Maheshwari Marne, U. Pacharaney, N. Suri, Mohini Ghotekar
{"title":"A study on data coverage protocols for energy conservation in wireless sensor network","authors":"Maheshwari Marne, U. Pacharaney, N. Suri, Mohini Ghotekar","doi":"10.1109/INVENTIVE.2016.7823201","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823201","url":null,"abstract":"Wireless Sensor Networks constitute a wide range of applications related to national security, military, surveillance, health monitoring environment. The main constraint in wireless sensor network is its energy consumption and limited battery life of the sensor nodes. Coverage provides good quality of service but it is of crucial importance especially when combined with connectivity and energy efficiency. This paper provides different factors affecting the coverage along with some existing coverage protocols and a comparative study of it. The challenge is to introduce a robust distributed protocol that can provide more effective coverage as compared to existing protocols by allowing minimum number of sensor nodes to be in the active state in order to conserve energy thereby increasing the lifetime of the sensor node.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient collection of big data in WSN","authors":"Sarita V. Halde, S. Khot","doi":"10.1109/INVENTIVE.2016.7823196","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823196","url":null,"abstract":"The volume of data is increasing explosively in Wireless Sensor Network (WSN) due to development in Information and Communication Technology (ICT). Therefore the traditional communication techniques are facing challenges to deal with such huge amount of data. The explosion of data included in application areas of monitoring systems, smart home systems, centralized computing resources etc. The large amount of data which is unable to process with conventional communication techniques is called as Big data. This Big data is having high volume, high velocity and high variety information. This paper proposes method for efficient collection of big data in WSN.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126629467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of rumor propagation on stock market dynamics using cellular automata","authors":"Priksha Vij, Ajay Kumar","doi":"10.1109/INVENTIVE.2016.7830114","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830114","url":null,"abstract":"In this paper, we build a cellular automaton model for the stock market to illustrate the complexity in the stock market by introducing variables for reflecting stability of the market. We introduced the concepts of rumor propagation to represent the market dynamics. Using this model, behavior of the market participants and their effect on the market dynamics are analyzed. Various constraints are introduced to counter-dynamics of rumor propagation for reflecting the close behavior with stock market and results show the relationship between the rumor strength and the behavior of stock market.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116544360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy protection in explicit feedback system with CHUD mining","authors":"S. Sayed, R. Reeba","doi":"10.1109/INVENTIVE.2016.7824902","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824902","url":null,"abstract":"This paper proposes an advanced method for providing privacy protection in explicit feedback system. At present the usage of search engine are increased rapidly because of the huge websites and data. The main purpose of search engine is to provide appropriate result to the user according to their requirements. Although it provide relevant information to the users but it doesn't provide any security for user profile. So there is a possibility for the leakage of users profile details. During search time they are worried for the leakage of their private information. Many method are available to avoid such a situation but its main drawback is all based on server side protection. Here introduced a client side technique called user customizable privacy search procedure (UPS) using Greedy algorithms for minimizing the privacy risk. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization of user profile. Here introduced a closed high utility method, which is used to find the most used items in a profile tree in terms of the cost function of transaction and privacy is applied based on it. The system is experimentally checked by constructing a Profile tree from a web environment and testing queries in it. At last an evaluation is also done with GreedyDP and CHUD GreedyDP.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of object detection techniques for object detection","authors":"M. Vijayalakshmi, M. Senthilvadivu","doi":"10.1109/INVENTIVE.2016.7830065","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830065","url":null,"abstract":"Object detection plays vital role in image processing for finding the objects of interest Increase of image size and complexity has thrust for developing novel and robust object detection techniques. There are number of methods existing for detecting the objects in a particular scene. The focus of this paper is estimate the performance and effieciency of some existing object detection algorithms on the sampled images. Thus may give good initiative about the suitability of those algorithms on the images. Three existing algorithms are implemented for various images and compared under variety of situations to find which detector is robust under different conditions.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-based analysis of MANET routing protocols using group mobility model","authors":"S. Abbas, Mohsin Ur Rahman","doi":"10.1109/INVENTIVE.2016.7823290","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823290","url":null,"abstract":"Mobile ad hoc Networks (MANETs) are created by a collection of mobile nodes (MNs), which communicate and exchange information with each other via wireless links. These networks are widely known by their unique characteristics such as mobility, changing topology, multi-hop communication and lack of infrastructure. In the last few years, various routing protocols have been proposed for these networks. It is worthy to note that mobility brings many challenges when designing protocols for these networks. In this paper, we assessed the influence of Reference Point Group mobility model (RPGM) on the performance of both reactive and proactive protocols. Simulation results indicate that the hop-by-hop AODV performs better in high stressful environments, which makes AODV the robust protocol for RPGM model. We also observed that DSR is suitable for less tense environments. Furthermore, we found interesting facts about proactive routing protocols. These protocols are evaluated in terms of packet delivery Ratio (PDR), dropped packets, routing overhead and end-to-end delay.