{"title":"Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network","authors":"Manpreet Kaur, Amarvir Singh","doi":"10.1109/ICMETE.2016.117","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.117","url":null,"abstract":"Wireless Sensor Network (WSN) is an emerging technology due to its wide range of applications in public and military area. These sensor networks consisting of thousands of diminutive sensor nodes with limited resources with a base station and low cost, low power sensor nodes that are used for the monitoring purpose. As these sensor nodes are small in size and large in number therefore these networks are easily prone to attack. There can be many possible attacks on sensor network like sinkhole attack, balckhole attack, DOS attack, jamming. Sinkhole attack is among the most destructive routing attack. The issue related to the sinkhole attack is the subverted node or the malicious node advertises the attractive routing information and forces the nodes to route the data towards it and creates a sphere of influence. Therefore sinkhole attack is the kind of attack which degrades the performance of the network. The aim of this paper is to analyze and detect the sinkhole attack in wireless sensor network and to propose the technique to remove this attack to secure the network.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Optimal PID[FOPID] Controller for Linear System","authors":"Rinki Maurya, M. Bhandari","doi":"10.1109/ICMETE.2016.45","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.45","url":null,"abstract":"This article propose a hybrid fractional order PIDcontroller which is optimized with classical proportional integralderivative controller (PID) gives an exquisite response. Here thetwo tuning method are used to evaluate the parameters of PIDcontroller, first one is Ziegler-Nichols and other one is Astrom-Hagglund method. The parameters of FO-PID controller in useas the proportional constant, integral constant are by Ziegler-Nichols and derivative constant by Astrom-Hagglund method. In order to obtain required solutions, two non-linear equationsare derived to find the fractional order of the integral term andderivative term The step response shows the benefits of abovediscussed hybrid fractional order PID controller when comparingwith existing controller. Simulated results are carried by matlab2012(a).","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123164717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Design to Obtain Fault Tolerant Majority Gate for Five Input Majority Gate by Quantum Cellular Automata","authors":"Dhrubajyoti Bhowmik, Apu Saha, P. Dutta","doi":"10.1109/ICMETE.2016.114","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.114","url":null,"abstract":"Quantum-dot Cellular Automata (QCA) is a standout amongst the most alluring advances for figuring at nanoscale. The rule component in Quantum Cellular Automata is a majority gate. In this paper, fault-tolerance properties of the 5 input majority gate is studied. This segment is appropriate for outlining fault-tolerant Quantum Cellular Automata circuits. We examine fault-tolerance properties of three-input majority gate in terms of misalignment, missing, and dislocation cells. In order to authenticate the functionality of the suggested element some physical verifications using kink energy and computer simulations using QCA Designer tool are performed. Our outcomes plainly demonstrate that the excess variant of the majority gate is stronger than the standard style for this gate.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123224408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MPPT Using Soft Computing Technique with MLI in Photovoltaic System","authors":"P. Yadav, A. Bhargava, Monika Sharma","doi":"10.1109/ICMETE.2016.70","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.70","url":null,"abstract":"As energy demand is increasing rapidly, our deployment must be tending towards Renewable Energy Sources (RES), in order to meet the demand. Photovoltaic (PV) is one of the most focused RES due to plenty than other sources. Before serving to the load, the generated power by solar array is treated electronically and this process is called 'power conditioning'. In power conditioning, two major functions are frequently discussed i.e. DC-AC conversion and maximum power point tracking (MPPT). In order to supply the maximum power to the load, it is desired to operate the solar array at its maximum power point (MPP). Maximum Power Point Tracker automatically and electronically matches the load with the array. There are various techniques to determine the maximum power point. In this paper, one soft computing technique is discussed for this purpose i.e. Fuzzy Logic. With the fuzzy logic based control technique, the duty cycle of the boost converter is controlled in order to obtain the maximum power from PV array. Fuzzy logic controller (FLC) based MPPT system is implemented to the grid through multilevel inverter (MLI).","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Cryptographic Algorithm for Securing Biometric Template Using AES and Scrambling the Pixels of Row and Column","authors":"M. Lakhera, M. Rauthan, Amit Agarwal","doi":"10.1109/ICMETE.2016.112","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.112","url":null,"abstract":"Ciphering is a main technique to secure the confidentiality of Biometric data at that time when biometric template is send to source to destination via non secure channel. Nowadays biometric is used for providing the better verification system in different field so it is essential to secure the biometric data from illegal access. Proposed paper, we using an AES as a cryptographic algorithm with scrambling the pixels of biometric template using basic principle of Rubki's Cube Algorithm.