{"title":"Development of Survival Path Routing Protocol for Scalable Wireless Sensor Networks","authors":"S. Mishra, Manu Elappila, S. Chinara","doi":"10.1109/ICIT.2018.00051","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00051","url":null,"abstract":"Applications of wireless sensor networks span from the agricultural field to the battlefield and from smart city to smart city health care. There are certain applications where millions of sensor nodes or motes are deployed to sense the environmental parameters. However, in certain applications like health care and smart city applications, few hundreds of nodes can solve the purpose. Routing in energy-constrained networks like WSN is a challenging task. Parameters like consumed energy, congestion and signal to noise ratio etc. are considered to find a routing path in WSN. The Survival Path Routing (SPR) protocol is an earlier version of the work proposed here. The said protocol fails to provide a better result when the number of nodes in the network is increased. Thus a Scalable Survival Path Routing (SSPR) protocol is proposed where the method of clustering is applied to meet the efficiency of a scalable network. Weights of the nodes are computed to choose the cluster heads among them. It is observed that the proposed protocol SSPR outperforms SPR and Directed Diffusion protocol in terms of packet delivery ratio, end to end delay and throughput.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Inspiritaonal tool for Enriching Contemporary Higher Education: Cloud Computing","authors":"R. K. Mallick, H. S. Moharana, Sitakanta Pradhan","doi":"10.1109/ICIT.2018.00060","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00060","url":null,"abstract":"Higher education institutions may be government or private, are under severe budgetary control while realizing their IT infrastructure to develop and provide various services to the students, the parents, the faculty and the members constituting as potential stake holders. There is no doubt that public sector counterparts have been abundantly funded by the government. Still then they strive to optimize their capital and operational expenditure for building up an IT infrastructure. The universities are expected to resort to the Conceptual Cloud Computing model of leasing infrastructure through cloud providers and outsource provisions for cloud service to the stake holders through uses which motivates enhancement of efficiency. The process facilitates a value added knowledge transfer on the progression knowledge base for all stakeholders of the university. The deployment of such information technologies, in educational institutions, requires appropriate and effective management. Many higher educational institutions affiliated to the different universities may not afford this large investment cost of implementing new technologies. The main objective of the proposed work is to analyze and suggest for implementation citing the advantages of this Conceptual Cloud Computing model for educational institutions, and to reveal its potential features which would create an innovative learning environment among all its stake holders.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Debasis Gountia, Ranjita Champati, A. Pradhan, B. Mohanta
{"title":"Towards Security Aspects of Secret Key Transmission","authors":"Debasis Gountia, Ranjita Champati, A. Pradhan, B. Mohanta","doi":"10.1109/ICIT.2018.00023","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00023","url":null,"abstract":"On increasing more unreliable computer networks day by day, technological shifts in the fields of secret key communication for different applications among different parties and security are now converging. This paper is a contribution to the ongoing research in the design of security aspects of a secret key, and important field used to protect the confidentiality of secret key data from the man-in-the-middle-attack. Comparative study with traditional encryption schemes demonstrate the superiority of the proposed scheme without overhead of the encryption and decryption time.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sourav Kumar Bhoi, S. K. Panda, Bivash Patra, B. Pradhan, Priyanka Priyadarshinee, Swaroop Tripathy, C. Mallick, Munesh Singh, P. M. Khilar
{"title":"FallDS-IoT: A Fall Detection System for Elderly Healthcare Based on IoT Data Analytics","authors":"Sourav Kumar Bhoi, S. K. Panda, Bivash Patra, B. Pradhan, Priyanka Priyadarshinee, Swaroop Tripathy, C. Mallick, Munesh Singh, P. M. Khilar","doi":"10.1109/ICIT.2018.00041","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00041","url":null,"abstract":"Fall represents a major health risk for the elderly people. If the situation is not alerted in time then this leads to loss of life or impairment in the elderly, which reduces the quality of life. In this paper, we solve this problem by introducing a Fall Detection System based on Internet of Things (FallDS-IoT) by designing a wearable system to detect the falls of elderly people. We use Accelerometer and Gyroscope sensors to get accurate results of fall detection. We classify the daily activities of elderly people into sleeping, sitting, walking and falling. We use two well-known machine learning algorithms, namely K-Nearest Neighbors (K-NN) algorithm and decision tree to deal with the above work. The resultant accuracies for our generated dataset were 98.75% and 90.59%, respectively. Therefore, we were able to conclude that K-NN gives more accuracy in detecting falls and this method is used for classification. whenever a fall happens, a message informing about the fall will be sent to a registered phone number through a Python module.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129873175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kalyan Srinivas Abburu, Kshirod Kumar Rout, S. Mishra
