2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
An IoT based soil moisture monitoring on Losant platform 基于物联网的Losant平台土壤湿度监测
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918063
R. Kodali, A. Sahu
{"title":"An IoT based soil moisture monitoring on Losant platform","authors":"R. Kodali, A. Sahu","doi":"10.1109/IC3I.2016.7918063","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918063","url":null,"abstract":"The Internet of Things (IoT) is converting the agriculture industry and solving the immense problems or the major challenges faced by the farmers todays in the field. India is one of the 13th countries in the world having scarcity of water resources. Due to ever increasing of world population, we are facing difficulties in the shortage of water resources, limited availability of land, difficult to manage the costs while meeting the demands of increasing consumption needs of a global population that is expected to grow by 70% by the year 2050. The influence of population growth on agriculture leads to a miserable impact on the farmers livelihood. To overcome the problems we design a low cost system for monitoring the agriculture farm which continuously measure the level of soil moisture of the plants and alert the farmers if the moisture content of particular plants is low via sms or an email. This system uses an esp8266 microcontroller and a moisture sensor using Losant platform. Losant is a simple and most powerful IoT cloud platform for the development of coming generation. It offers the real time data visualization of sensors data which can be operate from any part of the world irrespective of the position of field.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Low cost ambient monitoring using ESP8266 采用ESP8266的低成本环境监测
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918788
R. Kodali, K. S. Mahesh
{"title":"Low cost ambient monitoring using ESP8266","authors":"R. Kodali, K. S. Mahesh","doi":"10.1109/IC3I.2016.7918788","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918788","url":null,"abstract":"A different language is different vision of life. Micropython is the open source scripting language and an interpreter that expresses the concepts in fewer lines of codes. This high level language possesses clear and expressive codes which is designed to respond to the actions. It is a lean and efficient implementation of python 3 programming language that comes with the quick language feedback and is optimized for interactive input to run on microcontroller or embedded systems. This functional and dynamic programming language is ported to ESP8266 board. The DHT11 sensor is interfaced with ESP8266 board to sense the ambient conditions like temperature and humidity. The dht module which is confined to DHT sensor is being imported to perform its programming task. The OLED display used here have dimensions of 128×64, it has an I2C interface and can be driven by SSD1306 driver. Firstly, the library for the SSD1306 driver of the chip needs to be imported. The ESP8266 board have two connections, one with the DHT11 sensor to sense the temperature and humidity, and the second with OLED display to show the collected information of temperature and humidity from DHT11 sensor on to the screen. These all are implemented using lean and efficient Micropython language and thus it is easy to control hardware and connected devices using Micropython.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Implementation of neural network for channel estimation in OFDM network OFDM网络中信道估计的神经网络实现
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918004
Ravinder Kaur, Rinkesh Mittal
{"title":"Implementation of neural network for channel estimation in OFDM network","authors":"Ravinder Kaur, Rinkesh Mittal","doi":"10.1109/IC3I.2016.7918004","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918004","url":null,"abstract":"Channel estimation is an important field of interest in wireless OFDM networks. Lot of work has been done in this field, but only few techniques has presented good efficiency in channel estimation in OFDM network. This paper has presented the neural network based channel estimation for OFDM network using Raleigh channel. From result simulation, it has been concluded that obtained values of Mean Square Error (MSE) and Bit Error Rate (BER) are satisfactory using neural network in MATLAB environment.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126511808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm for fuzzy based compression of gray JPEG images for big data storage 基于模糊压缩的灰度JPEG图像大数据存储算法
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918019
N. Kaur, N. Bawa
