{"title":"5G: An overview of Channels characteristics and modelling techniques","authors":"K. Bhardwaj, Anant Singh, V. Sachan","doi":"10.1109/PDGC.2018.8745875","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745875","url":null,"abstract":"Beyond 2020, the era will belong to new and better communication systems named Fifth Generation of communication (5G) systems. To fulfil the service demands and to overcome the technologicalchallenges regarding 5G communication systems, some common standards specifying networks speeds up-to 10 Gbps, greater cell edge rate nearly 90–110 Mbps and latency below 1ms are selected by various telecommunication industries. These standards can be obtained, if the spectrum bands in the range of 100 GHz are explored by the industries, because wider bandwidth channels are available there. In these bands, 5G systems can be employed, if we found accurate radio propagation models. But current channel models for bands below 6 GHz are unable to adderess these. An overview of channel models and 5G channel characteristics for bands up to 100 GHz are given this article. The paper summarizes the major outcomes and observations of previous publications and experiments like ray tracing, done by various academic organisations and industries.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Analytics for Crop Prediction Mode Using Optimization Technique","authors":"Shivi Sharma, Geetanjali Rathee, H. Saini","doi":"10.1109/PDGC.2018.8746001","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8746001","url":null,"abstract":"Agriculture is considered as the backbone of our country's economy. Big data analysis is used to discover novel solutions, which act as means for analyzing bulky data set, so that it plays a significant role for decision making in specific field such as agriculture. In this work, soil and environment features i.e. average temperature, average humidity, total rainfall and production yield are used in predicting two classes namely: good yield and bad yield. For this purpose, a hybrid classifier model is used in optimizing the feature and the proposed approach is divided into three phase's viz pre-processing, feature selection and SVM_GWO i.e grey wolf optimizer along with Support Vector machine (SVM) classification is used to improve the accuracy, precision, recall and F-measure. The result shows that SVM_GWO approach better as compared to typical SVMs classification algorithm.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Biometric Based Security Systems","authors":"Sheikh Imroza Manzoor, A. Selwal","doi":"10.1109/PDGC.2018.8745722","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745722","url":null,"abstract":"Human recognition using their biological, behavioral, physiological, and chemical traits is a contemporary as well as a secured approach. A series of biometric-based systems have been deployed in various computing applications. The biometric-based systems are exposed to a variety of failures. In this paper, security analysis of various fingerprint biometric systems are presented and a fingerprint-based biometric system is briefly explained. It has been observed that the security of the biometrical information and overall performance of the system has a trade-off. It has also been noticed that a secured biometric system with lower equal error rates (EER) and higher identification accuracy is still a challenging task for researchers.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manvinder Sharma, Sohni Singh, Dishant Khosla, Sumeet Goyal, A. Gupta
{"title":"Waveguide Diplexer: Design and Analysis for 5G Communication","authors":"Manvinder Sharma, Sohni Singh, Dishant Khosla, Sumeet Goyal, A. Gupta","doi":"10.1109/PDGC.2018.8745914","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745914","url":null,"abstract":"Diplexers circuits are recurrently used for mobile communications for 5G and satellite communication and used to separate the high power wide-band of transmission band from the error prone reception frequency range. Various telecommunication services like navigation system or television systems are based on satellite communication. for speed considerations, and in order to manage IoT devices diplexer devices are used. Diplexer is improvement over the microwave filters. This paper presents the analysis of simulated WR-28 waveguide that is used for Ka-Band. The cut off frequency in dominant mode is 30.4 GHz. The design is simulated over a frequency ranging from 20 to 50 GHz.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Different 2D Predictors for Lossless Compression of Biomedical Images","authors":"Urvashi, Emjee Puthooran, M. Sood","doi":"10.1109/PDGC.2018.8745809","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745809","url":null,"abstract":"Hospitals and clinical environments are moving towards computerization and digitization and the volume of digital images generated for medical diagnosis is extremely large, dealing with images of increasing resolution. The increase in resolution requires a growing amount of medical image data to be stored, processed and transmitted through network efficiently. Therefore, compression techniques are indispensible for archival and communication of medical images. Predictive based coding techniques are explored in this paper for better compression and reconstruction as it performs well for lossless compression. This paper gives a comparative analysis of predictor coding efficiency and complexity on medical images of different modalities. It was observed that among different predictors Gradient Edge Detection (GED) predictor gave better results than Median Edge Detector (MED). It also achieves approximately the same root mean square error (RMSE) and entropy as Gradient Adaptive Predictor (GAP) with less complexity.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Maurya, Dipty Tripathi, Amitabha Biswas, A. Tripathi
