{"title":"Optimal top-K queries processing: Sampling and dynamic scheduling approach","authors":"L. Saranya","doi":"10.1109/ICCCI.2014.6921736","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921736","url":null,"abstract":"An effective query processing plays an important role in the uncertain data streams. Specifically, multiple top-k queries processing on uncertain data streams obtained from large applications of several fields such as sensor network monitoring and internet traffic control requires periodic execution of queries and sharing results among them. The system that monitors uncertain events in such data streams manipulates the top-k queries. Here the problem is that systems were not designed to allow query results sharing which in turn leads to high computation cost and inaccurate response from the system. To overcome these issues (Queries results sharing), the system using a sampling algorithm for sample the top possible worlds from well-known possible worlds based on their high probability. System uses an optimal dynamic programming approach that split the multiple queries into number of groups. Then the query groups are scheduled and planned for sharing results to yield minimum computation cost. A faster greedy algorithm is used to reduce the time and storage space of the top-k queries based on the greedy rule. Thus the proposed approach allows sharing computation among multiple top-k queries and generates best plan of query execution.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thockchom Birjit Singha, Shruti Konwar, Soumik Roy, Reginald H. Vanlalchaka
{"title":"Power efficient priority encoder and decoder","authors":"Thockchom Birjit Singha, Shruti Konwar, Soumik Roy, Reginald H. Vanlalchaka","doi":"10.1109/ICCCI.2014.6921806","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921806","url":null,"abstract":"The main aim of VLSI designers being low power design, this paper presents a CMOS-based new design approach for a low power adiabatic 4:2 Priority Encoder and a 2:4 Decoder. The proposed designs are compared with the standard adiabatic logic styles- PFAL, ECRL and 2n2n2p, revealing lesser power consumption. The simulation is carried out in NI-Multisim software at 0.5 μm CMOS technology for frequency range 200MHz - 800MHz.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mohamed Zubair, C. Naveena, S. Prasath, C. Selvamani
{"title":"Detection and control of corrosion in buried gas pipe line using LabVIEW","authors":"S. Mohamed Zubair, C. Naveena, S. Prasath, C. Selvamani","doi":"10.1109/ICCCI.2014.6921843","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921843","url":null,"abstract":"For efficient management the early detection and control on any damage which occurs in the gas pipeline such as crack or leakage is essential in many gas industries. The wireless temperature & pressure transmitters have been commonly used to collect the information in supervision consistency of the gas pipeline. The most common sensors used in finding the abnormality in the pipe line are pressure and temperature sensors as the pressure and temperature changes whenever crack occurs. The major problems that are related to the gas or oil pipeline supervision is the unthinking rather than practical maintenance approach to the crack or any abnormality. The motivation of this project is to build a security method for the early revealing of corrosion and also to control, which the gas pipeline buried is exposed to changing gas flow pressures and temperatures. During the maintenance period the gas flow is diverted through a substitute pipe line to avoid the shut-down of the whole process in the gas industry. Simulation of the detection of crack in the pipe line is implemented using LabVIEW.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent wall mounted wireless fencing system using wireless sensor actuator network","authors":"Sumitro Ghatak, S. Bose, Siuli Roy","doi":"10.1109/ICCCI.2014.6921795","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921795","url":null,"abstract":"This paper presents the relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system and explain the phases by which the intrusion information are collected and sent to the central control station using wireless mesh network for analysis and processing the collected data. These days every protected zone is facing numerous security threats like trespassing or damaging of important equipments and a lot more. Unwanted intrusion has turned out to be a growing problem which has paved the way for a newer technology which detects intrusion accurately. Almost all organizations have their own conventional arrangement of protecting their zones by constructing high wall, wire fencing, power fencing or employing guard for manual observation. In case of large areas, manually observing the perimeter is not a viable option. To solve this type of problem we have developed a wall-mounted wireless fencing system. In this project I took the responsibility of studying how the different units could be collaborated and how the data collected from them could be further processed with the help of software, which was developed by me. The Intrusion detection system constitutes an important field of application for IR and microwave based wireless sensor network. A state of the art wall-mounted wireless intrusion detection system will detect intrusion automatically, through multi-level detection mechanism (IR, microwave, active RFID & camera) and will generate multi-level alert (buzzer, images, segment illumination, SMS, E-Mail) to notify security officers, owners and also illuminate the particular segment where the intrusion has happened. This system will enable the authority to quickly handle the emergency through identification of the area of incident at once and to take action quickly. IR based perimeter protection is a proven technology. However IR-based intrusion detection system is not a full-proof solution since (1) IR may fail in foggy or dusty weather condition & hence it may generate false alarm. Therefore we amalgamate this technology with Microwave based intrusion detection which can work satisfactorily in foggy weather. Also another significant arena of our proposed system is the Camera-based intrusion detection. Some industries require this feature to capture the snap-shots of the affected location instantly as the intrusion happens. The Intrusion information data are transmitted wirelessly to the control station via multi hop routing (using active RFID or IEEE 802.15.4 protocol). The Control station will receive intrusion information at real time and analyze the data with the help of the Intrusion software. It then sends SMS to the predefined numbers of the respective authority through GSM modem attached with the control station engine.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ambika, J. J. Ranjani, K. B. Srisathya, P. Deepika