{"title":"Algorithm for fuzzy based compression of gray JPEG images for big data storage","authors":"N. Kaur, N. Bawa","doi":"10.1109/IC3I.2016.7918019","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918019","url":null,"abstract":"In the current era of big data and data mining, efficient storage of images is very important. In the collected datasets from blogs or social network sites, images are one of the prominent part of that datasets. Images took very large space for storage and even loading when required by the third party. So, image compression is one of the important part in big data and effective data mining. These applications require rapid image processing both at the front and back end. So, one of the most important step in storing and retrieving images is the effective compression of images. Images should be stored in compressed form and compression should not decrease the quality of the image. Many standards for compression of grey images are available. However, this area is still open for research purpose. Moreover, increase in variety of images over the internet demand the use of fuzzy based compression techniques, as also mentioned. In this paper, fuzzy based technique is used for compressing the grey JPEG images. It provides high level of compression and reduced level of errors in the images. Proposed technique also reduced different type of artifacts such as blocking artifacts, ringing artifacts and false contouring. Proposed compression can be effectively used for big data based storing and retrieval of images.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of signal behavior through dynamic traffic control: Proposed algorithm with traffic profiling 基于动态交通控制的信号行为优化:基于交通分析的算法
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918033
Bhushan S. Atote, Dr Mangesh Bedekar, S. Panicker, Taranpreet Singh, S. Zahoor
{"title":"Optimization of signal behavior through dynamic traffic control: Proposed algorithm with traffic profiling","authors":"Bhushan S. Atote, Dr Mangesh Bedekar, S. Panicker, Taranpreet Singh, S. Zahoor","doi":"10.1109/IC3I.2016.7918033","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918033","url":null,"abstract":"The current scenario of traffic signals in India is fixed time, leading to more pollution, wastage of time and precious fuel. This paper proposes the method to make traffic signals intelligent with the dynamic signal values on the basis of different parameters. This method shall drastically reduce time, fuel and also suggest alternate routes that are congestion free. There are different adaptive strategies for traffic control but with their limitations of particular region and junctions, it is required to make it more precise for a specific network of junctions. For creating the real traffic scenario, consider that all vehicles are equipped with the Bluetooth devices. Our proposed algorithm shows the dynamic traffic control and traffic profiling for the given time.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"92 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new design of digitally controlled oscillator for low power applications 一种适用于低功耗应用的新型数字控制振荡器
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918047
S. Dabas, Manoj Kumar
{"title":"A new design of digitally controlled oscillator for low power applications","authors":"S. Dabas, Manoj Kumar","doi":"10.1109/IC3I.2016.7918047","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918047","url":null,"abstract":"With the utilization of all-digital Phase locked loops (ADPLLs) in digital communication systems, the use of digitally controlled oscillators (DCO) over voltage controlled oscillators (VCO) has come into existence. In this paper, a new low power DCO structure is proposed with NMOS transistor as switching network. The DCO design is based on the CMOS inverter delay cells and ring topology. Three and five stages DCO architecture with three and four control bits have been designed here with a NMOS switching network. Three-bit DCO with three delay stages shows a variation of output frequency and power consumption in the range of 1.804–2.629 GHz and 44.464–73.023 μW, respectively. For three-bit five-stages DCO the output frequency and power consumption varies in the range of 1.004–1.479 GHz and 74.107–121.705 μW. A four-bit, three-stages DCO shows a variation of output frequency and power consumption in the range of 1.948–2.875 GHz and 44.464–85.489 μW. Similarly, a four-bit five-stages DCO provides a variation of output frequency and power consumption in the range of 1.115–1.676 GHz and 74.107–142.482 μW. The control bits for the three-bit DCO are varied from [001] to [111] and for four-bit DCO the control bits are varied from [0001] to [1111]. The simulations are done using Mentor Graphics tool with TSMC 0.18 μm CMOS technology.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
H-WSN with maximized QoS using secure data aggregation 利用安全数据聚合实现QoS最大化的H-WSN
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917950
Renuka D. Suryawanshi
{"title":"H-WSN with maximized QoS using secure data aggregation","authors":"Renuka D. Suryawanshi","doi":"10.1109/IC3I.2016.7917950","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917950","url":null,"abstract":"To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A study on disruption tolerant session based mobile architecture 基于容错会话的移动架构研究
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7918795
S. Vijayan, R. Divya
