T. Bojan, Umamaheswaran Raman Kumar, Viswanathan Manihatty Bojan
{"title":"NFC based automation system for Tea plantation sector","authors":"T. Bojan, Umamaheswaran Raman Kumar, Viswanathan Manihatty Bojan","doi":"10.1109/ICOAC.2014.7229762","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229762","url":null,"abstract":"Recent advances in technology are making huge impact in all spheres of societies. In particular fields like entertainment, education, automobile, and telecommunication are receiving significant attention due to commercial aspects. There has been little interest towards technology deployment in the agriculture sector and the sector is desperately in need of it. In this paper, we have developed a new approach of deploying Near Field Communication (NFC) technology for Tea industries and study its applications.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic resource allocation with efficient power utilization in Cloud","authors":"S. Selvi, C. Valliyammai","doi":"10.1109/ICOAC.2014.7229730","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229730","url":null,"abstract":"In the Cloud, the most challenging task is to allocate resources for jobs. The major objective is to allocate resources to various tasks by reducing the CPU utilization of physical machines in the cloud. The various multi-agents look after the incoming jobs, schedules the jobs to various host machines, dynamically allocates jobs or tasks in other machines in order to reduce CPU power. VM migration is done through swapper agent when a host CPU utilization rises over the threshold value and if other hosts are working in less CPU power. So the agents can be used to migrate VMs from one node to another in run time, so that it can be stabilized and CPU utilization can be reduced. To increase the efficiency during allocation of virtual machine for jobs, a threshold based best fit algorithm is proposed to sort the VMs in the increasing order of CPU utilization. The power utilization is based on the number of hosts working at a certain period and the proposed strategy is used to reduce the power to improve the resource utilization in Cloud.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of reconfigurable DAB/DAB+ architecture using maximum likelihood path decoding","authors":"G. Priya, P. Bharathi","doi":"10.1109/ICOAC.2014.7229754","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229754","url":null,"abstract":"The broadcasting radio stations in several countries has benefitted by the usage of Digital Audio Broadcasting (DAB) technology, which replaces the usage of AM and FM broadcast services. An improved version of the Digital Audio Broadcasting technology is the DAB+ technology. These comprise of a transmitter and receiver systems for the transmission of the audio signal in the form of digital radio technology. In this paper, to achieve errorless audio signal the maximum likelihood Viterbi decoder in DAB/DAB+ is designed. The analysis has been carried out along with simulation studies under ModelSim Altera 6.4a that resulted in power and area efficient architecture. In order to show the efficiency of reliable DAB/DAB+ systems, the signal to noise ratio has been tabulated and executed with MATLAB Simulink tool.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic food recognition system for diabetic patients","authors":"P. Velvizhy, Pavithra, A. Kannan","doi":"10.1109/ICOAC.2014.7229735","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229735","url":null,"abstract":"There is good evidence that eating a healthy diet can reduce your risk of obesity and illnesses such as diabetes, heart disease, stroke, osteoporosis and some types of cancer. The food you eat contains different types of nutrients, which are all required for the many vital processes in our body. Our approach is to capture food and fed to Dense SIFT method, this method extract keypoint and visual vector from an image. Extracted visual vector are clustered using K-means clustering technique. Finally support vector machine classifier is used in this work, classifies the food image and measures the carbohydrate level from food image. Our proposed system is based on Bag of Feature (BoF) model.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qualitative risk avoidance methodology for categorization of mined opinions from online reviews","authors":"B. Dhanalakshmi, A. Chandrasekar","doi":"10.1109/ICOAC.2014.7229703","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229703","url":null,"abstract":"The rapid development of the Internet has spectacularly changed the mode that people articulate their opinions. Nowadays, people can liberally send reviews on any aspect of various websites to convey their individual opinions. As the opinions communicate the subjective thoughts, estimation, and conjectures of people in natural language, this type of contents contributed by internet users have been well acknowledged as valuable information. It can be oppressed to evaluate public reviews on a specific topic or product in order to classify out user like or dislike, etc. Opinion blend and mining are the methods to explore and summarize opinions from reviews in order to understand public perception on a specific topic or an entity. The intend of this paper is to determine opinions from online reviews and managing risk in future. Our projected methodology involves phases such as Data preprocessing, Content discovery, review mining and Risk investigation. Initially the formless data from the websites is extracted and preprocessed. This stage is used for formatting the fact before sentiment classification and mining. Finally, managing risk by using a qualitative risk assessment methodology for categorizing opinions from online reviews is done.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on security over data outsourcing","authors":"M. Thangavel, P. Varalakshmi","doi":"10.1109/ICOAC.2014.7229738","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229738","url":null,"abstract":"Today's world business depends on outsourcing the computing and storage. Lack of Security on Data Outsourcing is an important issue and becomes one of the wider areas in the Information science research field. The major challenges of outsourcing the data over un-trusted parties are providing confidentiality, maintaining integrity, Access control of multi- owners data, and user revocation of shared data. This paper addresses the analysis of security over data outsourcing on different concerns like Attribute based encryption (ABE), Key management, Anonymous authentication, User revocation and Access control. ABE is one type of a public key cryptosystem which has its more attraction for encrypting data, user revocation issues and access control particularly in case of data outsourcing. Securing and Managing the keys is as important as securing the data. Anonymous authentication is essential for the special cases where the user may wish to store sensitive data without revealing their identity. This paper surveyed all the different types of techniques used to enhance the security of outsourced data.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mercyshalinie, G. Madhupriya, S. Vairamani, S. Velayutham
