{"title":"On the Performance Improvement of IoT Networks Using Relay-Based Communications","authors":"Masoud Shokrnezhad, S. Khorsandi","doi":"10.1109/ICIT.2016.017","DOIUrl":"https://doi.org/10.1109/ICIT.2016.017","url":null,"abstract":"Internet of Things (IoT) is a network of disparate objects enabled to exchange data with other objects to implement smart applications. In near future, billions of devices are expected to be connected to IoT through wireless connections. Due to the limited capacity of the wireless medium, the effective resource allocation is a highly important factor to improve the network performance, especially in the presence of a large number of devices. In this work, we investigate the problem of allocating resources in an OFDMA-based wireless IoT network, including channel assignment and power control, to satisfy the SINR requirements of all the devices in a scalable manner. The Primary Resource Allocation Problem (PRAP) is formulated as a Mixed-Integer Linear Programming (MILP) problem which is efficiently solvable by mathematical methods. We next develop a new relay-based communication model that results in a significantly improved network performance. The resource allocation in this model is formulated as the Relay-based Resource Allocation Problem (RRAP). Due to their computational complexity, the Relay-based Resource Allocation Scheme (RRAS) is devised to provide a suboptimal solution for RRAP and PRAP. The numerical results show that the relay-based communication model results in highly improved SINR for devices, network outage ratio, and transmission power.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"95 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Time Series Data with Apriori Tid Algorithm","authors":"H. Sarma, Swapnil Mishra","doi":"10.1109/ICIT.2016.043","DOIUrl":"https://doi.org/10.1109/ICIT.2016.043","url":null,"abstract":"Analysis of time series data is important. Association rule mining algorithms like Apriori Tid can be implemented over time series to find out the frequent item sets. In this paper, a modified version of Apriori Tid is proposed. Both the association rule mining algorithms Apriori Tid and modified Apriori Tid are implemented over time series data. Rainfall data related to North Eastern India has been considered as the time series. The performances of both the algorithms in terms of computation time requirements for generating frequent item sets are analysed. Future scope of the work is also outlined.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Introduction to QR Code Technology","authors":"S. Tiwari","doi":"10.1109/ICIT.2016.021","DOIUrl":"https://doi.org/10.1109/ICIT.2016.021","url":null,"abstract":"QR i.e. \"Quick Response\" code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must store large amount of data as compared to 1D barcodes and it must be decoded at high speed using any handheld device like phones. QR code provides high data storage capacity, fast scanning, omnidirectional readability, and many other advantages including, error-correction (so that damaged code can also be read successfully) and different type of versions. Different varieties of QR code symbols like logo QR code, encrypted QR code, iQR Code are also available so that user can choose among them according to their need. Now these days, a QR code is applied in different application streams related to marketing, security, academics etc. and gain popularity at a really high pace. Day by day more people are getting aware of this technology and use it accordingly. The popularity of QR code grows rapidly with the growth of smartphone users and thus the QR code is rapidly arriving at high levels of acceptance worldwide.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative Information Security Risk Assessment Model for University Computing Environment","authors":"Chanchala Joshi, U. Singh","doi":"10.1109/ICIT.2016.026","DOIUrl":"https://doi.org/10.1109/ICIT.2016.026","url":null,"abstract":"Today's universities are on the forefront of technological advancement which makes University's computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University's network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the risk of security breach by supporting three phase activities, the first phase assesses the threats and vulnerabilities in order to identify the weak point in educational environment, the second phase focuses on the highest risk and create actionable remediation plan, the third phase of risk assessment model recognizes the vulnerability management compliance requirement in order to improve University's security position. The proposed framework is applied on Vikram University Ujjain India's, computing environment and the evaluation result showed the proposed framework enhances the security level of University campus network. This model can be used by risk analyst and security manager of University to perform reliable and repeatable risk analysis in realistic and affordable manner.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critique of Some Fine-Grained Access Control Models in Cloud Computing Environment","authors":"K. Dhal, P. Pattnaik, S. C. Rai","doi":"10.1109/ICIT.2016.050","DOIUrl":"https://doi.org/10.1109/ICIT.2016.050","url":null,"abstract":"Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data security is an area of concern. In general the cloud servers are being deployed on different trusted domain by different data owner. There will be need to encrypt sensitive data and store them in cloud server and disclose decryption key to authorized users. But drawback of this method is that owner of file can selectively share data by sharing his private key. Most of the computation for key distribution and management are done by the data owner. T here are various fine-grained access control models for sharing of encrypted data on cloud server. Some of these model used key policy Attribute Based Encryption (KP-ABE) and others used Cipher text Policy Attribute Based Encryption (CP-ABE). These techniques can be used to keep shared data confidential even if data is stored on remote server. These models are used to define and enforcing access control policy based on attributes and delegates most of the computation task involved in fine grained access control without disclosing data to storage server. This paper under takes critical study on available access control approaches that has been deployed in cloud computing environment.