{"title":"Design Issues in Distributed Software","authors":"A. Maurya, Dipty Tripathi, Amitabha Biswas, A. Tripathi","doi":"10.1109/PDGC.2018.8745919","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745919","url":null,"abstract":"With the advent of fast advancing microprocessor technology, software designers and users in various fields tend to use distributed software to solve realworld problems. The researchers already worked on the issues regarding the distributed systems. Now, in this work, we identify and address the design issues underlying distributed software. Before this, we give the motivation behind the development of distributed software and describe the objectives that should be addressed when dealt with the issues of distributed software. Further, we carefully analyze and locate constraints related to identified issues, that become associated challenges in the context of the objectives governing the distribution idea.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative Caesar cipher using grayscale image pixel values as keys","authors":"Namas Bhandari","doi":"10.1109/PDGC.2018.8745973","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745973","url":null,"abstract":"The susceptibility of conventional Caesar cipher as a tool for encryption is a known fact not only due to its simplicity but also its practical infeasibilities. The requirement in today's complex age is of a method which has higher effectiveness in terms of being immune to cryptanalysis and at the same time is simple to implement. This paper is about a distinctive methodology by incorporation of a scheme that combines the use of dynamically generated keysets from grayscale images and a modified cipher. The unique aspect proposed yields higher security as each keyset derives its key values from the respective grayscale image which are used iteratively in the modified algorithm. Every iteration in the algorithm makes use of a different key value from the keyset, producing a new cipher-text in each iteration. Cipher-text produced in every iteration is encrypted in the succeeding iteration. This process repeats until all key values are used to obtain a highly-encrypted form of cipher-text. Hence, this sequential and iterative approach is proposed as an effective solution for present-day requirements of information security.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Title Page","authors":"","doi":"10.1109/pdgc.2018.8745946","DOIUrl":"https://doi.org/10.1109/pdgc.2018.8745946","url":null,"abstract":"","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jigyasa Handa, Arjeeta Singh, A. Goyal, Parth Aggarwal
{"title":"Behavioral Biometrics for Continuous Authentication","authors":"Jigyasa Handa, Arjeeta Singh, A. Goyal, Parth Aggarwal","doi":"10.1109/PDGC.2018.8745880","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745880","url":null,"abstract":"Smartphones, tablets, laptops and PCs have brought across the revolution of always on, always connected. They have become ubiquitous in our lives. Smartphones and tablets combine and extend the functionality of feature phones and desktop computers. They give us an opportunity to play, work and socialize whenever and wherever we want. It has now become a standard and an everyday gadget. We use it for everything and thus it has the most private and sensitive information. It has become susceptible to a lot of privacy issues if it reaches the hand of an outsider. There exist a potential risks if our mobile phones get stolen or are ceased by an intruder. Mostly these devices have a one-step authentication process which consists of the initial login i.e. input of ID and password by the user to gain total access. But this doesn't take into consideration the situation of who accesses the device after the initial login. The detection of a fraudulent access isn't taken into consideration. To deal with this problem, continuous authentication is becoming quite popular in which the user is continuously monitored after the initial login authentication process is completed. This paper highlights the various continuous authentication methods which can be used to monitor our devices and analyze the current research, proposed framework and mechanisms that can be implemented or have already been implemented.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview on Microgrid System","authors":"V. Garg, Sudhir Sharma","doi":"10.1109/PDGC.2018.8745849","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745849","url":null,"abstract":"Demand of the electricity is increasing day by day due to industrial development and rise in living standards of human beings. The need of electricity can't be fulfilled alone by fossil fuels as they are depleting with passage of time. We have to find out others ways to fulfil the energy demand of such. In recent time, there is research going on in the field of renewable energy which seems to be achieving a great height day by day. Development of smart grid and microgrids are in a full swing. Along with development of distributed generation under smart and microgrid, there is need for managing the energy utilization too. In this paper, various terms related to microgrid, control structure, distributed energy sources and energy management in microgrid etc. are discussed and an overview is given to understand the microgrid.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}