{"title":"Expositioning of cryptography techniques in IoT domain","authors":"Priyanka Jangra, Monish Gupta","doi":"10.1109/ISPCC.2017.8269714","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269714","url":null,"abstract":"Internet of Things (IoT) has drawn attention recently as a means of connecting the proliferating embedded devices to the Internet. IoT devices are forecast to grow to 33 billion by 2035. These devices include sensing devices, security cameras, mobile phones, and home automation/control devices. Alike WSN, IoT seems to be developed at much larger scale and ma have much more wider applications. To deploy such architectures there is a sturdy requirement of understanding various techniques being used widely by the proposed schemes. Thus, this paper works over to define and give a new direction to identify the right technique for the IoT architectures in terms of cryptography.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge detection of Malaria parasites using ant colony optimization","authors":"Damandeep Kaur, G. K. Walia","doi":"10.1109/ISPCC.2017.8269721","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269721","url":null,"abstract":"Ant colony optimization (ACO) is algorithm used for optimization motivated by the natural behaviour of species of ants. In this ants retain pheromone for foraging at the ground. ACO has been originated to detect the edges of microscopic images of blood samples which are affected by malaria disease. The edge detection approach of ACO is used to maintain pheromone matrix which determines the information of edges provided at every image pixel position, based on no. of ants movement that are dispatched to be in motion on the image. Thus, changes in the intensity values of images determine the movement of the ants. The results have been taken to study an approach for Ant Colony Edge Detection method.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"43 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boosting anonymity in wireless sensor networks","authors":"Vicky Kumar, Ashok Kumar, Manjeet Singh","doi":"10.1109/ISPCC.2017.8269701","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269701","url":null,"abstract":"The base station (BS) is the main device in a wireless sensor network (WSN) and used to collect data from all the sensor nodes. The information of the whole network is stored in the BS and hence it is always targeted by the adversaries who want to interrupt the operation of the network. The nodes transmit their data to the BS using multi-hop technique and hence form an eminent traffic pattern that can be easily observed by a remote adversary. The presented research aims to increase the anonymity of the BS. The proposed scheme uses a mobile BS and ring nodes to complete the above mentioned objective. The simulation results show that the proposed scheme has superior outcomes as compared to the existing techniques.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model order reduction and approximation analysis for control system design","authors":"Mohit Garg","doi":"10.1109/ISPCC.2017.8269725","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269725","url":null,"abstract":"Dynamic systems are mostly complex, time-varying and of higher order. This paper presents model order reduction scheme used for the order reduction of complex, higher order dynamic systems. The proposed scheme for reduction of higher order system transfer function is based on modified-pole clustering and coefficient matching technique. The efforts has been made in this paper to decrease the order of the given transfer function and essentially preserving all the useful characteristics of the original transfer function using the proposed scheme. Some other techniques used for the reduction of model dimension are also described and analyzed. An example has been included to illustrate the proposed method of model order reduction for analysis and control of a dynamic system. The present method is compared with other order reduction method and concluding remarks are presented.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyotsna Dogra, M. Sood, Shruti Jain, Navdeep Parashar
{"title":"Segmentation of magnetic resonance images of brain using thresholding techniques","authors":"Jyotsna Dogra, M. Sood, Shruti Jain, Navdeep Parashar","doi":"10.1109/ISPCC.2017.8269695","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269695","url":null,"abstract":"In the recent years, image segmentation has become one of the important technique in several generalpurpose fields where it has been used to extract region of interest from the background. Image segmentation is a classic subject in the field of image processing which has a special focus on image processing techniques. Since, in literature there is no general solution to the image segmentation problem, various techniques have been employed to effectively solve these problems combined with the domain knowledge. A lot of brainstorming has been done to come up with an optimal technique to make images smooth and easy to evaluate. Among various image segmentation techniques, thresholding is one of the simplest techniques that has been used for image segmentation where the region of interest has been extracted from the background by comparing the pixel values with the threshold value. To obtain the threshold value histogram of the image has been calculated. The results shows that any abnormality can be localized easily in horizontal divided MRI brain image rather than in vertical divided MRI image.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arrival based deadline aware job scheduling algorithm in cloud","authors":"R. Kumar, Swati Gupta","doi":"10.1109/ISPCC.2017.8269671","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269671","url":null,"abstract":"This study designed a scheduling algorithm for Cloud Computing Environment by taking values of different parameters from a file provided by a user which gives the details of different cloudlets to be made. The cloudlets are assigned to different hosts according to the Shortest Deadline First combined with First Come First Serve where the Cloudlets are being submitted at different arrival times. The deadline provided by user is used to determine whether the Cloudlet is able to finish execution in the prescribed time interval or not. This implementation increased the number of jobs that finished executing in a particular time interval, thereby minimising the number of cloudlets that missed the deadline as compared to the Datacenter Broker scheduler which implements First Come First Serve. The characteristics remained fixed whether its for DataCenter Broker Scheduler or the Arrival based Deadline First Scheduler except the number of Cloudlets were increased gradually and the results were compared. The results show that the First Come First Serve Scheduler misses more Cloudlets from deadline as compared to ADSF Scheduler. All the cloudlets arrived at different time and were scheduled and submitted according to that time and not simultaneously which resulted in more efficient results. The results show that the Total De-layed Cloudlets have a huge difference for both the algorithms. Although, the waiting time is some what same.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Reddy, K. Akshay, R. Giridhar, S. Karan, N. Mohankumar