{"title":"Haptic Display Unit: IoT For Visually Impaired","authors":"Kalyan Srinivas Abburu, Kshirod Kumar Rout, S. Mishra","doi":"10.1109/ICIT.2018.00057","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00057","url":null,"abstract":"In this era of smart world several gadgets have been developed to make our lives easier. Great efforts have been put forth by the scholars worldwide to develop such smart gadgets for the welfare of blind. In case of haptic display units which refresh Braille characters for the visually impaired persons to read by the sense of touch also called as a dynamic Braille display. There have been several advancements evolved in such devices. Every design has both pros and cons. This paper tries to rectify particular cons of the existing Piezoelectric Braille display designs by updating it to the solenoid activated units and to make the haptic display units more reliable by empowering with IoT functionality. The developed prototype works with a 12 V DC supply line and a controller. In future, such proposed display units can be implemented on smart phones and to enhance the lives of differently abled citizen. The presented work can serve as a handy guideline for the fabrication and implementation of Solenoidal Braille systems.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PHVA: A Position Based High Speed Vehicle Detection Algorithm for Detecting High Speed Vehicles using Vehicular Cloud","authors":"R. Nayak, S. Sethi, Sourav Kumar Bhoi","doi":"10.1109/ICIT.2018.00054","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00054","url":null,"abstract":"High speed vehicles or driving by consuming alcohol is one of the main reasons of accidents. So, the number of accidents can be decreased by controlling the vehicles moving at higher speed. In this paper, we proposed a Position Based High Speed Vehicle Detection Algorithm (PHVA) for detecting the higher speed vehicles in a Vehicular Ad Hoc Network (VANET) by using a vehicular cloud server, where the cloud server is used as computing as a service. The proposed algorithm calculates the speed of a vehicle based on the data directly received from the Road Side Units (RSUs). When a vehicle comes under the coverage of an RSU, RSU receives the time, position and other information about the vehicle. RSU then sends the received information to the Cloud Server (CS). Based on the information received from the nearby RSUs, the CS calculates the average speed for that vehicle in a particular lane. The calculated speed is then compared with that of the permitted speed on that lane. If it is greater than the permitted limit, then the CS increments the speed violation counter for that vehicle. Depending upon the frequency of violation and with the help of Certification Authority (CA), appropriate action will be taken on that high speed vehicle. To check the efficiency of our PHVA algorithm, we simulated our work in Vehicles in Network Simulation (Veins) hybrid simulation framework. Veins uses Simulation of Urban Mobility (SUMO) as the road traffic simulator and OMNeT++ as the network simulator. Both simulators are connected via a TCP socket which has been standardized in Traffic Control Interface (TraCI). The results show that our algorithm has better detection accuracy over ReVISE scheme in this environment.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Communication through Double Layer Security with Efficient Key Transmission","authors":"B. Datta, Akash Roy, R. Dutta, S. Bandyopadhyay","doi":"10.1109/ICIT.2018.00035","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00035","url":null,"abstract":"Information security becomes a major concern today. The paper introduces a double layer security approach that use both cryptography and steganography for secure transmission. The secret message is first encrypted using S-DES encryption algorithm. The keys of encryption are generated from edge pixels where the encrypted message is embedded within the non-edge pixels of cover image. The capacity of the method is enhanced through multi-bit embedding in three color channels. The proper extraction of target data is ensured through the non-involvement of lower bit-planes during edge detection. The quality of the stego media is maintained within the acceptable range of PSNR even at the higher embedding capacity. The security strength of the proposed method ensures through the transmission of keys with stego image and with the use of different keys for encryption. The method also reduces the bandwidth required in double layer security for key transmission.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shibanee Dash, Saumendra Kumar Mohapatra, M. Mohanty