{"title":"Defense against DoS attack: PSO approach in virtualization","authors":"S. Mercyshalinie, G. Madhupriya, S. Vairamani, S. Velayutham","doi":"10.1109/ICOAC.2014.7229709","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229709","url":null,"abstract":"Cloud Computing is a catchword in today's IT industry that nobody can escape. The technology offers reduced IT costs and provides on demand services to individual users as well as organizations over the internet. Cloud computing delivery its services through three different service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). One of the important service is IaaS. IaaS provides infrastructure including software, hardware, storage space, network bandwidth to users on demand over the internet. Cloud computing relies upon virtualization to provide services. Physical characteristics of resources are hide from end users by virtualization. Cloud environment faces threats from confidentiality, integrity, and availability (CIA). But availability considered as one of the most important threat in cloud environment. The vulnerability of Denial of Service (DoS) attack can affect the availability of cloud. One form of the DoS attack is Transmission Control Protocol (TCP)-SYN flood attack. TCP SYN flood attack is an attempt to make a machine or networked resource unavailable to its intended users. The actual users of cloud can't use the resources. It is necessary to identify the exact position when TCP-SYN flood starts. Therefore the proposed framework uses the Particle Swarm Optimization (PSO) algorithm to identify the optimized position of SYN flood attack in the traffic flow.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting malicious nodes in MANET using rateless codes for maximum content distribution","authors":"N. Suganthi, S. Neelavathy Pari","doi":"10.1109/ICOAC.2014.7229731","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229731","url":null,"abstract":"A mobile ad hoc network is a self-organizing infrastructure less network in which collection of mobile nodes are connected by wireless. Security is a major concern in real time mobile environment to provide secured communication. Major problem in wireless network security is data integrity. Existing cryptographic techniques protects the data which can easily be forged by the adversaries. In this paper the pollution attack that modifies the data packet which is easy to launch bogus data inside the network and significantly reduces the network performance. Rateless codes technique is used to encode and decode the data packets, to maintain the integrity of original data. Rateless codes are class of linear error correcting codes and create unlimited number of symbols. The proposed system determines the pollution attack using belief propagation inference technique in order to prevent fake data packets propagate throughout the network. Belief propagation is an iterative process to pass and update the messages until convergence among neighboring variables that allows acting inference on graphical models such as markov random fields, factor graph etc. It is also used to determine the marginal probabilities of all the variables and these estimated marginal probabilities are called as beliefs. The proposed work has been simulated using ns2.35 to evaluate the performance against honest and malicious mobile nodes.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDoS detection and analysis in SDN-based environment using support vector machine classifier","authors":"R. Kokila, S. Thamarai Selvi, K. Govindarajan","doi":"10.1109/ICOAC.2014.7229711","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229711","url":null,"abstract":"Software Defined Networking (SDN) provides separation of data plane and control plane. The controller has centralized control of the entire network. SDN offers the ability to program the network and allows dynamic creation of flow policies. The controller is vulnerable to Distributed Denial of Service (DDoS) attacks that leads to resource exhaustion which causes non-reachability of services given by the controller. The detection of DDoS requires adaptive and accurate classifier that does decision making from uncertain information. It is critical to detect the attack in the controller at earlier stage. SVM is widely used classifier with high accuracy and less false positive rate. We analyze the SVM classifier and compare it with other classifiers for DDoS detection. The experiments show that SVM performs accurate classification than others.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QEER: QoS aware Energy Efficient Routing protocol for Wireless Sensor Networks","authors":"R. Logambigai, A. Kannan","doi":"10.1109/ICOAC.2014.7229745","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229745","url":null,"abstract":"In a high density Wireless Sensor Network (WSN), the nearby sensor nodes detect the data duplication when sensing an event. Due to the limited power in sensor nodes, the efficient use of power is essential in order to prolong the network lifetime. Thus, it is necessary to lessen the amount of data that is sent to the sink. In this work, we propose an efficient routing technique called Quality of Service (QoS) aware Energy Efficient Routing protocol for WSNs. Two QoS metrics namely hop count and energy are used in this work. In this technique, a group of nodes forms a Cluster and the cluster heads are only allowed to perform routing. This reduces the energy consumption through aggregating the data by the Coordinator in the cluster. The results of the simulation show that this protocol work performs better than the other algorithms on routing based on QoS.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133436062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}