{"title":"A smart traffic solution for High Priority Vehicles","authors":"Dheeraj Dang, Jitin Tanwar, S. Masood","doi":"10.1109/NGCT.2015.7375162","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375162","url":null,"abstract":"Traffic lights are designed to ensure smooth traffic in the cities. The current traffic system is running same over the past few years. As number of vehicles on the roads is increasing constantly, this system is failing to serve traffic congestion problems especially on the intersections. Due to traffic congestion High Priority Vehicles (HPV) also get stuck in traffic which results delay in their services. HPV like ambulances, fire brigade etc. have to serve various causalities. It is very important for HPV to reach on time. There is a need of system that aims to provide path to HPV to reach as quickly as possible. The proposed work provides priority based approach. It aims at building a user interactive system for HPV in which an HPV driver can send request to the system to which the system responds smartly. Priority of Road Segments (RS) at an intersection is calculated and traffic light turns green for the RS with highest priority. The algorithm is tested on SUMO (Simulation of Urban Mobility) and it has shown positive results by saving more than 50% time in various traffic intensities (low, moderate, high).","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fractal: Impact of feeding techniques on the radiation pattern of modified star triangular fractal","authors":"Annie Gupta, P. Chawla","doi":"10.1109/NGCT.2015.7375157","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375157","url":null,"abstract":"In this article, the latest development in the field of fractal antenna engineering are theoretically as well as structurally reviewed and its future scope is discussed. Fractal has unique property that it can make copies of itself at different scales. The concept of fractal antenna is very old but designing for broadband application is quite new. A novel modified star triangular fractal (MSTF) is proposed in this paper. The antenna utilized a coaxial feeding technique and simultaneously possesses multiband, almost uniform radiation, and low profile. The purpose of this paper is to provide the simulated data on modified star-triangular fractal monopole antenna using HFSS based on different feeding techniques. Here we are comparing two feeding techniques and their respective effects on radiation pattern. By the use of microstrip feeding there is ultra-wide band application and in coaxial feeding generates multiband applications.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124172236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analyses of YCbCr color space and CIELab color space based on DWT and SVD","authors":"Simranjeet Kaur, Rana Gill, Rajneet Kaur","doi":"10.1109/NGCT.2015.7375244","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375244","url":null,"abstract":"Several techniques have been developed for the security of the secret data or information such as steganography, cryptography but among these the digital watermarking technique is the highly securable and imperceptible technique. In this technique, a piece of information known as watermark is hidden in the cover/host image, audio or video for the security purpose. Most of the techniques are generally applied over the RGB color space. But this research paper laid stress on the YCbCr and CIELab color spaces to determine the effective or efficient color space for the embedding and extraction of the watermark with more security with minimum BER. The proposed algorithm for these two color spaces is simple, secure and robust against different attacks.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of hybrid routing protocols against network layer attacks in MANET","authors":"A. Chandra, Sanjeev Thakur","doi":"10.1109/NGCT.2015.7375119","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375119","url":null,"abstract":"This paper simulates and evaluates the performance of zone routing protocol (ZRP), hybrid wireless mesh protocol (HWMP) and adhoc on demand distance vector protocol (AODV) against black hole, gray hole and jellyfish reordering attacks which inversely affect the functionality of protocols. Although for MANET numerous protocols and improvised algorithms has never been tested against each other on numerous network layer attacks. The performance evaluation done has quantitatively represented facts for use of specific routing protocol. For fast and secure transmission of data for network scenario those protocols are used who acquire structural change of network scenario. Mobile nodes are open to security attacks as due to their changing network structure and open communication channel. This paper simulated protocols which are being used recently by mobile devices and based on research of proactive, reactive and hybrid protocols and the behaviour they exhibit in particular node structure against the vulnerabilities which they exhibit.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manu Mehta, Vijay Kumar, Shefali Singh, Ritu Singh, Ankit Singh
