{"title":"Characterization of Analog to Digital converter using Histogram method with noise as stimuli","authors":"Bhawana Garg, D. K. Mishra","doi":"10.1109/ICCCI.2014.6921785","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921785","url":null,"abstract":"ADC is a critical device of any electronic, measurement and communication system, which need to be characterized and tested precisely. This paper describes the testing of ADC with histogram method using white Gaussian noise as stimuli. The use of this signal avoids considering all other noise present in the system. Gain, offset, linearity errors and effective no. of Bits have estimated using this method. Large no. of samples have collected and applied to device under test, and then from histogram, code transition level of each code has computed. Using least square minimization technique Best fit line is determined. Gain and offset can be calculated from best fit line. ENOB is determined from the ratio of actual to ideal rms error and is compared with the previous data available in literature. Known values of nonlinearity are inserted into ideal ADC to convert it into real life ADC. Arbitrary inserted values of nonlinearities are compared with the calculated values. This paper covers the simulation of 5-bit ADC and experimental results are presented.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayaskanta Panigrahi, Y. Choukiker, S. Behera, R. Jyoti
{"title":"Square ring dielectric resonator antenna for wideband applications","authors":"Ayaskanta Panigrahi, Y. Choukiker, S. Behera, R. Jyoti","doi":"10.1109/ICCCI.2014.6921781","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921781","url":null,"abstract":"In this paper, a square ring dielectric resonator (SRDR) antenna is presented which is excited by an U-shaped microstrip feed. The Q-factor can be lowered and bandwidth can be improved by removing the central portion of the dielectric resonator. The proposed feed for ring dielectric resonator antenna has been achieved -10 dB impedance bandwidth of 46.7% for 3.9 to 6.20 GHz. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization approach to reduce network latency for thin client performance optimization in cloud computing environment","authors":"Sumita U. Sharma, Yogendra Babarao Gandole","doi":"10.1109/ICCCI.2014.6921753","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921753","url":null,"abstract":"Thin Clients with Virtual Desktops prove to be the best equipments to access the online services provided by the cloud over the internet. Some of the proven benefits of thin clients are lower cost of ownership and very less power consumption which supports to Green Computing. The ability of thin client can be increased by reducing network latency to improve the performance and usability of thin clients. Network latency causes a great delay in transmitting a message or communication from one location to another. Many other external factors, like congestion in the network, bandwidth limitation, computer storage capacities and the distance between two locations also contribute to the delay. The proposed paper aims at the issues of Network Latency and its various aspects in a thin client network. The paper also undergoes with experimenting thin client with different environment to find network latency which helped in finding conclusion and proposing new ideology for reducing network latency. The experiments are performed on simulated banking application and running it over thin client with different services. This inshore about the need of reducing network latency for real time thin client and cloud computing environment to increase its performance and provides a better user experiences. The paper also proposes new methods to overcome such problems.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132760548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kalamani, S. Valarmathy, Head, C. Poonkuzhali, P. Scholar, Catherine J N Pg Scholar
{"title":"Feature selection algorithms for automatic speech recognition","authors":"M. Kalamani, S. Valarmathy, Head, C. Poonkuzhali, P. Scholar, Catherine J N Pg Scholar","doi":"10.1109/ICCCI.2014.6921797","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921797","url":null,"abstract":"Speech is one of the most promising models through which various human emotions such as happiness, anger, sadness, and normal state can be determined, apart from facial expressions. Researchers have proved that acoustic parameters of a speech signal such as energy, pitch, Mel frequency Cepstral Coefficient (MFCC) are vital in determining the emotion state of a person. There is an increasing need for a new Feature selection method, to increase the processing rate and recognition accuracy of the classifier, by selecting the discriminative features. This study investigates the various feature selection algorithms, used for selecting the optimal features from speech vectors which are extracted using MFCC. The feature selected is then used in the modeling stage.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA)","authors":"Aarfa Khan, S. Shrivastava, Vineet Richariya","doi":"10.1109/ICCCI.2014.6921748","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921748","url":null,"abstract":"A Mobile Ad-Hoc Network (MANET) is a arrangement of wireless mobile nodes which forms a temporary network for the communication without the access point, high availability of wireless devices in everyday is a measure factor in the success of infrastructure-less networks. MANET is dealing with both kinds of attacks, active and passive attacks at all the layers of network model. The lack in security measures of their routing protocols is alluring a number of attackers to intrude the network. A particular type of attack; known as Wormhole, which is launched by creation of tunnels and it results in complete disruption of routing paths on MANET. This paper presents a technique NWLID: Normalized Wormhole Local Intrusion detection Algorithm which is the modified version of Local Intrusion Detection Routing Security over mobile adhoc Network which has an intermediate neighbor node discovery mechanism, packet drop calculator, individual node receiving packet estimator followed by isolation technique for the confirmed Wormhole nodes. Result shows the effect of wormhole attack on normal behavior and improvement of performance after the application of proposed scheme. The effectiveness of NWLID algorithm is evaluated using ns2 network simulator.