{"title":"A Hybrid Secure and Energy Efficient Cluster Based Intrusion Detection system for Wireless Sensing Environment","authors":"B. Bhushan, G. Sahoo","doi":"10.1109/ICSPC46172.2019.8976509","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976509","url":null,"abstract":"Rapidly expanding application areas of wireless sensor networks (WSNs) that includes critical civilian and military applications intensifies the security concerns especially in hostile unattended environments. WSNs are comprised of huge number of energy constrained nodes whose battery replacement or recharging is a challenging task after their deployment. Therefore, in order to keep the network alive, communication between the nodes must employ load balancing techniques. This constrained nature of nodes makes it crucial to consider both energy efficiency and security in data collection approaches for WSNs. In this present work, we develop a Integrated IDS scheme (IIS) that integrates the concept of clustering along with and Digital signature. For heterogeneous systems, cluster-based protocols perform best as they work on divide and conquer strategy. In order to safeguard the transmitted data, a secured, lightweight digital signature scheme that employs symmetric cryptography is used. The proposed IDS scheme is compatible with the WSNs characteristics and is capable of efficiently protecting the network from wide range of security threats. The simulation as well as the theoretical results shows that the proposed scheme has noticeable improvement in energy consumption and overall security.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Art of Speech Recognition: A Review","authors":"Bhuvaneshwari Jolad, Rajashri Khanai","doi":"10.1109/ICSPC46172.2019.8976733","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976733","url":null,"abstract":"Speech recognition is conversion of human speech in to the text or control signal by the means of intelligent algorithms. Speech recognition plays vital role in many biometric authentication systems and voice controlled automation systems. Speech recognition is challenging task due to variation in recording devices, speakers, contexts, and environment. Speech recognition consists of three major steps such as speech preprocessing, feature extraction, and speech classification. This paper provides literature review on the various feature extraction and classification methods used in speech recognition system.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cancer Cell Detection Using Projective Transformation for Effective Segmentation","authors":"A. Mystica, G. Ramya, Raveena Judie Dolly","doi":"10.1109/ICSPC46172.2019.8976607","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976607","url":null,"abstract":"The research paper focuses on providing review of existing cancer detection techniques and the advancements that could be done for effective segmentation. The process in which many images of the similar variety are engaged and combined at distinct instance, from diverse angles and by distinct sensors is called as image registration. The idea proposed in this paper, is the image registration of MRI and CT scan of the same cancer affected patient followed by segmentation using ‘Projective Transformation’. It includes Marker-Controlled Watershed Segmentation. This is a process wherein, objects in touching images are divided into separate objects. This research is aimed at finding an efficient way to detect the cancer growth at different stages which in turn will help doctors to reduce the death rate due to cancer.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparitive Study of Hybrid Precoding Algorithms for millimeter wave Communication Systems","authors":"A. P. Teresa, S. Raj, M. Sherin","doi":"10.1109/ICSPC46172.2019.8976831","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976831","url":null,"abstract":"The evaluation of millimeter wave and massive MIMO is consider as a reliable technique for future 5G cellular wireless communication systems. As the bandwidth and frequency spectrum increases, the magnitude also shows a rise. The antennas used here are small in size but large in number is computed as precoder at transmitter and combiner at receiver with less number of training data streams. In is paper both algorithms, PE-AltMin and Kalman hybrid precoding are compared and in those algorithm analog and digital precoding are selected from the codebook which introduces the simulation result a high spectral efficiency was received when varying SNR low to High and number of users also increased small to large.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approaches of Detecting and Analyzing the Thyroid Disease: A Review","authors":"N. V. Kanase, S. Pangaonkar, A. Panat","doi":"10.1109/ICSPC46172.2019.8976748","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976748","url":null,"abstract":"Speech signal processing is one of the most interesting areas to work with. Speech signal consists of scads of information like gender categorization, various voice features, emotion characteristics etc. Every speaker and speech has its own special signal characteristics. This review is a proposed approach which is an analysis of various methods for detecting the thyroid diseases. Basically, thyroid is butterfly-shaped gland present in the lower anterior of the neck. This controls the metabolism of the body. Different methods used for detecting thyroid disease differentiating into two ways i.e. Biomedical Analysis and Signal Processing. In this review, diverse bio-medical methods like voice self-perceptual assessment, statistical analysis, complication analysis and surgical analysis has been explained. In signal processing method, CAD (Computer Aided Diagnosis) and Acoustic Voice Analysis approaches are found. The main approach of this review is to illustrate the various methods and approaches available to detect thyroid disorders.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nikhil, I. S. P. Kalyan, Jetty Sagar, M. Rohit, M. Nesasudha