{"title":"Spatial and temporal changes of aerosol optical depth in three most populated countries of Asia over the last decade","authors":"Manu Mehta, Vijay Kumar, Shefali Singh, Ritu Singh, Ankit Singh","doi":"10.1109/NGCT.2015.7375174","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375174","url":null,"abstract":"This study considers the seasonal and annual analysis of aerosol optical depth (AOD) in three most populated countries of Asia namely: China, India and Indonesia. These countries are having increasing rates of population, industrialization, transportation etc., due to which aerosol loading in these nations is becoming a subject of great concern. This study is done using data from two satellite sensors i.e. MODIS (Moderate-Resolution Imaging Spectrometer) and MISR (Multi-angle Imaging Spectrometer). Level-3 monthly data sets have been used in the study for last ten years. The present work discusses both annual and seasonal variation of AOD in three most populated countries of Asia i.e. China, India and Indonesia. Seasons referred here are winter (December-February), premonsoon (March-May), monsoon (June-September) and postmonsoon (October-November). Annual and seasonal average aerosol optical depths have been quantified along with the relative AOD variation in the three countries.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed load balancing model for grid computing environment","authors":"J. Patni, M. S. Aswal","doi":"10.1109/NGCT.2015.7375096","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375096","url":null,"abstract":"Workload information management and resource management are two key aspects in grid computing to provide the better services to grid environment users. Grid computing also faced other challenging areas like heterogeneous nature of resources, huge number of computing elements, independency of computing resources, different processing capacities of the nodes, different types of load conditions, overloading of jobs at computing nodes, underutilized of resources, etc. A distributed load balancing algorithm is proposed that can handle any kind of grid structure. The proposed algorithm is divided into two steps: To reduce the time taken for executing the jobs or we can say reduce the response time and communication cost between transferring the jobs from one computing node to another in a grid architecture. In proposed algorithm it is shown that the load will be primarily balanced at local level to reduce the communication cost.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3-level secure Kerberos authentication for Smart Home Systems using IoT","authors":"P. P. Gaikwad, Jyotsna P. Gabhane, S. Golait","doi":"10.1109/NGCT.2015.7375123","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375123","url":null,"abstract":"Uses of Internet-of-Things have been increased almost in all domains. Smart Home System can be made using Internet-of-Things. This paper presents the design and an effective implementation of smart home system using Internet of things. The designed system is very effective and ecofriendly having the advantage of low cost. This system ease out the home automation task and user can easily monitor control home appliances from anywhere and anytime using internet. Embedded system, GPRS module and RF modules are used for making this system. Security has been increased in this system on the server side by using 3 level Kerberos authentication. Hence, the system is now more secure to use than the current smart homes systems. Design of hardware and software is also presented in paper.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cogniton based trust model for B2B e-market","authors":"B. Kumar","doi":"10.1109/NGCT.2015.7375212","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375212","url":null,"abstract":"Trust is one of most important factor for selecting suitable trading partner in B2B e-market. There is no such single element on which trust can be measured it is conceptualized in different levels and methods. In this paper we proposed a cognition based trust model to measure trustworthiness of businesses in B2B e-market. This paper reports on design details of our model and empirical validation carried out to validate our systems.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122698167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing genetic algorithm for web service selection","authors":"Dr. Lalit Purohit, Sandeep Kumar, D. Kshirsagar","doi":"10.1109/NGCT.2015.7375271","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375271","url":null,"abstract":"Many service providers are offering Web services having similar functionality and differing in non-functional aspects. Selection of appropriate web service meeting the functional requirement and satisfying the non-functional (QoS) constraints is an important and difficult task. This process of Web services selection also determines the performance of Web service based system. Similarly, for execution of composite Web-service, the Web service selection process becomes the dominant factor for determining system performance. In this paper, the usage of genetic algorithm for the Web service selection approach is analyzed.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117094019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gis based model for monitoring and predition of landslide susceptibility","authors":"Poonam Kainthura, Vibhuti Singh, Shiva Gupta","doi":"10.1109/NGCT.2015.7375188","DOIUrl":"https://doi.org/10.1109/NGCT.2015.7375188","url":null,"abstract":"Landslide disasters tend to occur suddenly at any point in time and causes huge damages to human life and resources. Constant monitoring of mountainous regions and an efficient prediction system is a necessity for saving many lives. Uttarkashi district of the Uttarakhand state has been chosen as the region of study as the place tends to receive frequent landslides. Past data of landslides and its causes has been collected and a model for analyzing and predicting landslide susceptibility is been proposed. Dynamic maps are created with the use of QGIS(open source) software. Real time data of rainfall levels must be captured by the sensors installed at the locations. The system has been trained to predict future possibility of any occurrence of landslide by applying machine learning techniques. K-means clustering algorithm is used for creating clusters defining different rainfall levels and ID3 decision tree learning classification is applied to predict alert level in a susceptible area. Alerts are generated on appearance of any risks. System administrators are able to view alerts in the map and perform other related queries.","PeriodicalId":216294,"journal":{"name":"2015 1st International Conference on Next Generation Computing Technologies (NGCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}