{"title":"Rank based censoring of cognitive radios with cooperative spectrum sensing under hoyt fading channel","authors":"M. Ranjeeth, S. Anuradha","doi":"10.1109/ICATCCT.2015.7456960","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456960","url":null,"abstract":"Performance of cooperative spectrum sensing with hard decision fusion technique (majority logic) has been evaluated under Hoyt fading environment with the application of censoring scheme. In this paper we have considered Hoyt fading in both reporting channel (R-channel) and sensing channel (S-channel). In a cooperative spectrum sensing (CSS) scheme, the detection primary user (PU) activity is improved by eliminating the heavily faded cognitive radio (CR) users. CRs which are heavily faded those are eliminated by using censoring scheme in the R-channel. Rank based censoring scheme is used to censors the CRs in the presence of Hoyt fading in both perfect and imperfect channels. A hard decision based fusion technique called majority logic rule is considered at the fusion center (FC) to evaluate the performance using missed detection probability (Qm) and total error probability (Qm + Qf). This has been performed in both perfect and imperfect channels by varying the network parameters like: probabilities of false alarm (Qf), R-channel SNR, S-channel SNR and Hoyt fading parameter (q).","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for medical image segmentation using PCA and K-means clustering","authors":"J. Katkar, T. Baraskar, V. Mankar","doi":"10.1109/ICATCCT.2015.7456922","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456922","url":null,"abstract":"Physician use medical images to find abnormalities in human bodies and to locate the discontinuities. In transmission process sometimes medical images are corrupted due to external noise. Therefore need to improve the image quality, put down the computational complexity and signal to noise ratio. There is need of segmentation to improve performance analysis and image quality. Segmentation method is use to identify important regions in medical images, it is a unique technique for partitioning image into meaningful sub regions or object with same attribute. Proposed method state Principle component analysis and k-means clustering method for segmentation of medical images and extracts meaningful part from medical image in efficient manner. K-means Clustering is the process of extracting meaningful part from image. Adding Principle Component Analysis for feature extraction and formation of precise number of cluster to increase the accuracy. To develop a system which will perform segmentation of MRI images to locate disorder in better way.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A content based image retrieval system using shape analysis","authors":"P. Nikkam, N. Hegde, B. E. Reddy","doi":"10.1109/ICATCCT.2015.7456868","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456868","url":null,"abstract":"Image retrieval is a process of retrieving the similar images from a huge dataset. The retrieving of images is done based on the query image and the matched feature with the dataset images. In this paper we have proposed a novel method for efficient retrieval using shape analysis of the query and dataset images. The key points of the work are detection of shape and extraction of the features based on the shape. The extracted features are trained by using the support vector machine classification method. The simulation results show the accuracy of the proposed system as 96.69%.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient particle swarm optimization and rule mining for fault diagnosis of dissolved gas analysis","authors":"Namrata Dehariya, Vinay Pathak, A. Dubey","doi":"10.1109/ICATCCT.2015.7457006","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7457006","url":null,"abstract":"Dissolved gas Analysis (DGA) is the most vital segment of discovering shortcoming in huge oilfilled transformers. Early recognition of beginning issues in transformers decreases unreasonable impromptu blackouts. The most important and dependable strategy for assessing the center of transformer is the disintegrated gas investigation. In this paper we have used dissolved gas analysis for the analytical and computation study which is used for the evaluation used as a diagnostic tool for evaluating the condition of the transformer. We have proposed an efficient Particle Swarm Optimization using Rule Mining for Fault Diagnosis of Dissolved Gas Analysis. In this approach we first apply associative IEC for finding the faults. Then Item based individual association are applied on different gas ratio. It is on the basis on the values taken as a data set. It shows the individual associated improvement in the concentration quantity. Then by using random particle swarm optimization it is tuned to their maximum threshold value for obtaining the saturation points. The results show the improvement in fault diagnosis and provide and approach for finding associated saturation point.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Separation of singing voice from music accompaniment using matrix factorization method","authors":"Harshada P. Burute, P. Mane","doi":"10.1109/ICATCCT.2015.7456876","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456876","url":null,"abstract":"Songs play an important role in entertainment. An audio signal separation system should be able to identify different audio signals such as speech, music and background noise. In a song the singing voice provides useful information. An automatic singing voice separation system is used for attenuating or removing the music accompaniment. The singing voice becomes a main attractive focus of attention. Singing is used to produces relevant sound with music by the human voice. The paper present the developed algorithm Robust Principal Component Analysis (RPCA) for separating singing voice from music background. This method is a matrix factorization for solving low-rank and sparse matrices. Singing Voice has been effectively separated from the mixture of music accompaniment. Evaluation results of the algorithm shows that this method can achieve around 5.2 dB higher GNSDR (Global Normalized Source to Distortion Ratio) on the MIR-1K dataset. Moreover, we examine the separation results for different values of k.