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122202898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print","authors":"P. Pravallika, K. Prasad","doi":"10.1109/INVENTIVE.2016.7823189","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7823189","url":null,"abstract":"The increasing interest in the evaluation of biometric systems security is an important issue to be considered. The different threats called direct or spoofing attacks where in these attacks, the intruder uses some type of synthetically produced artifact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behavior of the genuine user, to fraudulent access of the biometric system have motivated to new efficient protection measures. In this paper, we present a novel software-based fake biometric detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The use of image quality assessment for liveness detection is motivated by the assumption that: It is expected that a fake image captured in an attack attempt will have different quality than a real sample acquired in the normal operation scenario for which the sensor was designed. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using general image quality features extracted from one image to differentiate between real and fake samples. This proposed work enhances the security of biometric recognitions, by using the liveness detection through image quality assessment and by fusion of multiple biometric traits. The SVM classifier is used for differentiating between the real and fake samples.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precision agriculture robot for seeding function","authors":"Neha S. Naik, V. Shete, S. Danve","doi":"10.1109/INVENTIVE.2016.7824880","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824880","url":null,"abstract":"In recent years, robotics in agriculture sector with its implementation based on precision agriculture concept is the newly emerging technology. The main reason behind automation of farming processes are saving the time and energy required for performing repetitive farming tasks and increasing the productivity of yield by treating every crop individually using precision farming concept. Designing of such robots is modeled based on particular approach and certain considerations of agriculture environment in which it is going to work. These considerations and different approaches are discussed in this paper. Also, prototype of an autonomous Agriculture Robot is presented which is specifically designed for seed sowing task only. It is a four wheeled vehicle which is controlled by LPC2148 microcontroller. Its working is based on the precision agriculture which enables efficient seed sowing at optimal depth and at optimal distances between crops and their rows, specific for each crop type.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded web server based NetLab for remote access","authors":"M. Siddiqui, Vijay Purohit, Satendra Mane","doi":"10.1109/INVENTIVE.2016.7830192","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7830192","url":null,"abstract":"In this paper the implementation of NetLab for remote access based on embedded web server (EWS) using Internet is described. NetLab can be key technology in educational life which allows students to access laboratory equipment remotely via the Internet network or wireless network. The NetLab for programming microcontrollers on an embedded web server is proposed in this paper. Using NetLab we can perform microcontroller based laboratory experiments such as Stepper motor interface, LCD interface etc. The evaluation of the remote lab is done by programming microcontroller from remote location and by setting up a webcam interface target board thereby achieving live video streaming, students. There are some key benefits of using NetLab. Laboratory's execution will be better and more proficient as a result NetLab can be utilized by understudies for the duration of the day for 24 hours. EWS serves as the client interface to control the lab module microcontroller by means of the web. Embedded web server is designed using Labview. The design of remote labs can be multiuser, so that at the same time it can be used by more than one user.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPS and ZigBee based traffic signal preemption","authors":"Vineeth Kodire, Sreebha Bhaskaran, H. N. Vishwas","doi":"10.1109/INVENTIVE.2016.7824811","DOIUrl":"https://doi.org/10.1109/INVENTIVE.2016.7824811","url":null,"abstract":"It is very unsafe for Emergency Vehicle (EV) to wait near the traffic intersection for green signal. It needs to reach its destination as fast as possible. Even though emergency vehicles have higher priority on the road, but still at the traffic signal there is lag to give enough priority to pass through the signal. Sometimes they need to wait for the signal to favor them in a congested traffic or they may have to take part in dangerous movement which may result in collision. The better way to reduce the waiting time of such vehicles is by making the traffic signal green for providing easy pass through. So that the safety of other vehicles are also taken care. In this paper, whenever the emergency vehicle is approaching preemption messages are provided to the traffic signal unit. So these signals interrupt the normal operation of the traffic light and make it green for the emergency vehicle. It is a type of Vehicle-to-Infrastructure (V2I) communication. The proposed system uses GPS method to get the location data and employs ZigBee for communicating efficiently with the intersection module. There is no requirement of Line-of-Sight employed in infrared based preemption methods. Also eliminate the false trigger occurring in sound (siren) based method due to noise and fading. Using this approach, it is possible to serve multiple emergency vehicles reaching the traffic intersection according to their distance from the intersection and accurately taking the decision to turn the signal green for the particular vehicle. There is no involvement of driver of the EV in anyway, it is fully autonomous and it can be used as a part of ITS.","PeriodicalId":252950,"journal":{"name":"2016 International Conference on Inventive Computation Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}