{"title":"Landslide detection system using computer vision approach and Raspberry Pi","authors":"P. Mishra, S. Dhar, M. Kalra","doi":"10.1109/ICCES45898.2019.9002256","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002256","url":null,"abstract":"Landslide is a natural hazard, which badly affects people's safety and property. Continuous monitoring of such a disaster may lead to reducing of losses of human lives. With this aim, in this paper, we have proposed a surveillance system for real time landslide monitoring using computer vision algorithms. Here we have used a video camera to acquire live view of landslide site and a small computer board ‘raspberry Pi’ to run the algorithm we will introduce here. When landslide is detected SMS text messages are transmitted using a GSM modem. Due to video camera and Raspberry Pi, this method is inexpensive yet efficient and also requires low power, therefore this method can be used in any region. We have used median filtering to remove noise present in the detection algorithm. Here we have also proposed a new implementation method for median filtering using a linked list and parallel processing which is very time efficient.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Implementation of 8-bit SSA Multiplier for designing OFDM Transceiver","authors":"M. Sagar, G. Hegde","doi":"10.1109/ICCES45898.2019.9002167","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002167","url":null,"abstract":"In recent technology of digital signal processing applications, we have number of modulation and demodulation techniques. In this domain multiplexing technique is having greatest importance as it has a transmission and reception part with secure systems for communication. Thus orthogonal frequency division multiplexing (OFDM) is superior to other multiplexing techniques, which has multiple carriers with very much robust frequency selective distorted channels. OFDM will have a number of modules such as serial to parallel converter, modulator, IFFT, FFT, demodulator and so on. The Proposed work will concentrate on arithmetic operations in OFDM with re-modified technique using large integer values such as addition, and multiplications. This large integer based arithmetic operation technique were designed using Schönhage-Strassen algorithm (SSA). Thus the proposed method will focus on this SSA algorithm based arithmetic operations with Number Theoretic Transform (NTT) and Inverse Number Theoretic transform (INTT) method. Proposed method of OFDM will replace FFT-IFFT to NTT-INTT method and this application is developed in Verilog HDL and synthesized in Xilinx vivado 15.4. It proved better results in terms of area and delay when compared with conventional design.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128444381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Nithin, N. B. Sai Shibu, S. Sree Lakshmi, S. Ponnekanti
{"title":"Location Module for 5G Base Station to Support Mobility Management of Drones","authors":"P. Nithin, N. B. Sai Shibu, S. Sree Lakshmi, S. Ponnekanti","doi":"10.1109/ICCES45898.2019.9002520","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002520","url":null,"abstract":"In the last few years, information and communication technology market has been witnessing rapid growth. In future, 5G Service Based Architecture (SBA) with a multitude of key enabling technologies are expected to provide a wide range of services such as rapid emergency response, virtual hospital kiosks, wearable devices, autonomous vehicles, etc. With the proliferation of tiny IoT devices and drones, it is envisioned that the network densification will take place in future 5G networks. This paper provides an overview of location module colocated at the 5G gNodeB (gNB-Base Station) to deliver location information in the dense 5G network. The location module provides opportunities to deliver effective location information from the network side together with popular navigation tools and applications like Google maps. The paper also addresses the design of an example use case and developed proof of concept of Platform as a Service (PaaS) for drone operations in 5G.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Security of AES Using Key Dependent Dynamic Sbox","authors":"Yashvir S. Chauhan, T.N. Sasamal","doi":"10.1109/ICCES45898.2019.9002543","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002543","url":null,"abstract":"Nowadays most of the data transmission is done through digital communication and hence security and efficient data transmission is always a desirable property for any data communication. At present, Advance encryption standard (AES) is most widely used cryptographic technique. This AES uses static s box for encryption and decryption which remains constant irrespective of the key. Numerous analysts have experimented and revealed that there are some weak points [1] in the static s-box as it is static and known to all. Therefore, in our proposed algorithm we modify AES such that it uses dynamic sbox which is key dependent and compare the avalanche effect of basic AES with our proposed algorithm.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. V. Navin Baaskar, R. Harshini, T. Poornima, S. Natarajamani
{"title":"Design of Microstrip Bandpass Filter Based on Genetic Optimization","authors":"E. V. Navin Baaskar, R. Harshini, T. Poornima, S. Natarajamani","doi":"10.1109/ICCES45898.2019.9002296","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002296","url":null,"abstract":"In this paper, Structural optimization based microstrip bandpass filter design is discussed. Conventional optimization mainly focuses on the dimensional optimization of the filter. Here, the focus is to design a bandpass filter using rectangular patch-based resonator. The obtained result is then optimized using Genetic Algorithm which is part of Evolutionary algorithm. In order to obtain an optimized result, we define a fitness function in terms of $S_{11}$ (dB) and $S_{21}$ (dB) parameters. The final design of the filter will possess maximum transmission co-efficient and minimum reflection co-efficient.