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Satellite Image Enhancement using Discrete Wavelet Transform, Singular Value Decomposition and its Noise Performance Analysis","authors":"Aditi Sharma, A. Khunteta","doi":"10.1109/ICMETE.2016.32","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.32","url":null,"abstract":"This paper introduce a new concept of satellite image resolution and contrast enhancement technique when the image is suffered from the noise and filtering it by various types of filters then the image is processed by discrete wavelet transform (DWT) and singular value decomposition (SVD) to get new modified contrast and resolution enhanced image. Satellite images are used in many applications such as geosciences studies, astronomy, and geographical information systems. Two most important quality factors of images are contrast and resolution, here this technique decomposes the input filtered image into the four frequency sub-bands by using DWT and then the high frequency subband images and input image have been interpolated along with this the technique also estimates the singular value matrix of the low–low sub band of histogram equalized image and input filtered image then normalize both singular value matrices to obtain brightness enhanced image. In, order to get the new image of better contrast and resolution all these subbands are combined using inverse DWT. The following procedure is done with different types of noises and different types of filters then they are compared with conventional image equalization techniques such as general histogram equalization (GHE), local histogram equalization (LHE) and also from state-of-the-art technique which is singular value equalization (SVE) and Discrete Wavelet Transform (DWT) and the experimental results show the supremacy of the proposed method over conventional and state-of-art techniques.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification and Mitigation of Black Hole Attack in Wireless Sensor Networks","authors":"Harpreet Kaur, Amarvir Singh","doi":"10.1109/ICMETE.2016.66","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.66","url":null,"abstract":"Wireless sensor networks are made up of many inexpensive nodes geographically distributed over a certain area where the sensor node components include sensors, actuators, processing unit and storage, location tracking and power supply unit. These types of networks have large range of applications that include environmental pollution, vehicle and building safety etc. In sensor networks, the nodes are tiny in size, cheap and light weighted with narrow computing capability and often deployed in inaccessible areas where securing these kinds of networks usually leads towards the complexity. This issue of complexity made sensor networks more prone to the diverse security attacks, in which black hole attack or packet drop attack which is quite common and harmful attack that affects the network layer. In black hole attack the adversary controls the sensor node and drops the entire set of packets that are forwarded to it. In this research, the technique of knowledge based learning is used for detection and mitigation of those harmful nodes from the network responsible for activating the attack. For simulation, network simulator NS2 is used under Ubuntu 12.0.4 OS.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121562410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 3.5mW Non-coherent UWB Impulse Radio Receiver in 180nm CMOS","authors":"V. S. Harsha, G. Mahalakshmi","doi":"10.1109/ICMETE.2016.74","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.74","url":null,"abstract":"One of the emerging trends in electronics is wireless technology. Ultra-Wide Band (UWB) signaling is widely used for the wireless technology compared to traditional narrow band because of the short pulses used in communication. In this paper, an impulse radio based noncoherent UWB receiver has been designed. The receiver is designed for lower band of UWB which is from 3-5GHz suitable for low power and low cost applications. In order to achieve low power, the low noise amplifier (LNA) is designed using current reuse technique and also a low power squarer, integrator and comparator is designed. The simulated result ensures that, the proposed receiver is recovering the digital information from the RF signal. The calculated receiver sensitivity is around -94dBm with the consideration of 3dB noise figure (NF) of LNA and 10MHz of baseband (BB) signal bandwidth. The receiver is implemented in 180nm CMOS and it is consuming 3.5mW from 1V supply.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling to Minimize Context Switches for Reduced Power Consumption and Delay in the Cloud","authors":"Jincy Joseph, K. R. R. Babu","doi":"10.1109/ICMETE.2016.106","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.106","url":null,"abstract":"Cloud computing is an emerging technology to increase the efficient utilization of huge collection of high-end resources at low cost. One of the major problems associated with cloud environment is that these high-end systems need huge power consumption. Several methods are proposed and available for reducing the power consumption in datacenters. But most of these methods do not meet the Quality of Service (QoS) requirements such as minimum delay during packet transfer with reduced power consumption. Data center contains many physical machines each of which can be virtualized into several virtual machines (VM) according to the needs. Virtualization technique virtualizes the physical resources for satisfying the user requests. Proposed system considers power consumption and delay during packet transfer in a single physical machine. Two schedulers work concurrently to schedule both Virtual Machines and processes. A new scheduling algorithm is implemented for both VM Scheduling and process scheduling based on the buffer size of the port. Proposed algorithm tries to reduce the waiting time as well as the number of context switches. By reducing the waiting time and context switches, system can reduce delay and power consumption during the packet transfer between VMs.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Speech Signals Using Excitation Source Information","authors":"Shreya R. Garipalli, B. Sathe-Pathak, A. Panat","doi":"10.1109/ICMETE.2016.12","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.12","url":null,"abstract":"Speech is output of the time varying vocal tractsystem excited with the time varying excitation. Speech isproduced due to the impulse like excitation in each glottal cycle. During the production of speech, the instant of significantexcitation of the vocal tract system is referred to as epoch. In caseof voiced speech, most significant excitation takes place at theinstants of glottal closure i.e. glottal closure instants can bereferred as instants of significant excitation. Speech laugh is asignal produced when laughter occurs with neutral speech. Thespeech-laugh signal occurs frequently in natural conversationwith people. The features of speech-laugh, laughter and singingvoice deviates from the features of neutral speech. In this paper, we discriminate laughter, speech-laugh and neutral speech anddiscriminate singing voice and speech by obtaining epochlocations and extracting new features from these epochs. Themethod used here for the extraction of epochs is the ModifiedZero Frequency Filtering method. The features extracted fromepochs for the discrimination are fundamental frequency(f0) andslope of f0(α) at epoch locations and number of epochs (k) andstrength of excitation (β).","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}