{"title":"BHARKS: Built-in hardware authentication using random key sequence","authors":"D. Reddy, K. Akshay, R. Giridhar, S. Karan, N. Mohankumar","doi":"10.1109/ISPCC.2017.8269675","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269675","url":null,"abstract":"In today's world, as the demand for IC production grows exponentially, testing and validation of all the manufactured chips becomes impossible. Therefore, in the proposed method, we have developed a technique for embedding unique signatures with minimalistic hardware or area overhead while preserving the intended functionality. To achieve this, three ‘levels’ of security are provided. First, circuit specific information is derived and used for signature generation. Second, the generated signature is hashed, obfuscating the logic reverse engineering process and finally a bit sequence from a Pseudo-Random Number Generator (PRNG) to make it unfeasibly difficult for the attacker to decode the signature.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"30 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vasudev S. Mallan, Syam Gopi, A. Muir, R. R. Bhavani
{"title":"Comparative empirical usability assessment of two HRI input devices for a mobile robot","authors":"Vasudev S. Mallan, Syam Gopi, A. Muir, R. R. Bhavani","doi":"10.1109/ISPCC.2017.8269699","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269699","url":null,"abstract":"It is now possible to control an Unmanned Ground Vehicle (UGV) with a free smartphone app such as ROS Control. Smartphones offer such low cost and easily available human-robot interface (HRI) controlling robots with tilt gestures. However, tilt gestures are not used in the more commonly available UGV control devices, such as joystick and button based gamepads. Tilt gestures have not been studied in terms of their effectiveness for controlling UGVs. If they are effective, then the low cost and high availability of smartphones running apps such as ROS Control can make a huge change in the world of HRI and control devices for UGV for the developing world. They can be ruggedized and are low cost, and more familiar to the general populace — which are factors that can help the adoption of robotics in India. This research explores the ease of use and effectiveness in controlling a UGV by benchmarking a tilt-based HRI (on the ROS Control app) with the more established joystick and button based HRI on a gamepad. A 40-person usability study using both devices in Gazebo, a robotic simulated environment, was conducted. Performance metrics (time on task and lane deviations) were measured, to indicate effectiveness. However, the statistical analysis conducted using Wilcoxon Signed Rank test shows a significant difference in the use of both the input devices in controlling a UGV favoring the gamepad. However, most of the participants report the tilt based app as more controllable and highly usable.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal sizing of standalone small rotor wind and diesel system with energy storage for low speed wind operation","authors":"R. Prajapati, V. Garg","doi":"10.1109/ISPCC.2017.8269719","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269719","url":null,"abstract":"In recent years, standalone systems are becoming economic and substantial for the electrification in remote areas, where grid connectivity is difficult. This paper presents an approach for electrification of shadow regions in Himalayan area, where the solar energy is not sufficient. The method presented uses the wind-diesel hybrid system for generation of electricity to meet the electric power requirements for a cluster of villages. The approach is novel as it uses small rotor wind turbines (SRWT) in the wind-diesel system. The advantages of using SRWT are (i) low cost, (ii) small in size, (iii) low-speed operation, and (iv) affordable for rural communities. The paper discusses the sizing of different system components to find out optimal combination of energy for the selected study while minimizing the cost of energy (COE) generation for required reliability values. The sizing is performed for three different seasonal load profiles. The two reliability values are considered for the selection of optimum solution of year round application. The proposed model provides continuous supply of electricity while minimizing the energy.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114038267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruchika Chawla, Prateek Thakral, Akshay Kumar Kaura, Kapil O. Gupta
{"title":"Modified centralized approach for preventing collision at traffic intersection","authors":"Ruchika Chawla, Prateek Thakral, Akshay Kumar Kaura, Kapil O. Gupta","doi":"10.1109/ISPCC.2017.8269646","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269646","url":null,"abstract":"Traffic control at intersection is a system where conflict resolution between different lanes is required so that vehicles can access the intersection without hitting each other and also which prevents deadlocks. With the emergence of Vehicular Ad Hoc Networks (VANETs), Intelligent Transportation Systems (ITS) has seen emergence of new algorithms for autonomous cars such as collision detection, traffic maneuver & traffic control at intersection. Traffic light based algorithms use complex computational mechanism such as neural network and machine learning which make these algorithms complex to implement and use. The approach which we are going to discuss in this paper is to model the problem as the Vehicle Mutual Exclusion for Intersections (VMEI) which provides centralized solution to this problem. In VMEI approach number of vehicles that can access the intersection in one pass is not at all defined and it is left to the human intervention, we will call it as threshold. In this paper we will provide solution to threshold problem in centralized approach.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128318047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}