communication between vehicles so attackers violate authenticity, confidentiality and privacy properties which further effect security. The VANET technology is encircled with security challenges these days. This paper presents overview on VANETs architecture, a related survey on VANET with major concern of the security issues. Further, prevention measures of those issues, and comparative analysis is done. From the survey, found out that encryption and authentication plays an important role in VANETS also some research direction defined for future work.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124169903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of various speckle reduction techniques for ultrasound images","authors":"Simarjot Kaur Randhawa, R. K. Sunkaria","doi":"10.1109/ISPCC.2017.8269659","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269659","url":null,"abstract":"In this work, a comparison of existing speckle reduction techniques have been done. Median and wiener filters, wavelet based methods and SRAD methods have been compared. The methods are first tested on synthetic images for comparison of the results and then applied on real ultrasound images. It is observed that SRAD method outperforms the other techniques for low noise variance. For higher noise variance, exponential thresholding outperforms the remaining techniques. Also, it is observed that wiener filter have a comparable performance and hence performs well over range of noise variance. Wavelet denoising based on the soft thresholding is reported to be least performing.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of slotted cantilever structure for piezoelectric energy harvesting","authors":"P. Asthana, G. Khanna","doi":"10.1109/ISPCC.2017.8269709","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269709","url":null,"abstract":"A micro electro-mechanical system based energy harvester is designed for conversion of mechanical vibration energy via piezoelectric effect. This paper describes vibration based piezoelectric energy harvester in side clamped and slotted form. The cantilever structures are designed in COMSOL Multiphysics tool. A resonant frequency analysis for the cantilever structure has been carried out. The cantilever structures are compared under identical condition of 1 g acceleration. Slotted cantilever structures has a better resonant frequency compared to the side clamped structure, but the peak power density of the system is quite low as compared to the side clamped structure.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122002444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An advance 2D face recognition by feature extraction (ICA) and optimize multilayer architecture","authors":"R. Kaur, Dolly Sharma, Amit Verma","doi":"10.1109/ISPCC.2017.8269662","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269662","url":null,"abstract":"Facial recognition has most significant real-life requests like investigation and access control. It is associated through the issue of appropriately verifying face pictures and transmit them person in a database. In a past years face study has been emerging active topic. Most of the face detector techniques could be classified into feature based methods and image based also. Feature based techniques adds low-level analysis, feature analysis, etc. Facial recognition is a system capable of verifying / identifying a human after 3D images. By evaluating selected facial unique features from the image and face dataset. Design from transformation method given vector dimensional illustration of individual face in a prepared set of images, Principle component analysis inclines to search a dimensional sub-space whose normal vector features correspond to the maximum variance direction in the real image space. The PCA algorithm evaluates the feature extraction, data, i.e. Eigen Values and vectors of the scatter matrix. In literature survey, Face recognition is a design recognition mission performed exactly on faces. It can be described as categorizing a facial either “known” or “unknown”, after comparing it with deposits known individuals. It is also necessary to need a system that has the capability of knowledge to recognize indefinite faces. Computational representations of facial recognition must statement various difficult issues. After existing work, we study the SIFT structures for the gratitude method. The novel technique is compared with well settled facial recognition methods, name component analysis and eigenvalues and vector. This algorithm is called PCA and ICA (Independent Component Analysis). In research work, we implement the novel approach to detect the face in minimum time and evaluate the better accuracy based on Back Propagation Neural Networks. We design the framework in face recognition using MATLAB 2013a simulation tool. Evaluate the performance parameters, i.e. the FAR (false acceptance rate), FRR (False rejection Rate) and Accuracy and compare the existing performance parameters i.e. accuracy.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of 4-bit serial-parallel multiplier in Quantum-Dot Cellular Automata","authors":"Namita, T. Sasamal","doi":"10.1109/ISPCC.2017.8269704","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269704","url":null,"abstract":"Quantum-Dot Cellular Automata (QCA) as technology is a promising candidate that has tremendous potential to replace CMOS due to its outstanding features such as low-power, extremely high density, fast operation speed. However, due to its four-phased clocking scheme and timing requirements, various issues in timing for interconnections and feedback are present. In this paper, the delay transfers and retiming using QCA characteristics to solve timing issues has been explored. The problem in assigning appropriate clock zones and feedback has been addressed. Based on the design rules and constraints, retiming technique has been discussed to perform delay-transfer and time-scaling to achieve efficient clock zone assignment. A serial adder has been designed that uses multilayer crossover. As a case study, a 4-bit serial-parallel multiplier has been designed using the serial adder as basic input circuit to illustrate the rules of retiming.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative performance analysis of fuzzy C-means based methods for segmentation of brain magnetic resonance images","authors":"Nighat Nazir","doi":"10.1109/ISPCC.2017.8269720","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269720","url":null,"abstract":"Fuzzy C-means (FCM) is the classical clustering algorithm for segmentation of tissues such as cerebrospinal fluid (CSF), gray matter (GM) and white matter (WM) from magnetic resonance images (MRI). Medical images such as brain MRI are often corrupted by Rician noise thus, segmentation with FCM becomes problematic. Various variants of the classical FCM have been proposed which are robust to image noise. This paper presents a comparative performance evaluation of brain MRI segmentation methods based on Fuzzy C-means using Jaccard similarity (JS).","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nancy Bansal, Amit Verma, Iqbaldeep Kaur, Dolly Sharma
