2016 International Conference on Inventive Computation Technologies (ICICT)最新文献

筛选
英文 中文
A study on data coverage protocols for energy conservation in wireless sensor network 面向无线传感器网络节能的数据覆盖协议研究
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7823201
Maheshwari Marne, U. Pacharaney, N. Suri, Mohini Ghotekar
{"title":"A study on data coverage protocols for energy conservation in wireless sensor network","authors":"Maheshwari Marne, U. Pacharaney, N. Suri, Mohini Ghotekar","doi":"10.1109/INVENTIVE.2016.7823201","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823201","url":null,"abstract":"Wireless Sensor Networks constitute a wide range of applications related to national security, military, surveillance, health monitoring environment. The main constraint in wireless sensor network is its energy consumption and limited battery life of the sensor nodes. Coverage provides good quality of service but it is of crucial importance especially when combined with connectivity and energy efficiency. This paper provides different factors affecting the coverage along with some existing coverage protocols and a comparative study of it. The challenge is to introduce a robust distributed protocol that can provide more effective coverage as compared to existing protocols by allowing minimum number of sensor nodes to be in the active state in order to conserve energy thereby increasing the lifetime of the sensor node.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient collection of big data in WSN 无线传感器网络中高效的大数据采集
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7823196
Sarita V. Halde, S. Khot
{"title":"Efficient collection of big data in WSN","authors":"Sarita V. Halde, S. Khot","doi":"10.1109/INVENTIVE.2016.7823196","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823196","url":null,"abstract":"The volume of data is increasing explosively in Wireless Sensor Network (WSN) due to development in Information and Communication Technology (ICT). Therefore the traditional communication techniques are facing challenges to deal with such huge amount of data. The explosion of data included in application areas of monitoring systems, smart home systems, centralized computing resources etc. The large amount of data which is unable to process with conventional communication techniques is called as Big data. This Big data is having high volume, high velocity and high variety information. This paper proposes method for efficient collection of big data in WSN.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126629467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effect of rumor propagation on stock market dynamics using cellular automata 基于元胞自动机的谣言传播对股市动态的影响
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7830114
Priksha Vij, Ajay Kumar
{"title":"Effect of rumor propagation on stock market dynamics using cellular automata","authors":"Priksha Vij, Ajay Kumar","doi":"10.1109/INVENTIVE.2016.7830114","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830114","url":null,"abstract":"In this paper, we build a cellular automaton model for the stock market to illustrate the complexity in the stock market by introducing variables for reflecting stability of the market. We introduced the concepts of rumor propagation to represent the market dynamics. Using this model, behavior of the market participants and their effect on the market dynamics are analyzed. Various constraints are introduced to counter-dynamics of rumor propagation for reflecting the close behavior with stock market and results show the relationship between the rumor strength and the behavior of stock market.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116544360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy protection in explicit feedback system with CHUD mining 基于CHUD挖掘的显式反馈系统中的隐私保护
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7824902
S. Sayed, R. Reeba
{"title":"Privacy protection in explicit feedback system with CHUD mining","authors":"S. Sayed, R. Reeba","doi":"10.1109/INVENTIVE.2016.7824902","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824902","url":null,"abstract":"This paper proposes an advanced method for providing privacy protection in explicit feedback system. At present the usage of search engine are increased rapidly because of the huge websites and data. The main purpose of search engine is to provide appropriate result to the user according to their requirements. Although it provide relevant information to the users but it doesn't provide any security for user profile. So there is a possibility for the leakage of users profile details. During search time they are worried for the leakage of their private information. Many method are available to avoid such a situation but its main drawback is all based on server side protection. Here introduced a client side technique called user customizable privacy search procedure (UPS) using Greedy algorithms for minimizing the privacy risk. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization of user profile. Here introduced a closed high utility method, which is used to find the most used items in a profile tree in terms of the cost function of transaction and privacy is applied based on it. The system is experimentally checked by constructing a Profile tree from a web environment and testing queries in it. At last an evaluation is also done with GreedyDP and CHUD GreedyDP.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of object detection techniques for object detection 目标检测技术的性能评价
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7830065
M. Vijayalakshmi, M. Senthilvadivu
{"title":"Performance evaluation of object detection techniques for object detection","authors":"M. Vijayalakshmi, M. Senthilvadivu","doi":"10.1109/INVENTIVE.2016.7830065","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830065","url":null,"abstract":"Object detection plays vital role in image processing for finding the objects of interest Increase of image size and complexity has thrust for developing novel and robust object detection techniques. There are number of methods existing for detecting the objects in a particular scene. The focus of this paper is estimate the performance and effieciency of some existing object detection algorithms on the sampled images. Thus may give good initiative about the suitability of those algorithms on the images. Three existing algorithms are implemented for various images and compared under variety of situations to find which detector is robust under different conditions.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation-based analysis of MANET routing protocols using group mobility model 基于组移动模型的MANET路由协议仿真分析
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7823290
S. Abbas, Mohsin Ur Rahman
{"title":"Simulation-based analysis of MANET routing protocols using group mobility model","authors":"S. Abbas, Mohsin Ur Rahman","doi":"10.1109/INVENTIVE.2016.7823290","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823290","url":null,"abstract":"Mobile ad hoc Networks (MANETs) are created by a collection of mobile nodes (MNs), which communicate and exchange information with each other via wireless links. These networks are widely known by their unique characteristics such as mobility, changing topology, multi-hop communication and lack of infrastructure. In the last few years, various routing protocols have been proposed for these networks. It is worthy to note that mobility brings many challenges when designing protocols for these networks. In this paper, we assessed the influence of Reference Point Group mobility model (RPGM) on the performance of both reactive and proactive protocols. Simulation results indicate that the hop-by-hop AODV performs better in high stressful environments, which makes AODV the robust protocol for RPGM model. We also observed that DSR is suitable for less tense environments. Furthermore, we found interesting facts about proactive routing protocols. These protocols are evaluated in terms of packet delivery Ratio (PDR), dropped packets, routing overhead and end-to-end delay.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122202898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print 基于图像质量评估的SVM分类假生物特征检测:在虹膜、人脸和掌纹上的应用
