{"title":"Privacy-Preserving Routing for Wireless Network using OPERA","authors":"S. Pavithra, V. Sivakumar, S. Tamilarasi","doi":"10.1109/ICCSP.2019.8697920","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697920","url":null,"abstract":"In wireless network, a routing protocol named privacy-preserving is used which is used to cover-up the actual communication-pair by utilizing the additional traffic. The introduction of dummy traffic is done heuristically that it cannot assure to the latency, transmission cost, etc., in the network topology are optimized. Here, the task is to develop a novel based approach called Optimal Privacy-Preserving Enhancing Routing Algorithm (OPERA) for privacy-preserving and examines the privacy utility problem for wireless networks. In order to implement privacy, we use the statistical decision-making framework called as OPERA. We will use the Bayesian Maximum-a-Posteriori (MAP) which considers the both loosy and looseless observations. We will be solving the privacy-utility tradeoff problem, that can be efficiently solved as a linear program. The simulation that uses OPERA algorithm reduces the probability of adversary detection for up to 5 times compared to baseline schema. OPERA can also perform the theoretic, conventional information and mutual information approach.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Velamakanni Sahithya, Brahmadevara Saivihari, Vellanki Krishna Vamsi, P. S. Reddy, K. Balamurugan
{"title":"GUI based Detection of Unhealthy Leaves using Image Processing Techniques","authors":"Velamakanni Sahithya, Brahmadevara Saivihari, Vellanki Krishna Vamsi, P. S. Reddy, K. Balamurugan","doi":"10.1109/ICCSP.2019.8697946","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697946","url":null,"abstract":"Increasing the agricultural productivity improves the Indian economy. Keeping this as objective, in order to achieve an efficient and smart farming system, identification of unhealthy leaf using image processing techniques is contributed in this paper. For this, ladies finger plant leaves are chosen and examined to find an early stage of various diseases such as yellow mosaic vein, leaf spot, powdery mildew etc. Leaf images are captured, processed, segmented, features extracted, and classified to know if they are healthy or unhealthy. Due to practical limitations in climatic conditions and other terrain regions, noisy image data sets are also created and taken into consideration. K-means clustering is used for segmentation and for classification, SVM and ANN are used. This work uses PCA to reduce the feature set. Results show that, the average accuracy of detection in SVM and ANN are 85% and 97% respectively. Without noise they are observed to be 92% and 98% respectively. This work paves the way to reach complete automation in agricultural industries.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Yasmeen Shahdad, Mudassir Khan, Habeeba Sultana, M. A. Hussain, Syeda Meraj Bilfaqih
{"title":"Routing Protocols for Constraint Devices Internet of Things Network","authors":"Syed Yasmeen Shahdad, Mudassir Khan, Habeeba Sultana, M. A. Hussain, Syeda Meraj Bilfaqih","doi":"10.1109/ICCSP.2019.8697933","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697933","url":null,"abstract":"Internet of Things (IoT) is an uprising innovative technology which is gaining popularity day by day. In an IoT network, devices are connected with each other at anytime anywhere in the world. The communication of devices within an IoT network requires routing protocols so that can easily exchange information among themselves as well as they can access the information that has been collected by different interconnected objects. In addition to this, routing protocols are indispensable for resource constrained environments, Low Power and Lossy Networks (LLNs) in an IoT network so that the information can be exchanged at the cost of relatively low bandwidth. Routing protocols are needed in huge networks environments where enormous data traffic lead to congestions in an IoT network that results in delay, packet loss, and low throughput. This paper focuses on reporting some of the routing protocols meant for data transmission in an IoT environment for both small scale constrained gadgets as well as for large scale devices.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Fuzzy C-Means Clustering based Image Dissection Algorithm for Satellite Images","authors":"P. K. Guru Diderot, N. Vasudevan, K. Sankaran","doi":"10.1109/ICCSP.2019.8698054","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8698054","url":null,"abstract":"In computer vision, segmentation is an imperative process for analyzing an image. The developments in abstraction resolution of satellite cognitive process, the ways of section based image exploration for generating and revolutionize topographical data have become more efficient. In this paper, a very distinctive image segmentation technique using fuzzy c-means clustering algorithm on satellite imagery proposed. The whole work is split into a pair of stages. Initial stage enhanced the image by using Gaussian filter then segmented the image using Fuzzy C-means clustering algorithm. This technique is utilized to diminish the computational cost.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clone Attack Detection using Random Forest and Multi Objective Cuckoo Search Classification","authors":"P. Sherubha, P. Amudhavalli, S. Sasirekha","doi":"10.1109/ICCSP.2019.8698077","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8698077","url":null,"abstract":"Intrusion Detection Systems (IDSs) have played a significant responsibility in recognizing and preventing security attacks in Wireless Sensor Networks (WSNs). Modelling of IDS should be done in WSN to guarantee dependability and security of WSN services. In this work, an approach is designed to detect various kinds of clone attack in WSN. In specific, an Adaptive random Forest based Multi-objective Cuckoo Search algorithm (RF-MOCS) is designed to identify the source of clone attack using KDD cup dataset. The proposed model provides significant performance in terms of accuracy, sensitivity, specificity, F-measure respectively. The proposed design shows better trade off when compared to existing techniques like ANN, Naive bayes, SVM.