{"title":"An optimal human tracking propagation using enhanced IRIS pattern in large scale biometrie environment","authors":"M. Kowsigan, R. Roshini, V. Roopa, S. Shobika","doi":"10.1109/I2C2.2017.8321893","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321893","url":null,"abstract":"Iris technology is used in various fields especially for security purposes like for as in military, data centers and airports because of its eccentricity and firmness. Among all other data from biometric such as fingerprint, voice-pattern and various data from soft biometric, iris proves it is the most efficient and unreplicable easily. This proposed approach is a concept of tracking every citizens of the nation all stages through his life from birth to death. Iris pattern of the person is captured and saved in the government database and the additional details has also been added corresponding to it. Once a person is registered, it gets automatically updated throughout all stages of his life until death. Till now for demographic analysis the government officials takes the census once in every five years. This system reduces the complexity by avoiding periodic updating of database and he effort that the government takes for this analysis. Daughman's algorithm is utilized in this project for its high percentage of accuracy. Hence, this project proposes the method of caching the population statistics with security and effective maintenance.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on sniffing attacks on computer networks","authors":"P. Anu, Dr.S. Vimala","doi":"10.1109/I2C2.2017.8321914","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321914","url":null,"abstract":"Generally Malicious users make use of different attacks at different levels to steal different level of data. Some of the sniffing attacks that can be used in different levels of networking/transmission are Media Access Control (MAC) Flooding, Dynamic Host Configuration Protocol (DHCP) Attacks, DHCP Starvation Attack, Rogue DHCP Server Attack, Address Resolution Protocol (ARP) Spoofing, MAC spoofing and Domain Name Server (DNS) Poisoning. In this paper, a comparative study has been done with the above mentioned sniffing attacks and the level of recovery that can be done with each sniffing attack.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, analysis and comparison of the performance of 24 element swastik — Novell shaped microstrip patch antenna array","authors":"B. Girish, G. Sadashivappa","doi":"10.1109/I2C2.2017.8321917","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321917","url":null,"abstract":"The paper discusses, compares and presents the design of an 24 element microstrip patch antenna array consisting of 12×12 patch elements arranged in a Novell shape called Swastik for WiMax applications. The array of twelve by twelve patch elements with five Co-axial feed points with metallic body surrounding each patch and rectangular transmission medium connecting each patch based on inset feed impedance matching technique was designed and simulated using High Frequency Structural Simulator (HFSS) tool. The simulation result obtained from the tool was compared with the theoretical values which provides a good agreement between the simulated and theoretical results. The performance of the 24 element Swastik-shaped patch array was compared with various patternsshapes of existing arrays in terms of return loss, directivity and gain. The result shows a good progressive performance than the existing patch antenna arrays.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An authorized security middleware for managing on demand infrastructure in cloud","authors":"S. Manishankar, C. Arjun, P. A. Kumar","doi":"10.1109/I2C2.2017.8321827","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321827","url":null,"abstract":"Recent increases in the field of infrastructure has led to the emerging of cloud computing a virtualized computing platform. This technology provides a lot of pros like rapid elasticity, ubiquitous network access and on-demand access etc. Compare to other technologies cloud computing provides many essential services. As the elasticity and scalability increases the chance for vulnerability of the system is also high. There are many known and unknown security risks and challenges present in this environment. In this research an environment is proposed which can handle security issues and deploys various security levels. The system handles the security of various infrastructure like VM and also handles the Dynamic infrastructure request control. One of the key feature of proposed approach is Dual authorization in which all account related data will be authorized by two privileged administrators of the cloud. The auto scalability feature of the cloud is be made secure for on-demand service request handling by providing an on-demand scheduler who will process the on-demand request and assign the required infrastructure. Combining these two approaches provides a secure environment for cloud users as well as handle On-demand Infrastructure request.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133725449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new de-blurring technique for license plate images with robust length estimation","authors":"P. S. Rao, R. Muthu","doi":"10.1109/I2C2.2017.8321796","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321796","url":null,"abstract":"Recognizing a license plate clearly while seeing a surveillance camera snapshot is often important in cases where the troublemaker vehicle(s) have to be identified. In many real world situations, these images are blurred due to fast motion of the vehicle and cannot be recognized by the human eye. For this kind of blurring, the kernel involved can be said to be a linear uniform convolution described by its angle and length. We propose a new de-blurring technique in this paper to parametrically estimate the kernel as accurately as possible with emphasis on the length estimation process. We use a technique which employs Hough transform in estimating the kernel angle. To accurately estimate the kernel length, a novel approach using the cepstral transform is introduced. We compare the de-blurred results obtained using our scheme with those of other recently introduced blind de-blurring techniques. The comparisons corroborate that our scheme can remove a large blur from the image captured by the camera to recover vital semantic information about the license plate.