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7823189
P. Pravallika, K. Prasad
{"title":"SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print","authors":"P. Pravallika, K. Prasad","doi":"10.1109/INVENTIVE.2016.7823189","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823189","url":null,"abstract":"The increasing interest in the evaluation of biometric systems security is an important issue to be considered. The different threats called direct or spoofing attacks where in these attacks, the intruder uses some type of synthetically produced artifact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behavior of the genuine user, to fraudulent access of the biometric system have motivated to new efficient protection measures. In this paper, we present a novel software-based fake biometric detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The use of image quality assessment for liveness detection is motivated by the assumption that: It is expected that a fake image captured in an attack attempt will have different quality than a real sample acquired in the normal operation scenario for which the sensor was designed. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using general image quality features extracted from one image to differentiate between real and fake samples. This proposed work enhances the security of biometric recognitions, by using the liveness detection through image quality assessment and by fusion of multiple biometric traits. The SVM classifier is used for differentiating between the real and fake samples.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Precision agriculture robot for seeding function 具有精准播种功能的农业机器人
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7824880
Neha S. Naik, V. Shete, S. Danve
{"title":"Precision agriculture robot for seeding function","authors":"Neha S. Naik, V. Shete, S. Danve","doi":"10.1109/INVENTIVE.2016.7824880","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824880","url":null,"abstract":"In recent years, robotics in agriculture sector with its implementation based on precision agriculture concept is the newly emerging technology. The main reason behind automation of farming processes are saving the time and energy required for performing repetitive farming tasks and increasing the productivity of yield by treating every crop individually using precision farming concept. Designing of such robots is modeled based on particular approach and certain considerations of agriculture environment in which it is going to work. These considerations and different approaches are discussed in this paper. Also, prototype of an autonomous Agriculture Robot is presented which is specifically designed for seed sowing task only. It is a four wheeled vehicle which is controlled by LPC2148 microcontroller. Its working is based on the precision agriculture which enables efficient seed sowing at optimal depth and at optimal distances between crops and their rows, specific for each crop type.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Embedded web server based NetLab for remote access 基于NetLab的嵌入式web服务器实现远程访问
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7830192
M. Siddiqui, Vijay Purohit, Satendra Mane
{"title":"Embedded web server based NetLab for remote access","authors":"M. Siddiqui, Vijay Purohit, Satendra Mane","doi":"10.1109/INVENTIVE.2016.7830192","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830192","url":null,"abstract":"In this paper the implementation of NetLab for remote access based on embedded web server (EWS) using Internet is described. NetLab can be key technology in educational life which allows students to access laboratory equipment remotely via the Internet network or wireless network. The NetLab for programming microcontrollers on an embedded web server is proposed in this paper. Using NetLab we can perform microcontroller based laboratory experiments such as Stepper motor interface, LCD interface etc. The evaluation of the remote lab is done by programming microcontroller from remote location and by setting up a webcam interface target board thereby achieving live video streaming, students. There are some key benefits of using NetLab. Laboratory's execution will be better and more proficient as a result NetLab can be utilized by understudies for the duration of the day for 24 hours. EWS serves as the client interface to control the lab module microcontroller by means of the web. Embedded web server is designed using Labview. The design of remote labs can be multiuser, so that at the same time it can be used by more than one user.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GPS and ZigBee based traffic signal preemption 基于GPS和ZigBee的交通信号抢占
2016 International Conference on Inventive Computation Technologies (ICICT) Pub Date : 2016-08-01 DOI: 10.1109/INVENTIVE.2016.7824811
Vineeth Kodire, Sreebha Bhaskaran, H. N. Vishwas
{"title":"GPS and ZigBee based traffic signal preemption","authors":"Vineeth Kodire, Sreebha Bhaskaran, H. N. Vishwas","doi":"10.1109/INVENTIVE.2016.7824811","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824811","url":null,"abstract":"It is very unsafe for Emergency Vehicle (EV) to wait near the traffic intersection for green signal. It needs to reach its destination as fast as possible. Even though emergency vehicles have higher priority on the road, but still at the traffic signal there is lag to give enough priority to pass through the signal. Sometimes they need to wait for the signal to favor them in a congested traffic or they may have to take part in dangerous movement which may result in collision. The better way to reduce the waiting time of such vehicles is by making the traffic signal green for providing easy pass through. So that the safety of other vehicles are also taken care. In this paper, whenever the emergency vehicle is approaching preemption messages are provided to the traffic signal unit. So these signals interrupt the normal operation of the traffic light and make it green for the emergency vehicle. It is a type of Vehicle-to-Infrastructure (V2I) communication. The proposed system uses GPS method to get the location data and employs ZigBee for communicating efficiently with the intersection module. There is no requirement of Line-of-Sight employed in infrared based preemption methods. Also eliminate the false trigger occurring in sound (siren) based method due to noise and fading. Using this approach, it is possible to serve multiple emergency vehicles reaching the traffic intersection according to their distance from the intersection and accurately taking the decision to turn the signal green for the particular vehicle. There is no involvement of driver of the EV in anyway, it is fully autonomous and it can be used as a part of ITS.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信