{"title":"A Statistical Approach for Speech Enhancement in Cognitive Radio Network","authors":"Shibanee Dash, Saumendra Kumar Mohapatra, M. Mohanty","doi":"10.1109/ICIT.2018.00037","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00037","url":null,"abstract":"It is the inherent nature, that speech signal is noisy due to involvement of unvoiced component. While it passes through wireless channel the signal corrupts even more due to channel noise. Wireless network may be either licensed or unlicensed but the signal transmission and reception is an important fact. To avoid the congestion in network, the unlicensed spectrum is well utilized through one of the method named as cognitive radio network. In this paper, authors have approached to enhance speech signal at the user end so that the desire of getting clean signal can be fulfilled. The signal is normalized with low pass filter and transmitted through multicarrier modulation system using OFDM technique. Maximum likelihood (ML) technique has been utilized with cooperative spectrum sensing environment to enhance the signal communicated through cognitive radio channel. As channel noise varies 10 to 40 dB of the additive Gaussian noise, it has been verified through simulation. However, the result is shown for 10 dB noise with twenty user based cognitive radio network environment. In first stage the well-known cooperative spectrum sensing model has been implemented. Next to it the statistical approach is utilized to enhance the signal. Both short and long speech signals are verified. The result is found from visual inspection as well as the complementary ROC shows the probability of false alarm and probability of mixed detection.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raghavendra Vedula, Amitash Nanda, Sai Sankar Gochhayat, Asutosh Hota, Rishav Agarwal, K. SanjayReddy, Sandeep Mahapatra, Keshab Kishor Swain, Siddharth Das
{"title":"Computer Vision Assisted Autonomous Intra-Row Weeder","authors":"Raghavendra Vedula, Amitash Nanda, Sai Sankar Gochhayat, Asutosh Hota, Rishav Agarwal, K. SanjayReddy, Sandeep Mahapatra, Keshab Kishor Swain, Siddharth Das","doi":"10.1109/ICIT.2018.00027","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00027","url":null,"abstract":"Vegetable crop production is the rudimentary process for the sustainability of mankind on this planet. Technological advancements have been shaping the crop production in a commendable way nonetheless, weeds play a deleterious role for the growth of the crops. Weed management has hence become the alarming solution for increasing the yield. Even though manual weeding is being practiced by many nonetheless, labor costs, time and tedium have become the major constraints for the crop production. The introduction of the chemical methods of weed control has affected the growth of crops. However, the continuous use of herbicide-resistant weedicides has a serious impact on crops and the environment. So an increasing demand for chemical-free food has led to the investigation of alternative methods of weed control. Most of the methods of mechanical weeding doesn't produce the accurate result and moreover, existing intra-row weeders have limitations. This paper proposes the construction and working of an autonomous mechanical weeder. It consists of an actuator which is developed to mechanically remove intra-row weeds. The mechanically weeding actuator consists of an integrated servo motor which is combined with the computer vision assisted system for detecting the crop plant locations and guiding the weeding actuator to execute mechanical weeding operations without damaging the crops. The image extraction is based on a novel algorithm which effectively works with the encoding system of the robot movement with a precision of plus or minus 1cm. The accuracy of the system is found to be 96.3% using haar cascade classifier using Open-CV open source framework.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Wilcoxon Norm Based Robust Machine Learning Approach for Traffic Noise Prediction","authors":"S. Nanda, Rahul Vyas, N. Ray, D. P. Tripathy","doi":"10.1109/ICIT.2018.00015","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00015","url":null,"abstract":"The preliminary objective of this present research work is to construct an empirical traffic noise prediction model for evaluation of equivalent noise level (Leq) in terms of equivalent traffic volume number under heterogeneous traffic flow. For this research work, commercial road networks are preferred for monitoring and modeling. This proposed system introduces a novel method of robust application of wilcoxon norm based machine learning approach (WNN) for traffic noise prediction. The proposed WNN is designed by assuming that training samples used contains strong outliers (high percentage of data corrupt) and the cost function select is a robust norm called Wilcoxon norm. With the presence of outlier most of all computational intelligence models are failure to predict output. In this paper, it is highlights how Wilcoxon norm based artificial neural network model(WNN) has best performance with the presence of outlier compare to conventional multilayer perceptron neural network. For validation, traffic noise problem is consider as a system identification problem at here. From the simulation study it is found that Wilcoxon norm based artificial neural network model has best performance with the presence of outlier","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}