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134391812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Security through Cloud-Fog Integration","authors":"R. Johney, Elizabeth Shelry, K. Remesh Babu","doi":"10.1109/ICCES45898.2019.9002058","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002058","url":null,"abstract":"Moving data and computation to the cloud is a promising technology in recent years. As the device density increases in the connected world, proper storage in the traditional cloud without security threats is a cumbersome task. Modification and leakage of data is the major threat in adopting cloud computing. Intelligent technologies are needed to safeguard against cyber-attacks. Fog paradigm enables users for data storage, management and network functions closer to them. Fog server introduced as a middle layer between user devices and the cloud to provide more security for uploaded data. It collects and transfers the encrypted data from the user, and apply reed Solomon code for error detection and MD5 hashing for malicious message detection to ensure more security and integrity. This data will be stored in different cloud servers and respective user's fog devices. Thus the combination of cloud with fog computing will ensure integrity, availability and confidentiality of users data.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Detailed survey on Virtual Network Embedding","authors":"Aqsa Hashmi, C. Gupta","doi":"10.1109/ICCES45898.2019.9002416","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002416","url":null,"abstract":"Network virtualization encourages the assured resource management in which particular Virtual Network is allowed to be mapped on common or shared physical infrastructure. This mechanism termed as a problem of Virtual Network Embedding(VNE). It is considered to be NP-hard, and various heuristic, meta-heuristic, and exact solutions are proposed already in the past literature. In this paper study on different categories of VNE is presented. It also discusses multiple different approaches used to solve VNE among various networking environment like wireless networks, optical networks, cloud infrastructure, etc. The paper elaborates taxonomy of VNE optimization methods, considering dynamic or static, centralized or distributed and concise or redundant scenarios. Also focusses on a discussion of crucial algorithmic aspects and possible research directions.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123014927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Evaluation of VANET Routing Protocol","authors":"B. Yelure, S. Sonavane","doi":"10.1109/ICCES45898.2019.9002115","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002115","url":null,"abstract":"In today's smart revolutionary era, Intelligent Transportation System (ITS) is a buzzword that plays a vital role. Vehicular ad-hoc network (VANET) techniques help ITS for improving efficiency as well as road safety services to vehicles and drivers. The vehicle acts as a node in the special ad-hoc network. Communication in the VANET is accomplished through IEEE802.11p i.e. Dedicated Short Range Communication (DSRC) and Wireless Access Vehicular Environment (WAVE). The ways of communication in the VANET are within vehicles (V2V) and vehicle-to-road (V2R). Routing is a foremost issue in the VANET environment due to the dynamic variation of topology, the restricted movement pattern of the vehicle, unstable links and complex city environments. Implementation of the VANET environment is a difficult task in a real environment. The objective of the paper is to simulate topological routing protocols to evaluate QoS. The simulation uses ManhattanGrid mobility to reflect the realistic vehicular environment. The simulation is conducted in various test environments with the variation in the vehicular density and speed of the vehicle. The influence of both factors on the QoS parameter is evaluated with Packet Delivery Ratio, Throughput, Avg. E2ED and Normalized Routing Overhead. AODV produces better PDR, Throughput and less NRL. OLSR produces less Avg. E2ED with respect to other protocols.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rashid, Md. Niaz Morshedul Haque, Tasneema Akhtar, Md. Razu Miah
{"title":"Simulink Model of Controlling Fuel Cell Powered Direct Current Motor with Comparative Performance Analysis","authors":"M. Rashid, Md. Niaz Morshedul Haque, Tasneema Akhtar, Md. Razu Miah","doi":"10.1109/ICCES45898.2019.9002577","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002577","url":null,"abstract":"The paper focuses on a Simulink based model and design of the different control mechanisms of a DC motor powered via fuel cell. At first, fuel cell is used as the prime power source of the DC motor and a differential controller is used to achieve a uniform output. Then, the differential controller is replaced with Proportional Integral (PI) controller, Proportional Integral Differential (PID) controller and Fuzzy Logic Controller (FLC) subsequently to compare and demonstrate the variations that occur in the different characteristic curves with the change in various parameters. If Photovoltaic cell is used instead of fuel cell, the output operation of the DC motor may vary. So, in addition, a comparative performance analysis of both methods of power with regards to DC motor control is also presented.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum Likelihood Estimation using Word Based Statistical Machine Translation","authors":"N. Ashraf, Manzoor Ahmad","doi":"10.1109/ICCES45898.2019.9002594","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002594","url":null,"abstract":"Machine Translation is the programmed interpretation of one natural language to another natural language. Human languages can be processed by computers via grammars/rules or via statistics/data. There are many machine translation techniques which are either Rule-based or Knowledge-based. In this paper we will discuss the Statistical Machine Translation (SMT) techniques. The Statistical Machine Translation makes use of statistics or data to find the translation of a given source text. In word primarily based SMT, the simple unit of translation is a word. As a consequence words in an input sentence are translated phrase by phrase individually and these words are than sooner or later organized in a particular way to get the target sentence. The paper discusses numerous fashions for the word based Statistical Machine translation. The paper is written with reference to Kashmiri Language, as not much work has been done in this regard.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"Suppl 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}