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116897588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data acquisition and delay optimization in WSN using knapsack algorithm in presence of transfaulty nodes","authors":"T. P. Shamna, P. Praveen","doi":"10.1109/I2C2.2017.8321829","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321829","url":null,"abstract":"The wireless sensors has wide range of applications. The sensor network consist of many tiny sensors and each sensor is assigned to perform specific mission that is some node are transmitting node some are receiving and others are intermediate sensing nodes. Once sensor nodes are deployed, thereafter no additional actions are performed. In typical WSNs, the sensor nodes collect the information from the environment and the collection of the data is done in the intermediate nodes. The collected data is the send to the base station. Reliable communication, power efficiency and network survivability issues are critical concerns, because all the operation is done in sensor nodes. Energy consumption and end to end delay is a major issue in WSNs [8]. In this work we propose a scheme named data acquisition along with knapsack algorithm for reliable and efficient data transmission and delay optimization in the presence of transfaulty nodes. To prevent information loss in WSN due to transfaulty behavior of sensor nodes, in the proposed scheme we construct the network using sensor nodes having dual mode of communication — RF, acoustic and also we use knapsack algorithm for reliable data transmission. Knapsack algorithm is to increase the in-order packets and decrease the out-of-order packets simultaneously, which helps for delay optimization. This scheme has better energy efficiency and reduced delay.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on video genre classification techniques","authors":"Dharti M. Bhoraniya, T. Ratanpara","doi":"10.1109/I2C2.2017.8321886","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321886","url":null,"abstract":"With recent advances in digital technologies the amount of multimedia data is increasing every day. Therefore, there is a strong demand for a procedure that classifies multimedia data according to users need. Video genre classification system is used to classify audio or video content into different genres. In this paper, various video genre classification literature is surveyed. It is observed that different audio and visual features are used for classification. Many classifiers such as support vector machine, K-nearest neighbor, neural network and gaussian mixture model are used. Applications and issues in video genre classification are discussed. Paper is ended with conclusion and an idea for future work.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132543377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inverted L-shaped slotted microstrip patch antenna with DGSfor X-band applications","authors":"R. Kiruthika, T. Shanmuganantham, Rupak Gupta","doi":"10.1109/I2C2.2017.8321901","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321901","url":null,"abstract":"In the paper, a Rectangular microstrip patch antenna under two operating frequencies for radar application is presented. The design model is included with double headed arrow DGS on the ground plane to advance the performance of the antenna. A low cost FR4 (Flame Retardant — Grade 4) material is used as the dielectric substrate. The range of X-band frequency is from 8 to 12 Gigahertz and is broadly used in radar and military applications. The proposed model is made to resonate under two frequencies in X-band. The Ansoft High Frequency Structural Simulator (HFSS) Version 12 software is used to design the model and to analyze the results. A return loss value of −18.16 dB and −30.55 dB is obtained for a frequency of 8.15 GHz and 10.84 GHz with a bandwidth of 280 MHz and 300 MHz respectively. The parameters like directivity, current distribution and gain are also explained in the paper.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"107 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132727347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure frequent itemset mining from horizontally distributed databases","authors":"K. Harikrishnasairaj, V. Prasad","doi":"10.1109/I2C2.2017.8321937","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321937","url":null,"abstract":"We propose a protocol for hiding the infrequent itemsets in horizontally distributed databases. Databases are horizontally partitioned when they are distributed among different players. Each player holds identical schema, but have information on different objects. Mining of frequent itemsets existed in databases of different players cause sensitive data leakage from one player to another player or to any third party. Mining should not reveal any players locally supported frequent itemsets among themselves or any third party. In order to maintain privacy, security is needed. We can provide the partial security to the item sets by removing infrequent subsets from the candidate item sets. In this thesis, a protocol for deriving frequent itemsets from horizontally distributed databases which does not leak secret information of the participating players in mining has been implemented. This protocol uses Fast Distributed Mining (FDM) algorithm which is given by Cheungetalet.el[3]. FDM algorithm uses the technique of Apriori[1] Algorithm to mine the frequent itemsets from distributed environment.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of CT and PET image fusion using hybrid algorithm","authors":"Gauri D. Patne, P. A. Ghonge, K. Tuckley","doi":"10.1109/I2C2.2017.8321861","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321861","url":null,"abstract":"In image processing Image Fusion used in medical images for accuracy of successful diagnosis of disease. Image fusion process gives highly informative image as it combines the information from two or more images into a single image. This paper explains the concept of image fusion using hybrid algorithm for multimodality medical images The structural details of body parts, like CT, MRI, and functional details of cell activity in the organ, like PET are important for analysis. So, this work shows fusion of CT and PET images. Discrete Wavelet Transform (DWT), Stationary Wavelet Transform (SWT), Discrete Curvelet Transformation (DCT) and Principal Component Analysis (PCA) are most widely used image fusion algorithms. Hybrid algorithm is developed by integrating the conventional and advance fusion methods to overcome their demerits and enhance the image processing qualities The various algorithms are studied, observed and compared the results using the performance MSE, PSNR and ENTROPY.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122440282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}