{"title":"Li-Fi Based Smart Indoor Navigation System for Visually Impaired People","authors":"K. Nikhil, I. S. P. Kalyan, Jetty Sagar, M. Rohit, M. Nesasudha","doi":"10.1109/ICSPC46172.2019.8976661","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976661","url":null,"abstract":"A new emerging technology named Light Fidelity(Li-Fi) has been proposed to overcome the drawbacks of Wi-Fi technology, which provides faster data transmission and is based completely on the concept of binary data serving. Li-Fi works wherever the light is present and provides better bandwidth, efficiency, availability and security than Wi-Fi. Taking the advantages of this technology, Indoor navigation is provided for visually impaired people. The transmitter unit can be fitted to the wall or celling which modulates information and transmit it through LED which acts as communication source. Silicon photo diode serves as a receiving element and the receiver unit demodulates the modulated information and give audio response to the visually impaired people. A solution in this project is a simple user friendly, smart guidance stick is designed and Li-Fi communication is implemented to help visually impaired people by using AT Mega microcontroller.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to protect Power System using UPFC","authors":"Tareque Ali Habeebuddin, M. S. Potdar","doi":"10.1109/ICSPC46172.2019.8976780","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976780","url":null,"abstract":"Industrial revolution around the world ask the supply of ever increasing electrical power. The demand of electrical power is doubling in every decade that leads to build a very complex power system to satisfy the demand. In order to do so, electrical power is supplied via interconnected network of transmission line linking loads and generators into very large integrated network system. This vast supply of electrical power inherits many challenges. The planning, execution, operation, performance and analysis of such system is tedious job for the work engineer. In order to predict the performance of such interconnected complex system, an engineer has to follow more powerful tools for analysis. This paper is concern with dynamic performance of interconnected power system and a mean to control the parameters of power system using UPFC.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fractal Based Miniaturized Antenna for Wireless Body Area Network","authors":"A. Raj, M. Nesasudha","doi":"10.1109/ICSPC46172.2019.8976866","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976866","url":null,"abstract":"This work presents the design of flexible antenna using silicon based elastomer called polydimethylsiloxane (PDMS). PDMS is one of the most used polymer in designing the flexible antennas. It has transparent characteristics and can sustain stretching and flexible. It has low dielectric value and can have good band width. The antenna is prepared to work at 2.45GHZ. To reduce the SAR below the standard value of 1.6W/Kg. A second layer consist of metamaterial is placed backside. Copper is used as conductive layers. The simulation analysis of antenna is using reflection coefficient, radiation patterns, VSWR and SAR.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"54 26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense Against On-Off Attack in Trust Establishment Scheme for Wireless Sensor Network","authors":"R. R. Sahoo, Souvik Sarkar, Sudhabindu Ray","doi":"10.1109/ICSPC46172.2019.8976869","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976869","url":null,"abstract":"A Wireless Sensor Network (WSN) is successful only when it successfully accomplish the assigned task with strong cooperation among the nodes despite its deployment in the unattended and hazardous environment. Due to the open nature of deployment, WSN is vulnerable to various insider attacks. Therefore, to improve the security and cooperation among the nodes of the network the use of Trust Management System (TMS) is paramount. This paper proposes a lightweight and robust trust management system (DATE) to estimate the trust value among nodes of the WSN. The proposed TMS is developed based on five major components such as reward, severe penalty, lenient penalty, sliding window and misbehavior frequency. Further, this paper only considers the on-off insider attack from various other attacks in TMS. It is evident from the theoretical analysis and simulation results that the proposed TMS is not only achieved better on-off attack detection but also resilient against on-off attack, compared to other proposed techniques.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126940740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection and Security System for Blackhole Attack","authors":"I. Kaushik, Nikhil Sharma, Nanhay Singh","doi":"10.1109/ICSPC46172.2019.8976797","DOIUrl":"https://doi.org/10.1109/ICSPC46172.2019.8976797","url":null,"abstract":"Communication is considered as an essential part of our lives. Different medium was used for exchange of information, but due to advancement in field of technology, different network setup came into existence. One of the most suited in wireless field is Wireless Sensor Network (WSN). These networks are set up by self-organizing nodes which operate over radio environment. Since communication is done more rapidly, they are confined to many attacks which operate at different layers. In order to have efficient communication, some security measure must be introduced in the network ho have secure communication. In this paper, we describe various attacks functioning at different layers also one of the common network layer attack called Blackhole Attack with its mitigation technique using Intrusion Detection System (IDS) over network simulator ns2 has been discussed.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}