{"title":"Effects of parasitic fringe capacitance on threshold voltage of underlap DG-MOSFET","authors":"P. Verma, Ashutosh Nandi","doi":"10.1109/I2C2.2017.8321915","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321915","url":null,"abstract":"A compact model for the effect of parasitic fringe capacitance on the threshold voltage of a gate to source/drain (S/D) underlapped double-gate (DG)-MOSFET is developed. The authors' model includes the effects of channel thickness, oxide thickness and dielectric constant of a MOSFET structure. A simple expression is derived for the fringe capacitance and the threshold voltage. In this model, we show the effect of fringe capacitance on the threshold voltage by varying the channel thickness, oxide thickness, and dielectric constant.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121272215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust evaluation in detection of provenance forgery and packet drop attacks in WSNs","authors":"Henna Thesnim, M. Nithin","doi":"10.1109/I2C2.2017.8321838","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321838","url":null,"abstract":"Numerous application domains use large scale sensor networks and they collect data that are used in decision making for critical infrastructures. Data are transmitted from multiple sources through intermediate nodes which aggregates the information. Sometimes there is a chance of malicious attack in the network and may introduce additional nodes in the network or compromise existing ones. Since this causes problems in correct decision making, providing data trustworthiness plays an important role in wireless sensor networks (WSN). Provenance management can cause several challenging requirements such as storage, bandwidth, energy etc. So here a trust evaluation in detection of provenance forgery is introduced. The proposed technique relies on in packet bloom filter to encode the provenance data. Also the provenance scheme is extended to detect the packet drop attack staged by the malicious nodes. Along with that trust management such as communication trust, energy trust and direct trust are also done to improve the efficiency of system.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Manufacturing and mechanical characterization of dual particle reinforced hybrid composites","authors":"V. Mohanavel, K. Rajan, S. Kumar, P. Ganeshan","doi":"10.1109/I2C2.2017.8321903","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321903","url":null,"abstract":"In the present work, deals with the synthesis of novel AA6351 alloy based aluminum matrix composites which have been prepared through liquid metallurgy route using alumina and graphite as reinforcement materials. The developed composites and base alloy were characterized by scanning electron microscope (SEM). The effect of dual reinforcement content on the compression strength, yield strength, tensile strength and hardness of the hybrid composites were examined. SEM images reveal the nearly uniform distribution of dual particles throughout the matrix. The tensile tests showed that the tensile load of the composites increased with the increase in weight percentage of dual particles. The test results showed that the composites reinforced with 20wt%Al2O3/3wt%Gr reveal higher compression strength, yield strength, tensile strength and hardness compared to the pure Al matrix.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic search on summarized RDF triples","authors":"P. Gayathri, V. Rajendran","doi":"10.1109/I2C2.2017.8321904","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321904","url":null,"abstract":"Information is for the most part found inside databases of some kind. Coordinating these information would give advantages to the associations that claim these information. RDF is a general recommendation dialect for the Web, binding together information from different sources. SPARQL, a query language for RDF, can join information from various databases. Querying a huge RDF informational collection is to a great degree time consuming. Submitting a SPARQL query to a more promising subgraph will increase speed and reduce search space. For this, RDF summarization is done. Existing systems either use graph-based techniques for summarizing RDF or divide RDF triples simply based on its elements. RDF though possessing a graph like structure, cannot be expected to have every features of graph structure. And simple partitioning based on triple elements is also inefficient. In this paper, RDF dataset is first partitioned based on predicate similarity. These partitions are clustered based on semantic relatedness between predicates, so that more similar triples come in a single cluster. The RDF cluster graphs thus obtained are stored in Jena Tuple DataBase(TDB) as named graphs. SPARQL querying, is done on this named graph collection. A list of models that the SPARQL query require is obtained from index and querying is done on this union of graphs. The proposed algorithm is faster as search space is reduced and is also scalable.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"42 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating analytic insights on human behavior using image processing","authors":"Namit Juneja, R. Muthu","doi":"10.1109/I2C2.2017.8321802","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321802","url":null,"abstract":"This paper proposes a method to track human figures in physical spaces and then utilizes this data to generate several data points such as footfall distribution, demographic analysis, heat maps as well as gender distribution. The proposed framework aims to establish this while utilizing minimum computational resources while remaining real time. It is often useful to have information such as what kind of people visit a certain place or what hour of the day experiences maximum activity, Such analysis can be used improve sales, manage huge number of people as well as predict future behaviour. The proposed framework is designed in a way such that it can take input streams from IP cameras and use that to generate relevant data points using open source tools such as OpenCV and raspberryPi. The system uses the AdaBoost Algorithm, HOG detectors and Fisher Faces and just like any other e-commerce platform can generate data points useful in several situations.