S. Amit, A. S. Koshy, S. Samprita, Shwetali Joshi, N. Ranjitha
{"title":"Internet of Things (IoT) enabled Sustainable Home Automation along with Security using Solar Energy","authors":"S. Amit, A. S. Koshy, S. Samprita, Shwetali Joshi, N. Ranjitha","doi":"10.1109/ICCES45898.2019.9002526","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002526","url":null,"abstract":"Home automation is a very important part of “The Internet of Things” popularly called as IoT. IoT provides a solution for seamless control over all the appliances at home. Home automation exists since many decades for controlling basic equipments of home like the lights and simple appliances. Present Technology expects the world to be interconnected with a touch of flngerprints or simple voice commands. The aim of it is to design and construct a home automation system which will switch on or off any household devices that are connected to it, using microcontroller, mobile or Alexa with the help of Wi-Fi. It is socially relevant and its implementation is cost effective. In our project controlling of appliances or equipment is through Alexa or mobile. We have also included an important aspect that is home security by making provisions for door (open and close), movement, fire and gas leak detection. The controllers used here are Node MCU and Arduino mini for automation and security respectively. We are using solar panels as the source of power for the equipments. It has a charging unit and a smart power management unit.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Approach to Improve Full Coverage in Wireless Sensor Networks: Full Coverage Improving Hybrid Approach","authors":"A. K. Sohal, A. Sharma, Neetu Sood","doi":"10.1109/ICCES45898.2019.9002146","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002146","url":null,"abstract":"In this paper, we propose a hybrid approach for wireless sensor networks which can reduce the total energy consumption of network operation therefore improving network lifetime along with complete coverage of remote monitoring field. The proposed method named as Hybrid Weight based Coverage Enhancing Protocol (H-WCEP) helps to select appropriate cluster heads and their respective cluster members by using weighted sum method and subsequent routing path by genetic algorithm. The network lifetime and coverage lifetime are computed by implementing this approach to achieve continuously monitoring of remote monitoring areas. The results of H-WCEP outperform as compared to other existing protocols. The network lifetime and full coverage lifetime of H-WCEP increase by 48 percentage and 42 percentage approximately respectively.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusion Methods & Applications – A Survey","authors":"F. Francis, Maya Mohan","doi":"10.1109/ICCES45898.2019.9002396","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002396","url":null,"abstract":"Data fusion is the process in which integration of multiple data sources produce more consistent, efficient, and useful information than that provided by any of the individual data source. The fusion methods can be broadly classified with the help of class information. The fusion methods such as serial feature fusion, parallel feature fusion and canonical correlation analysis (CCA) does not contain any class information. That is, they are unsupervised fusion methods. The methods such as cluster CCA, Generalized Multiview Analysis, Linear Discriminant Analysis, Multiview Discriminant Analysis, Discriminative Multiple CCA, Locality Preserving CCA (LPCCA), BGLPCCA, MGLPCCA contain class information. Applications of each fusion methods are also taken into consideration.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"65 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120888764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and efficient Session Initiation Protocol authentication scheme for VoIP Communications","authors":"B. Gupta, Varun Prajapati","doi":"10.1109/ICCES45898.2019.9002125","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002125","url":null,"abstract":"Session Initiation Protocol (SIP) is widely used in Voice-over-IP (VoIP) communication to initiate communication between user and server. SIP authentication mechanism was found insecure against various attacks because of its inherent open text architecture. We analyzed different models for SIP authentication and noted their vulnerability against various attacks. Major identified weakness was lack of mutual authentication in various schemes. In this paper, we provide a new authentication model for SIP communication for secure communication establishment. We use AVISPA tool for formal security evaluation of our model. We then prove how our model can resist against various known attacks and provide mutual authentication. Our model is relatively more efficient as we use symmetric key cryptography with ECC instead of asymmetric key cryptography.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Immense Preference Data Forwarding (IPDF) Scheme incorporated with Constructive Time Slot Allocation in IEEE 802.15.4 for Wireless Body Area Networks","authors":"S. Sindhuja Banu, K. Baskaran","doi":"10.1109/ICCES45898.2019.9002049","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002049","url":null,"abstract":"A large time delay during emergency data transfer in WBAN is a challenging task since it involves transmission of time sensitive crucial information to the receiver for immediate treatment of the patient. This paper aims in providing an efficient transmission of Immense Preference Data (IPD) to the respective end user with minimal delay and energy consumption. IEEE 802.15.4 MAC superframe was altered within permitted standards and IPDF Routing Scheme was designed and implemented in which, time slots were efficiently allocated according to data type. Guaranteed Time Slots (GTS) in Contention Free Period (CFP) was allocated to IPD of the slot's possessor and the non-possessor node at t0 and t1 respectively. This provides an immediate and guaranteed transfer of data without any further delay and unnecessary waiting time for channel contention at Contention Access Period (CAP) was also reduced, so as to add to the minimization of power consumption and latency. CAP was further divided into two phases for transmitting Minor Preference Data (MPD) of possessor and non-possessor which minimizes collision of data packets that further decreases delay and power consumption of MPD. Simulations and performance analysis of IPDF scheme were carried out in NS2. Delay and power consumption minimization and PDR and throughput maximization for IPD in comparison to IEEE 802.15.4 MAC standard and PA-MAC was achieved.