{"title":"Multimodal biometrics by fusion for security using genetic algorithm","authors":"Nancy Bansal, Amit Verma, Iqbaldeep Kaur, Dolly Sharma","doi":"10.1109/ISPCC.2017.8269668","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269668","url":null,"abstract":"The physiological biometrics like face is combined with behavioral biometrics like speech to achieve the robustness of fusion process of a multimodal system. The selection of the biometrics is dependent on the robustness and uniqueness of the biometric. That is why, the selection of these two biometrics is done in this work. Mel Frequency Cepstral Coefficients has been utilized for speech feature extraction and in addition to this fuzzy logic is also utilized for training purpose. Then, the optimized features values are reduced using genetic algorithm. In the end, fusion is achieved by combination of fuse values obtained from both 2 biometrics. The whole simulation is tested in MATLAB environment.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kumar, Shobha Antwal, Ganesh Samarthyam, S. Jain
{"title":"Genetic optimized data deduplication for distributed big data storage systems","authors":"N. Kumar, Shobha Antwal, Ganesh Samarthyam, S. Jain","doi":"10.1109/ISPCC.2017.8269581","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269581","url":null,"abstract":"Content-Defined Chunking (CDC) detect maximum redundancy in data deduplication systems in the past years. In this research work, we focus on optimizing the deduplication system by adjusting the pertinent factors in content defined chunking (CDC) to identify as the key ingredients by declaring chunk cut-points and efficient fingerprint lookup using bucket based index partitioning. For efficient chunking, we propose Genetic Evolution (GE) algorithm based approach which is optimized Two Thresholds Two Divisors (TTTD-P) CDC algorithm where we significantly reduce the number of computing operations by using single dynamic optimal parameter divisor D with optimal threshold value exploiting the multi-operations nature of TTTD. To reduce the chunk-size variance, TTTD algorithm introduces an additional backup divisor D' that has a higher probability of finding cut-points. However, adding an additional divisor decreases the chunking throughput, meaning that TTTD algorithm aggravates Rabin's CDC performance bottleneck. To this end, Asymmetric Extremum (AE) significantly improves chunking throughput while providing comparable deduplication efficiency by using the local extreme value in a variable-sized asymmetric window to overcome the Rabin, MAXP and TTTD boundaries-shift problem. FAST CDC in the year 2016 is about 10 times faster than unimodal Rabin CDC and about 3 times faster than Gear and Asymmetric Extremum (AE) CDC, while achieving nearby the same deduplication ratio (DR). Therefore, we propose GE based TTTD-P optimized chunking to maximize chunking throughput with increased DR; and bucket indexing approach reduces hash values judgement time to identify and declare redundant chunk about 16 times than unimodal baseline Rabin CDC, 5 times than AE CDC, 1.6 times than FAST CDC. Our experimental results comparative analysis reveals that TTTD-P using fast BUZ rolling hash function with bucket indexing on Hadoop Distributed File System (HDFS) provide a comparatively maximum redundancy detection with higher throughput, higher deduplication ratio, lesser computation time and very low hash values comparison time as being best data deduplication for distributed big data storage systems.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of a SAC-OCDMA FSO network","authors":"U. Bhanja, A. Khuntia, A. Swati","doi":"10.1109/ISPCC.2017.8269580","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269580","url":null,"abstract":"With the emerging of advanced technologies in the global market, now-a-days optical networks are the most ideal medium for high bandwidth communication. Optical wireless networks predicated on free space optics (FSO) technology must be designed to combat changes in the atmosphere, which can affect FSO system performance capacity. FSO is a security module due to Line of sight operation and does not require any system security upgradations. However, FSO requires secured communication for longer distance. FSO has been used in different ways to provide fast communication connectivity in inaccessible areas. Various methodologies are introduced to enhance FSO performance in terms of security that leads to the development of the secured FSO system. Optical code division multiple access (OCDMA) is becoming more popular in the field of optical communication, due to asynchronous transmission, flexibility, security and scalability. The major advantage of OCDMA is its efficient use of spectrum as well as the multiuser communication capabilities. OCDMA requires spectral amplitude coding (SAC) to minimize the impact of multiuser interference and also suppress the effect of phase induced intensity noise (PIIN) with fixed in phase cross-correlation. In this work, SAC-OCDMA over FSO communication design is proposed. In this paper, SAC-OCDMA FSO communication system is evaluated at 10 Gbps using Modified random diagonal (MRD) code that possesses better auto correlation, minimum cross correlation and high cardinality. The proposed SAC-OCDMA MRD is compared with the existing Multi-diagonal (MD) and Random diagonal (RD) codes under different weather conditions. The simulation results signify that optical system based on MRD code is better than MD and RD codes in terms of bit error rate (BER). The simulation results are validated using Optisystem version 14.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on various authentication scheme over cloud computing","authors":"M. Kaur, Amit Verma, Iqbaldeep Kaur, Dolly Sharma","doi":"10.1109/ISPCC.2017.8269650","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269650","url":null,"abstract":"Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}