{"title":"Security protocol for distributed networks using formal method specification","authors":"Arun Nandewal, D. Mahendra, K. Chandrasekaran","doi":"10.1109/ICACCS.2016.7586320","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586320","url":null,"abstract":"Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from dean - research JL innovations","authors":"G. Karuppusami","doi":"10.1109/ICACCS.2016.7586293","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586293","url":null,"abstract":"The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software-defined networking: Reconfigurable network systems in LAN topology","authors":"N. Praveen, K. Kumar","doi":"10.1109/ICACCS.2016.7586370","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586370","url":null,"abstract":"An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul
{"title":"Wireless energy management and analysis system(WEMAS)","authors":"Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul","doi":"10.1109/ICACCS.2016.7586401","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586401","url":null,"abstract":"Wireless energy management and analysis is an embedded system implemented for smart metering. In Country like India energy management is done mostly with door-to-door billing system or User have to pay online at only Gram-Panchayat or municipality where authorized person will do payment procedure for User and take the amount. Here pre-Paid scheme is implemented for the user-end. User will get the electricity equivalent to balance in his account. All the activity done by the server implemented over here and some illegal activity at the user-end like stealing of electricity, meter-box's lock broken can be determined etc. Online recharge also can be done as per your need. For security purpose 3AES encryption algorithm is implemented on TCP/IP as well as Xbee communication. 3AES is mixture of AES and 3DES algorithm used in networking for encryption of data.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on Fibonacci series generation algorithms","authors":"S. M. Farooq, S. H. Shabbeer Basha","doi":"10.1109/ICACCS.2016.7586379","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586379","url":null,"abstract":"many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of thickness and roughness using gwyddion","authors":"S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M","doi":"10.1109/ICACCS.2016.7586314","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586314","url":null,"abstract":"The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive fault identification scheme for DC microgrid using event based classification","authors":"S. S. Balasreedharan, S. Thangavel","doi":"10.1109/ICACCS.2016.7586390","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586390","url":null,"abstract":"The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance enhancement via efficient buffer and cache utilization in Uplink Control Path for LTE","authors":"P. Srivastava, Raghav Dogra, Ajay Sharma","doi":"10.1109/ICACCS.2016.7586337","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586337","url":null,"abstract":"Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of an efficient cascaded inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586342","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586342","url":null,"abstract":"Multilevel inverter is a very popular converter in many areas including renewable energy integration, HVDC systems, FACTS devices, industrial drives and numerous other power system and power electronic applications. It has many advantages like low power loss, lesser harmonics, low electromagnetic interference, reduced stress on switches etc. Many configurations have been developed over the last few decades like the neutral clamped inverter, flying capacitor inverter, advanced H bridge inverter etc. New configurations capable of reducing the number of switches and increasing the efficiency of inverter are always welcome. This paper considers an efficient topology with reduced number of switches and evaluates harmonic limiting capability. The control used is sinusoidal pulse width modulation. Simulation platform is MATLAB-Simulink. Total harmonics distortion (THD) values are calculated to find out the harmonic limiting capability.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on incremental and iterative models in big data mining environment","authors":"Priyanka Joseph, J. C. Pamila","doi":"10.1109/ICACCS.2016.7586377","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586377","url":null,"abstract":"It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}