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123456070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region based image classification using watershed transform techniques","authors":"M. S. Pawar, Louis Perianayagam, N. Rani","doi":"10.1109/I2C2.2017.8321839","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321839","url":null,"abstract":"Massive increase in the degree of data in online data repositories desires the need of efficient data retrieval and management. The current state of art algorithms are adept in information retrieval concerned with text type data and to the success rate of almost 99%. However the information retrieval based on multimedia data like images needs more revisions so as to obtain the expected outcome. In this paper, the research objective is to classify the images based on the shape and regional characteristics. The categories of images considered include fruits and vegetables. The proposed technique for image classification employs watershed transform for segmentation and from which the Haar wavelet features are computed and are directed for classification using SVM, KNN and Naïve Bayes classifier. A voting based technique is employed for classification of images and the overall accuracy of the system is about 90%.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124820001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic channel access with asynchronous sleep-wake scheduling to improve energy efficiency in CRSNs","authors":"S. Akhila, K. Priya","doi":"10.1109/I2C2.2017.8321843","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321843","url":null,"abstract":"Wireless sensor network (WSN) suffer uncontrolled interference while using license free spectrum due to the increasing crowd in the band. The cognitive radio (CR) is a promising solution for this problem. CR technology can be applied in WSN to form cognitive radio sensor network (CRSN). With the consideration of energy consumption of channel sensing and switching, when the sensor nodes should sense and switch to a licensed channel due to increased packet loss rate in licensed free channel can be determined. Two dynamic channel accessing schemes are proposed for intra-cluster data transmission and inter-cluster data transmission. The opportunistic channel sensing improves the energy efficiency in CRSNs. And also an asynchronous sleep-wake scheduling mechanism is used for reducing energy consumption. This scheduling mechanism allows the sensor nodes to sleep when the nodes are not participating in data transmission, by that network lifetime can be increased. Simulation results demonstrate that the channel accessing schemes and asynchronous sleep-wake scheduling scheme can significantly reduce the energy consumption and effectively achieves network lifetime extension in CRSNs.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and simulation of multiband fractal antenna with various geometries","authors":"M. Sowmya, P. Nagaraju, Shveta B Totad, K. Rakesh","doi":"10.1109/I2C2.2017.8321867","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321867","url":null,"abstract":"Paper highlights two different fractal based rectangular microstrip patch antenna has proposed for multiband operation with low profile. The recommended design of antenna achieved by basic patch antenna using RT/Duroid as substrate of εr (2.2)and height of (1.575mm)and two fractal geometries are Sierpinski Carpet and Minkowski has applied on patch antenna and process carried up to three iteration, same process is carried on rectangular microstrip patch antenna using another substrate is FR4 εr of (4.4) and height of (1.6mm), the antennas results are VSWR, Return loss and gain is obtained by simulation and results of different substrate are compared, the simulation of proposed antenna is done using HFSS v 15 (high frequency structure simulator). And are able to operate in S and C band.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of road sign recognition for ADAS using OpenCV","authors":"Naina P Botekar, M. Mahalakshmi","doi":"10.1109/I2C2.2017.8321941","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321941","url":null,"abstract":"Real time Road sign recognition technology of advanced driver assistance systems (ADAS) provide necessary information and instructions to help the driver to drive safely. Road sign recognition is the technology of driver assistance system which interprets the signs to the driver. Recognition is dependent on the combination of detection and classification. Among the various available methods the most efficient one is chosen. Thus detection of region of interest is performed by using Histogram of oriented gradient and classification by using support vector machine. Training data is generated from our own database. This paper represents a study to recognize road signs using OpenCv techniques. This is implemented in visual studio and ported on NVIDIA's TK1 platform. The experimental results shows good performance for recognition of ideogram based signs with an average speed of 25 frames per second having accuracy up to 94%.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coverage path planning for an autonomous robot specific to agricultural operations","authors":"S. Kalaivanan, R. Kalpana","doi":"10.1109/I2C2.2017.8321955","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321955","url":null,"abstract":"Acute labor shortage and an increase in daily wages are forcing farm owners to move towards automated machinery. While the industrial revolution in India has significantly induced the shift towards machinery from indigenous equipment, we are still lagging behind in the field of automated equipment for agriculture. The key component for such systems is the path planning methodology used. A specific class of such an algorithm known as coverage path planning (CPP) is utilized for covering farmlands to perform various operations such as seeding, tilling, ploughing or spraying fertilizers and pesticides. This paper presents a novel CPP algorithm for automated machinery intended for usage in agriculture. In order to reduce the directional constraints, the proposed algorithm utilizes a high-resolution grid map representation of the environment. Free space is covered by distinguishing the grid cells as covered, unexplored, partial obstacle and obstacle cell. A distance transformation function is used to determine the order of covering unexplored cells as well as the shortest path to them, in the given environment. The performance of the proposed algorithm is evaluated with metrics such as completeness of coverage, time efficiency and also robustness to changes in the environment. Robotic Operating System (ROS) and Gazebo were used for simulating the proposed algorithm. The results prove the feasibility of the proposed algorithm to be implemented for automated systems to perform efficient coverage in agricultural operations.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}