{"title":"Content based image retrieval using ripplet transform and Kullback-Leibler Distance","authors":"A. Ambika, J. J. Ranjani, K. B. Srisathya, P. Deepika","doi":"10.1109/ICCCI.2014.6921759","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921759","url":null,"abstract":"Content-based image retrieval (CBIR), also known as query by image content is one of the applications of computer vision. In CBIR, the contents derived from the image like color, shapes, and textures are analyzed rather than the metadata such as keywords, tags, and/or descriptions associated with the image. In this paper, the texture features of the image are modelled using Generalized Gaussian Distribution (GGD) and Ripplet Transform. Ripplet transform has the capability of capturing structural information along with the curves compared to the traditional discrete wavelet transform. The similarity between query image and the training database is found using Kullback-Leibler Distance between GGDs. The proposed system provides greater accuracy and flexibility in capturing texture information. Experimental results on a large image database demonstrate the efficiency and effectiveness of the proposed CBIR system in the image retrieval paradigm.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of energy efficiency of spectrum sensing algorithms for cognitive radio networks using compressive sensing technique","authors":"Viswanathan Ramachandran, A. Cheeran","doi":"10.1109/ICCCI.2014.6921829","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921829","url":null,"abstract":"Cognitive Radio (CR) is projected to be the next disruptive radio communications and networking technology and has already attracted considerable interest from researchers worldwide. CR follows the design philosophy of Dynamic Spectrum Access (DSA) as opposed to a fixed spectrum allocation policy. The enabling technology for CR is spectrum sensing. However, spectrum sensing is one of the most complex and power intensive tasks in a cognitive radio system. Due to the emphasis on `Green Wireless Communications' recently, energy efficiency is an aspect that must be dealt with in practical CR systems. This is especially so in wideband CR networks which operate in the over GHz regime and consequently conventional sampling and signal acquisition becomes costly from a hardware point of view. Hence compressive sampling has been proposed for spectrum sensing in CR networks recently. This paper focuses on the application of compressed sensing techniques to cyclostationary feature detection in CR and the resulting improvement of energy efficiency.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uncertainty modeling of nonlinear 2-DOF helicopter model","authors":"J. Vishnupriyan, P. Manoharan, A. Ramalakshmi","doi":"10.1109/ICCCI.2014.6921840","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921840","url":null,"abstract":"This paper proposes the modeling of uncertainty design of a two degree of freedom (2-DOF) nonlinear helicopter model with nine uncertain parameters. This approach is developed based on a robust μ-synthesis control tool for a laboratory helicopter model known as twin rotor multi-input multi-output system (TRMS). The goal of control is robust stabilization of position of TRMS by considering nonlinearity and uncertainties of the system. The percentage of uncertainty is introduced in the model and motor parameters for the robust control of TRMS. Simulation results show the frequency response analysis of open loop interconnection of TRMS. The singular value of the frequency response is evaluated for the dynamic TRMS plant. The position response of uncertain linearized model of TRMS is also analyzed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sukhdeep Singh, Gurpal Singh, V. Lakshmi Narasimhan, H. S. Pabla
{"title":"Petri net modelling and analysis of mobile communication protocols UMTS, LTE, GPRS and MANET","authors":"Sukhdeep Singh, Gurpal Singh, V. Lakshmi Narasimhan, H. S. Pabla","doi":"10.1109/ICCCI.2014.6921780","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921780","url":null,"abstract":"Petri net is a powerful modelling and analysis mechanism, which facilitates a smart way to understand events and dynamic systems. This paper provides an analysis of several generations of mobile network systems, namely, UMTS, LTE, GPRS and MANET using Petri net. The detailed analysis shows that these protocols are robust, bounded and deadlock free.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121589889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Prasanth, Tiruvannamalai kprasanthkrishna, P. Sivakumar
{"title":"Location based routing protocol - A survey","authors":"K. Prasanth, Tiruvannamalai kprasanthkrishna, P. Sivakumar","doi":"10.1109/ICCCI.2014.6921790","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921790","url":null,"abstract":"Geocast bring up to the liberation of information to a faction of Destinations in a network determine by their geographical site. In this expose we present a survey on Location Based Routing. The Geocast Routing is also known as Location Based Routing. The Message is delivered to nodes within a geographical region by using “GEOCAST ROUTING PROTOCOLS ”. Geocast routing uses some methods for routing they are based on flooding, without flooding, Beacon, beaconless, GREES and forwarding. Location Based Routing chiefly rivet on Energy utilization, guaranteed delivery of records. Geocast Routing protocol toil in all Dimensional network topology. Geocast Routing protocol judgment includes message and memory complication, stoutness, and the ability to transport geocast packets in moderately partitioned networks.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digitally controlled Active Clamp Forward Converter with small signal discrete-time modeling","authors":"Ravindra Janga, S. Malaji","doi":"10.1109/ICCCI.2014.6921846","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921846","url":null,"abstract":"In this paper the Small Signal Discrete-time Model for Active Clamp Forward Converter is proposed by using state space averaging technique to design a digital controller, takes in to consideration of modulator effects and delays in the control loop. The validity of the designed model and achievement of desired compensation for Active Clamp Forward Converter with digital controller is confirmed by the results of the MATLAB simulation by using digital redesign method. Finally simulation results are presented and analyzed for 5V, 100W Active Clamp Forward Converter with Discrete-time controller.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}