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automotive in vehicle network protocols","authors":"B. Vinodh Kumar, J. Ramesh","doi":"10.1109/ICCCI.2014.6921836","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921836","url":null,"abstract":"Need for sophisticated automotive electronics is increasing as per the customers demand for luxury, comfort and safety grows. In addition to this computational power of the microcontrollers, FPGAs and processors have also reached new heights forcing vehicle OEMs (Original Equipment Manufacturers) to modify their conventional vehicle networking architecture to handle large amount of data's. This paper reviews traditional and latest vehicle network protocols and compares their performance, speed and its area of application.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power transformer protection using wavelet packet transform","authors":"K. Ramesh, M. Sushama","doi":"10.1109/ICCCI.2014.6921841","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921841","url":null,"abstract":"This paper presents a novel technique for power transformer protection. This technique is based on extracting current signals under different operating conditions such as during energization of transformer and different fault conditions. Fast wavelet transform (FWT) schemes may not be so effective for data that has mainly oscillating features. An effective solution to distinguish inrush current from internal fault cases involves examining the signals in both the time and frequency domains simultaneously. The wavelet packet transform is the extension of the FWT which allows fine characterization of signal content for both time and frequency together. In the proposed work A 138/13.8 kV transformer was simulated using Matlab simulink environment. The transient signals of differential currents are captured and analyzed using `db1' wavelet packet transform at level 2. The energy content of the second level approximation at different fault incidence angles is calculated. A threshold is set based upon number of simulation studies. By considering the threshold value as the reference, the magnetizing inrush current is distinguished from internal fault current. The results indicate that the proposed scheme of protection is stable, reliable, and fast during the discrimination between magnetizing inrush currents, and internal faults.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel design microgripper based on electrothermal expansion principle","authors":"S. A. Sheikh, T. Shanmuganantham","doi":"10.1109/ICCCI.2014.6921816","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921816","url":null,"abstract":"In this paper, a newly modeled 3-D MEMS electrothermally actuated microgripper has been designed and simulated using COMSOL 4.3b based on finite element method (FEM). Electrothermal mechanism is the most widely used mechanism for providing large displacements at very small voltages. The new model is designed by combining asymmetric arm structure and a thin gold layer is inserted in the asymmetric arms which make it a typical bimorph structure. The microgripper presented here is electro-thermally actuated and optimized geometrically and materially to explore the effect of dimensional variation and material change on its performance. The in-plane, out of plane displacements, strain, stress, current density and temperature has been analyzed and the results are discussed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122628991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of LSB based image steganography techniques","authors":"K. Thangadurai, G. Sudha Devi","doi":"10.1109/ICCCI.2014.6921751","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921751","url":null,"abstract":"Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. If a person views the object in which the information is hidden inside, he or she will have no indication that there is any hidden information. So the person will not try to decrypt the information. Steganography can be divided into Text Steganography, Image Steganography, Audio/Video Steganography. Image Steganography is one of the common methods used for hiding the information in the cover image. LSB is very efficient algorithm used to embed the information in a cover file. This paper presents the detail knowledge about the LSB based image steganography and its applications to various file formats. In this paper we also analyze the available image based steganography along with cryptography technique to achieve security.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured data destruction in cloud based multi-tenant database architecture","authors":"M. Vanitha, C. Kavitha","doi":"10.1109/ICCCI.2014.6921774","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921774","url":null,"abstract":"Cloud computing falls into two general categories. Applications being delivered as service and hardware and data centers that provides those services [1]. Cloud storage evolves from just a storage model to a new service model where data is being managed, maintained, and stored in multiple remote severs for back-up reasons. Cloud platform server clusters are running in network environment and it may contain multiple users' data and the data may be scattered in different virtual data centers. In a multi-user shared cloud computing platform users are only logically isolated, but data of different users may be stored in same physical equipment. These equipments can be rapidly provisioned, implemented, scaled up or down and decommissioned. Current cloud providers do not provide the control or at least the knowledge over the provided resources to their customers. The data in cloud is encrypted during rest, transit and back-up in multi tenant storage. The encryption keys are managed per customer. There are different stages of data life cycle Create, Store, Use, Share, Archive and Destruct. The final stage is overlooked [2], which is the complex stage of data in cloud. Data retention assurance may be easier for the cloud provider to demonstrate while the data destruction is extremely difficult. When the SLA between the customer and the cloud provider ends, today in no way it is assured that the particular customers' data is completely destroyed or destructed from the cloud provider's storage. The proposed method identifies way to track individual customers' data and their encryption keys and provides solution to completely delete the data from the cloud provider's multi-tenant storage architecture. It also ensures deletion of data copies as there are always possibilities of more than one copy of data being maintained for back-up purposes. The data destruction proof shall also be provided to customer making sure that the owner's data is completely removed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123191051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}