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey for restricting the DDOS traffic flooding and worm attacks in Internet","authors":"R. Saranya, S. Kannan, N. Prathap","doi":"10.1109/ICATCCT.2015.7456891","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456891","url":null,"abstract":"DoS attacks are significant issues for the Internet. With huge need on internet service provided using large application server, Denial of Service (DoS) attack is developed into a key security issue in the network service provisioning. Flooding attack is one of the major DoS attacks, floods the network traffic abnormally to disturb the internet services which is rendered to users. In addition, worm attack is an impeding feature on internet peer servers on providing services to the users. Worm attack self replicates and distribute the malware across the network by its own. However, the worm detection schemes are not able to scan and detect exponentially rising abnormal traffic patterns. It is more susceptible in providing the security to the internet peer servers. DoS flooding and worm attack resistance schemes are not easy to implement because it needs large number of cooperating and monitoring activities on the services provided to the users. So, Integrated Quantum Flow and Hidden Markov Chain Approach (IQF-HMC) is designed to restrict the DDOS traffic flooding and worm attacks in internet.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EPMOS based secure mobile communication in LTE/SAE networks","authors":"K. Prakash, Balachandra Muniyal","doi":"10.1109/ICATCCT.2015.7456863","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456863","url":null,"abstract":"PKI (Public Key Infrastructure) based AKA (Authentication and Key Agreement) scheme known as Optimizing PKI for 3GPP Authentication and Key Agreement(OPAKA) has been proposed in the field of 3G wireless mobile communication system. The study of OPAKA revealed the drawback of protocol and an Enhanced version of OPAKA namely EPMOS (Enhancing PKI for Mobile Commerce Security) is proposed. The recent expansion of wireless technologies and novel applications and the advancement in mobile technology after UMTS-3G has been taken up to the next level by the 3GPP Long Tem Evolution/System Architecture Evolution (LTE/SAE). The realisation of better bandwidth, full interworking with other access/backend systems using all-IP architecture with well-defined interworking with circuit switched system becoming reality. The GSM has focussed the security for radio path whereas UMTS has enhanced it in to network functionalities. The future networks based on IP mechanism demands more security features, since the threats related to IP are also possible. The EPMOS can used to solve the vulnerabilities in LTE.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Photonic crystal fiber with anomalous dispersion behavior and high birefringence","authors":"Pranaw Kumar, Priyanka Das","doi":"10.1109/ICATCCT.2015.7456927","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456927","url":null,"abstract":"A novel design of hexagonal PCF has been investigated with variation in areas of circular air holes. The structure consists of six rings. The three outermost ring has largest circular air holes. The immediate two rings next to the innermost ring consists of smallest circular air holes. The innermost ring consists of circular air holes whose area is lesser than the three outermost rings but larger than the second and third ring. The designed fiber reports a very low dispersion. Moreover a high birefringence is observed at the first optical window. Besides, normalized frequencies and confinement loss is also studied. This fiber can be used for generation of broadband supercontinnum and soliton based devices.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sneha, V. Bhavana, S. Brunda, T. Murali, S. Puneeth, B. A. Ravikiran
{"title":"A wireless based patient monitoring system using Android technology","authors":"B. Sneha, V. Bhavana, S. Brunda, T. Murali, S. Puneeth, B. A. Ravikiran","doi":"10.1109/ICATCCT.2015.7456851","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456851","url":null,"abstract":"Treating patients in remote areas in emergency condition are critical task and hence a continuous monitor system is essential for doctors to treat them when they are in need. This system can be used for more than one patient at a time. A patient monitoring system can be developed with the advantages of network technology and multiple sensor fusion technology along with the combination of Smartphone and Bluetooth technologies. Development of smart phones has leaded the world in technology usage from common people to professional to their needs. Sensor technology and Android Smartphone can be used as a key component of this system to solve the purpose of mobile medical care. Data collected by the sensors is processed by the microcontroller device and sent to Android mobile phone through Bluetooth and it can also transmit this data on time to the remote server. This method helps doctor to get data of patient and treat them well. Along with this, it also provides connection to the medical center using cell phones to transfer all the acquired data through internet.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient lossless compression using double Huffman minimum variance encoding technique","authors":"G. Sandeep, B. S. Sunil kumar, D. Deepak","doi":"10.1109/ICATCCT.2015.7456942","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456942","url":null,"abstract":"A Huffman code is a particular type of optimal prefix code that is commonly used for loss-less data compression. The process of finding such a code is known as Huffman coding. The output from Huffman's algorithm can be viewed as a variable-length code table for encoding a source symbol. The algorithm derives this table from the estimated probability or frequency of occurrence for each possible value of the source symbol. In this paper, we present a new approach to measure the performance and redundancy that work on two methods of coding like Huffman coding and Minimum Variance Huffman Coding. After getting the code-word for each symbol, we compress it on the basis of its binary values like 0 and 1 using binary coding. This is applied to both the approaches; this process is called as Double Huffman Coding. Finally we produce a better result than Huffman coding.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}