{"title":"Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds","authors":"Jayant Mankar, P. Malviya","doi":"10.1109/ICCSP.2014.6950009","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950009","url":null,"abstract":"To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A technical review on adaptive algorithms for acoustic echo cancellation","authors":"Abhishek Deb, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949795","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949795","url":null,"abstract":"Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET","authors":"T. Stephen John, A. Aranganathan","doi":"10.1109/ICCSP.2014.6950182","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950182","url":null,"abstract":"Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Energy aware reputation based leader election for IDS in MANET","authors":"Santoshkumar Sabat, Sujata V. Kadam","doi":"10.1109/ICCSP.2014.6949972","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949972","url":null,"abstract":"we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of windowing techniques in minimizing side lobes in an antenna array","authors":"Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth","doi":"10.1109/ICCSP.2014.6950075","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950075","url":null,"abstract":"Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}