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicast Routing and Spectrum Assignment in Flexible-Grid Optical Networks Based on Light-Tree Sharing Approach","authors":"P. Choudhury, R. S. Chauhan, P. Sudheer, T. De","doi":"10.1109/ICIT.2016.045","DOIUrl":"https://doi.org/10.1109/ICIT.2016.045","url":null,"abstract":"Studies on Flexible-Grid technology reveals that it provides desirable solution for next generation high-speed network design. Multicast Routing and Spectrum assignment (MRSA) in Flexible-Grid Optical Networks (alternately Elastic Optical Networks) generates a multicast tree for each multicast session request and spectrum frequency slots are allocated to each of the edge of the multicast tree. Orthogonal Frequency Division Multiplexing (OFDM) technique can be used to implement MRSA algorithm. Spectrum frequency slots are allocated to the edges of the multicast tree obeying the spectrum continuity constraint and spectrum contiguity constraint, thus creating a multicast light-tree. In this paper we have proposed a lighttreesharing based multicast routing and spectrum assignment technique. Similar multicast requests are grouped together and their bandwidth requirements are added up. For each multicast session request a layered auxiliary graph is selected based on available spectrum in the network and the request's bandwidth demand. An efficient light-tree is generated from this auxiliary graph, first for the clubbed request and then for the individual requests separately. The simulation results show that our proposed algorithm significantly reduce the average tree size and increases number of requests satisfied than the well-known existing algorithm mentioned in literature. Incidentally the average number of splitters required is also reduced.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pitch Angle Control for Variable Speed Wind Turbine Using Fuzzy Logic","authors":"Satyabrata Sahoo, B. Subudhi, G. Panda","doi":"10.1109/ICIT.2016.019","DOIUrl":"https://doi.org/10.1109/ICIT.2016.019","url":null,"abstract":"Pitch angle control system is one of the most diversified and popularly used control techniques to regulate the output power and speed of a wind turbine, when wind speed is above the rated speed. Usually PI controller is used for pitch angle control. But in this paper Proportional-Integral-Derivative (PID) and Fuzzy Logic Control (FLC) methods are used. As our system contains strong non-linearity, fuzzy logic control has the potential to resolve the non-linearity issue. The control objective is by controlling pitch angle and generator torque, generator power regulation is optimized and torsional torque fluctuation of drive train is minimized. The MATLAB-SIMULINK models have been developed for simulation of the control schemes. The simulation results show that the FLC can achieve better control performances than conventional pitch angle control strategies.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Robust Compression Technique Using LZ77 Algorithm on Tensilica's Xtensa Processor","authors":"D. Vasanthi, R. Anusha, B. Vinay","doi":"10.1109/ICIT.2016.041","DOIUrl":"https://doi.org/10.1109/ICIT.2016.041","url":null,"abstract":"SSD Technology is used to read/write data to the external device with high speed and low power. A lossless LZ77 data compression technique is used here in order to retain the information content by removing data redundancy and also employs a text window in congestion with look-ahead buffer to serve as a dictionary. In the proposed technique the unmatched string present in the dictionary are encoded as a length and offset. Encoding and decoding process in data compression enables SSD's, so that the data written is less in turn yields the endurance of SSD performance. Eventually using novel method, pointers are effectively selected and encoded for the longest matched string to obtain greater compression. For the unmatched character compression ratio is 3.12times which is better than existing algorithm. Data compression improves the performance of SSD, hence this reduces the amount of data transfer to flash memory. The speed of secure data compression increases with a creation of preferred search function for a HEX sample data size 32Kbyte. Even though if extra time is acquired, asymmetric compression decompresses the data quickly resulting in good compression.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rupanjali D. Baruah, Sudipta Roy, R. M. Bhagat, L. N. Sethi
{"title":"Use of Data Mining Technique for Prediction of Tea Yield in the Face of Climate Change of Assam, India","authors":"Rupanjali D. Baruah, Sudipta Roy, R. M. Bhagat, L. N. Sethi","doi":"10.1109/ICIT.2016.060","DOIUrl":"https://doi.org/10.1109/ICIT.2016.060","url":null,"abstract":"Data mining is an emerging field of research in Information Technology as well as in agriculture. The present study focus on the applications of data mining techniques in tea plantations in the face of climatic change to help the farmer in taking decision for farming and achieving the expected economic return. This paper presents an analysis using data mining techniques for estimating the future yield prediction in tea cultivation with climatic change trends observed in last 30 years (1977-2006). The patterns of crop production in response to the climatic (rainfall, temperature, relative humidity, evaporation and sunshine) effect across the four tea growing regions (South Bank, North Bank, Upper Assam and Cachar) of Assam were developed using Multiple Linear Regression (MLR) technique. The tea production estimation equations developed for the regions were validated for the future yield prediction (2007, 2009 and 2010) and were found to be significant. Thus it is suggested that the planters/farmers could use the technique to predict the future crop productivity and consequently adopt alternative adaptive measures to maximize yield if the predictions fall below expectations and commercial viability.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Preserving Numerical Ordering in Encrypted Data","authors":"B. Venugopal, Greeshma Sarath","doi":"10.1109/ICIT.2016.025","DOIUrl":"https://doi.org/10.1109/ICIT.2016.025","url":null,"abstract":"Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire data should be decrypted to perform it, unless an order preserving scheme is used. There is no homomorphic encryption scheme which will allow us to perform conditional based queries without decrypting the entire data. In mathematical term homomorphic describes the changeover of one data set into another upholding the association between elements in both sets. Order Preserving Encryption (OPE) schemes are used extensively used in cryptography because of their usage in database design. But there is a chances of inference attack in case of OPE. In this paper we had proposed and implemented a technique which will allow to perform conditional based search queries in the data encrypted using any encryption algorithm with log(n) decryption, thereby reducing complexity.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}