{"title":"A study on disruption tolerant session based mobile architecture","authors":"S. Vijayan, R. Divya","doi":"10.1109/IC3I.2016.7918795","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7918795","url":null,"abstract":"There are lots of Challenges while using IP mobility. Among that route optimization and frequent handover is most important. Preserving communication between two moving end points on the Internet is difficult. For efficient mobility multiple access points are needed, so frequent handover is always needed for getting appropriate access points. Handling mobility will leads to performance degradation. Also unexpected disconnection is problematic for session-based applications which maintains state and consume resources. Thus stability and connectivity are the notable challenges for a smooth data transmission in the mobile environment. A disruption Tolerant Session based Mobile Architecture is a method suitable to solve these problems. A Disruption tolerant Session based Mobile Architecture is a solution that allow minimum disconnection time to enable seamless mobility. This architecture is a TCP based Application suitable for secure connection establishment, reliable end to end transmission. The session scheme used in the architecture allows mobility for TCP-based applications which need flexibility to failures, delays or disconnection and also provides session services, such as tracking mobile nodes, detecting disruptions, and suspending and resuming sessions with efficiency, security, and reliability. By using this architecture disruptions can be detected in microseconds and recovery takes only milliseconds.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"118 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure AODV routing protocol based on homomorphic digital signature 基于同态数字签名的安全AODV路由协议
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917980
G. Jain, Gajendra Singh Rajawat
{"title":"Secure AODV routing protocol based on homomorphic digital signature","authors":"G. Jain, Gajendra Singh Rajawat","doi":"10.1109/IC3I.2016.7917980","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917980","url":null,"abstract":"Mobile hosts in a Mobile Ad-Hoc Network are linked by wireless links without usual routing infrastructure and link fixed routers. Ad-Hoc Distance vector Routing (AODV) is among one of the prominently used routing protocol for packet transfer from source to destination. It relies on maintaining most recent information, for which, each ad-hoc node maintains hop count and sequence number field. Ad-hoc nodes are prone to security attacks because of their mutable nature. Analogously, routing updates are transmitted in clear text, which again poses a security hazard. In this paper, we will propose an improved version of AODV routing protocol using Homomorphic Encryption Scheme which prevents pollution attack and accomplishes in maintaining Integrity Security Standard by following minimum hop count path. Simulation mechanism is used to evaluate HAODV Routing Scheme and results show that improved throughput and ETE delay can be obtained.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of back propagation training algorithms for software defect prediction 软件缺陷预测的反向传播训练算法比较
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2016-12-01 DOI: 10.1109/IC3I.2016.7917934
Ishani Arora, A. Saha
{"title":"Comparison of back propagation training algorithms for software defect prediction","authors":"Ishani Arora, A. Saha","doi":"10.1109/IC3I.2016.7917934","DOIUrl":"https://doi.org/10.1109/IC3I.2016.7917934","url":null,"abstract":"The cost of deleting a software bug increases ten times as it is floated onto the next phase of software development lifecycle (SDLC). This makes the task of the project managers difficult and also degrades the quality of the output software product. Software defect prediction (SDP) was proposed as a solution to the problem which could anticipate the defective modules and hence, deal with them in an efficient and effective manner in advance. The adequacy of artificial neural networks (ANNs) to handle the complex nonlinear relationships between the software metrics and the defect data demonstrates their suitability to build the defect prediction models. In this paper, multilayer feed forward back propagation based neural networks were constructed using seven defect datasets from the PROMISE repository. An empirical comparison of Levenberg-Marquardt (LM), Resilient back propagation (RP) and Bayesian Regularization (BR) back propagation training algorithms was performed using statistical measures such as MSE and R2 values and the parameters computed from the confusion matrix. Bayesian based back propagation training method performed better than the LM and RP techniques in terms of minimizing mean square error and type II error and maximizing accuracy, sensitivity and R2 value. An accuracy of more than 90 percent was achieved by BR on all the seven datasets and the best data fit during the regression analysis was shown with a R2 value of 0.96. Overall, it is the context and the criticality of the software project which will aid the project managers to prioritize the performance measures and hence, decide upon the training algorithm to be applied, according to the goals and resources available.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127756784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信