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision based Vehicle/Pedestrian Detection in Traffic Surveillance System","authors":"S. Suryakala, K. Muthumeenakshi, S. Gladwin","doi":"10.1109/ICCSP.2019.8697954","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697954","url":null,"abstract":"Vehicle detection and counting plays a major role in Intelligent Transportation Systems, which continuously provides the traffic information. This detection process may face many challenges like different climatic conditions and illumination changes. Detection of Pedestrians is a main concern of car manufacturers to have an automated system which must be able to detect the pedestrian in the surrounding of vehicles. There is a performance degradation with increase in occlusion level. This paper presents the Vehicle and Pedestrian Detection by Haar Cascade Classifier and Background Separation method respectively. Haar Cascade classifier is an efficient method for object detection, first proposed by Viola-Jones. Background Separation method uses K-NN algorithm to identify the pedestrians.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Better Throughput in Near Field Communication Built by Ternary QAM using Tanner Tool","authors":"S. S. Ameer Abbas, P. Vishnoo Priyaa, A. Vinitha","doi":"10.1109/ICCSP.2019.8697937","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697937","url":null,"abstract":"This paper presents a high throughput analysis in Near Field Communication (NFC) using Ternary Quadrature Amplitude Modulation in 0.25µm CMOS process using tanner tool. NFC is a wireless communication works on the principal of electromagnetic induction that helps in the data transmission between active device and passive device. In the proposal there is a separate transmitter and receiver module for modulation and demodulation. The transmitter module consists of Ternary demultiplexer, 2:9decoder and Read Only Memory (ROM) for storing the ternary QAM modulated signal in the form of bits that is in phase and quadrature components. In the receiver side Mean Square Error (MSE) algorithm have used for detecting the bits accurately without any error. The receiver module consists of Full Subtractor, Multiplier, Adder and Divider. Ternary QAM appears to increase the efficiency of transmission for radio communication systems by using both amplitude and phase variations. In order to increase the levels and data rates, Ternary Quadrature Amplitude Modulation have used.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116217951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Jacintha, Judy Simon, S. Tamilarasu, R. Thamizhmani, K. Thanga yogesh, J. Nagarajan
{"title":"A Review on Facial Emotion Recognition Techniques","authors":"V. Jacintha, Judy Simon, S. Tamilarasu, R. Thamizhmani, K. Thanga yogesh, J. Nagarajan","doi":"10.1109/ICCSP.2019.8698067","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8698067","url":null,"abstract":"As a major phase skin Recognition, together with elliptical boundary model, is accomplished. Further, facial Feature Identification process is carried out. The next step is to initiate a technique for extorting geometric and anthropometric facial characteristics. At last we train as well as test the classifiers. We accomplished a categorization precision of 58.6% for six types of emotions (bliss, anguish, curiosity, despair, fury, hatred) and mean efficiency of 96.8% for two emotions (bliss and curiosity).The current study utilizes interest points as markers in face images that are damaged by few emotions as well as correlates its location to that of a normal expression. The outputs are viewed in contrast with Paul Ekman’s FACS (Facial Action Coding System) tool to check on the efficacy of the algorithm .The automated identification of face expressions utilizing image template matching method faces various issues pertaining to facial features and recording circumstances. Although this field has reached great heights , choosing of features as well as categorization method for emotion identification , till today remains an unsolved mystery. To suppress feature outliers, the proposed technique comprises of pixel normalization which is used to eliminate intensity offsets backed up using a Min-Max metric in a nearest neighbor classifier. The proposed Min-Max classification technique has an efficiency of 92.85% to 98.57% when checked on JAFFE database. Classification task also done using KNN, SVM and Bagged Tree Classifier.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design of Body Channel Communication Transceiver using Manchester Decoder for High-Speed Applications","authors":"S. Vijayalakshmi, V. Nagarajan","doi":"10.1109/ICCSP.2019.8697971","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697971","url":null,"abstract":"In this work, the microchip is used for Body Channel Communication (BCC) purpose. While comparing to other wireless communication methods, it provides high security with low energy consumption. At different signal frequencies and transmission distances, the BCC time domain characteristics are measured at an analog front end printed circuit board. Here the human body skin is used for the medium of transmission. For radiated emissions, the microchip has been compiled with the support of Federal Communication Commission part 15-B. Generally, the analog front end is used mainly for low power consumption, to increase the reliability, to increase the speed of operation and to reduce the board space. To reduce the power, cost and size, the high and low-speed data converters are used in a single device. In the proposed design the Manchester encoder is used at the transmitter part which sends the data to human body channel directly. AFE PCB is used at the receiver part to amplify the received signals. The BCC transceiver system is implemented in a Xilinx14.5 which is used for creation and study of the devices.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134514548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self Configurations, Optimization and Protection Scenarios with wireless sensor networks in IIoT","authors":"S. A. Abbas, K. Priya","doi":"10.1109/ICCSP.2019.8697973","DOIUrl":"https://doi.org/10.1109/ICCSP.2019.8697973","url":null,"abstract":"Today’s Industrial Automation process requires more number of devices and sensor/actuators are communicating each other. It leads into more diversity. In this situation, the controlling part of the connected sensor devices and communication devices are a crucial one. The main purpose of the work is to reduce the latency problem and congestion. Hence, our focus is to design a smart sensor controller that provides reliable data transmission between process controller and sensor node by using Critical Communication and Massive IoT. In our paper, the data transfer is done by using various technology protocols, such as Bluetooth, Wi-Fi, GSM and Zigbee. The smart sensor element with the characteristics of SCOP (self-configuration, self-optimization and self- protection) is synthesized and implemented in FPGA Spartan 6 along link with ATMEGA328 microcontroller for exchange of protocols. It develops an analysis framework for IIoT that can be used to enumerate and characterize IIoT devices when studying system architectures.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}