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tree based node verification key management scheme for wireless sensor networks","authors":"B. Srinivas, N Rukma Rekha, Y. V. Subbarao","doi":"10.1109/ICCES45898.2019.9002536","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002536","url":null,"abstract":"Sensor nodes are usually geographically placed across the particular environment. Sensor nodes are limited in capacities like computation power, memory, and processing speed. They collect sensitive information and send to the central base station. A novel TNVS is proposed that identifies certain nodes as authenticator nodes that have relatively high capability in storage, computation and power compared to the regular sensor nodes. These nodes are used for verifying new nodes that are being added into the network, thereby eliminating the entry of malicious nodes into the network. The master key that is shared by all the nodes of the network is renewed periodically to avoid node capture attack. Simulation and results show that in addition to providing authentication TNVS also requires less number of keys when compared to the existing key management schemes there by reducing the burden on memory requirement of the network.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of 8-bit Novel Adder Architecture Design using Traditional CMOS and m-GDI technique","authors":"Gautam Nayan","doi":"10.1109/ICCES45898.2019.9002573","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002573","url":null,"abstract":"Addition is a standout amongst the most fundamental operations in VLSI frameworks such as microprocessors and digital signal processing systems. Therefore, the adders must render a high speed operation into existence. This paper proposes a novel implementation of 8-bit adder architecture using modified Gate Diffusion Input (m-GDI) approach. The primary blocks of adder are partial full adder, 1-bit full adder, 4-bit ripple carry adder (RCA), 4-bit carry look ahead adder (CLA). The proposed adder architecture devours 70% lesser area, 71 % lesser delay and 35% lesser power dissipation w.r.t traditional CMOS design. The proposed adder is implemented utilizing Cadence Virtuoso Tool in 180nm technology.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"10136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Data Normalization Strategy for Academic Datasets using Log Values","authors":"V. Sathya Durga, T. Jeyaprakash","doi":"10.1109/ICCES45898.2019.9002089","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002089","url":null,"abstract":"Data transformation is converting input data from one form to another form. Normalization is a standard data transformation techniques which can be used to transform data. There are many types of normalization techniques, like Min-Max normalization, Cube Root normalization, etc. In this paper, we implement a two-phase normalization process. In the first phase, the data is normalized using Cube Root normalization. Next, the normalized data is still more scaled by applying the logarithmic transformation. Finally, the performance of the transformed values is evaluated against standard metrics.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126099202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Tarun, T. Pradeep Chandra, G. Anil Kumar, Sudha Yadav
{"title":"Microcontroller rooted collaborative functioning system in Vehicles","authors":"P. Tarun, T. Pradeep Chandra, G. Anil Kumar, Sudha Yadav","doi":"10.1109/ICCES45898.2019.9002240","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002240","url":null,"abstract":"Automobile industry is growing vast throughout the world. The cost of the vehicles are also moderate. There are a large number of personal vehicles. Due to the surge, road accidents are the major problem. It is not only the duty of the person who drives, but also of the vehicle's manufacturer to ensure more preventive systems suitable for our daily routine. Automobile industry had been taking a few safety steps over the last two decades. Few more safety measures are being added to make the system more versatile. There is a large void in post-accident emergency facilities. If emergency services with definite accident location are provided in time, many lives can be hoarded. In this paper, a novel approach is proposed for this issue and adds some safety measures. Our system will not allow drunken people to drive the vehicle; A help request is sent to helpline Centre with accident location when an accident happens; Vehicle stops automatically if there is any leakage of fuel gas; Driver will be alerted if he/she is in drowsiness state and stops the vehicle if continues to drive in drowsiness state.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controllability Intelligence of Lightning Protection System due to 110kV Transmission line","authors":"M. Ibrahim, Lin Li, Ping Wang","doi":"10.1109/ICCES45898.2019.9002106","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002106","url":null,"abstract":"A lightning protection system (LPS) of an urban 110 kV substation is designed and analysed according to NFPA 780 and IEC 62305–3 standards. The analysis of the LPS is based on the value of risk assessment. The total area of the plant is described by one soil layer with uniform resistivity. This study aims to improve the understanding of unexpected attitude of the grounding grid system under lightning strike currents by explaining the basic notion of the lightning protection level. The program is integrated with the CDEGS software, which provides effective geometrical modeling with object and result visualization. Furthermore, module and automated fast Fourier fransform is implemented in this study to simulate electromagnetic fields in the period and frequency scope. These current values are compared to the desired protection levels within the standards. The study results show that for the improved protection of the system against lightning, the total power grid must be considered as a source of improvement for studying shielding influence and the protection levels provided inside this substation.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}