2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

筛选
英文 中文
Hybrid bucket sort switching internal sorting based on the data inside the bucket 混合桶排序切换基于桶内数据的内部排序
Medha Khurana, Neetu Faujdar, Shipra Saraswat
{"title":"Hybrid bucket sort switching internal sorting based on the data inside the bucket","authors":"Medha Khurana, Neetu Faujdar, Shipra Saraswat","doi":"10.1109/ICRITO.2017.8342474","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342474","url":null,"abstract":"Spreading elements in the designed buckets is one of the major issue of bucket sort. It is a non-comparison sorting algorithm in which different elements are spread over several buckets. It is necessary because sometimes the distribution of elements are not done on equal basis over the buckets. To avoid this problem, In this paper we have proposed a hybrid sort algorithm which is a combination of merge and count sort. Although many researchers are using insertion sort within buckets. But in this paper, we have focused on using insertion sort which is preferable in sorting of low volume of data. The main objective of this work is to use the merge, count, insertion and hybrid sort individually over the buckets and then comparing their results on the basis of sorting benchmark. The threshold (x) value has been set in order to save the time and space of proposed algorithm. Experimental results shown that count sort is very efficient on every dataset in comparison to other algorithms.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of web based parameter monitoring of milk 基于web的牛奶参数监测的开发
N. Khera, Divya Shukla, Jagjot Singh Khokhar, Vipul Kumar
{"title":"Development of web based parameter monitoring of milk","authors":"N. Khera, Divya Shukla, Jagjot Singh Khokhar, Vipul Kumar","doi":"10.1109/ICRITO.2017.8342515","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342515","url":null,"abstract":"Milk is an important part of the balance diet. It has valuable essential nutrients which are important for both human and animal health. The aim of this paper is to show some aspects of quality estimation of milk with the help of various parameters which includes CLR (Corrected Lactometer Reading), SNF (Solid but Not Fat) and Fat percentage. A simple and low cost microcontroller based test bed is developed for measuring the milk parameters and displaying these values on LCD. In order to facilitate the web based parameter monitoring the microcontroller is programmed for sending the data values on the cloud network using Ethernet shield. This project aims to test the quality of milk before supplying it for consumption in the market.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The power of networking: Bridging the gap between HE students and enterpreneurs in Oman 网络的力量:在阿曼弥合高等教育学生和企业家之间的差距
A. S. Omar, S. M. Hussain, A. Singh
{"title":"The power of networking: Bridging the gap between HE students and enterpreneurs in Oman","authors":"A. S. Omar, S. M. Hussain, A. Singh","doi":"10.1109/ICRITO.2017.8342511","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342511","url":null,"abstract":"This paper exhibits the effective impact of students' networking capabilities on their performance through social media e-tools [1] which has been studied in a quasi-experimental design among 12 students out of 23 of International management module (BUSS 1006) over spring 2017. The results were statistically analyzed with the help of SPSS. Experimental group achievement has been noticed in terms of performance measured by consolidated mean established at 11 percentage points higher as compared to the control group, and a much better standard deviation (2.81 versus 9.83). The concept of students' networking through social media is widely used in HE [2] at different levels to better raise awareness on the closer ties between academia and industry. It enhances students' motivation, thanks to the extra skills they are expected to gain and perform, ultimately leading to entrepreneurship and/or internship and employability. This is also consistent with the strategic plan of Middle East College (MEC) in Muscat, Sultanate of Oman, which aims at achieving 80% employability within one year of graduation as well as attain alumni satisfaction score of 4 out of 5 in terms of employability. Students' networking is therefore a powerful concept to reach these objectives.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware implementation of sun tracking solar panel using 8051 micro-controller 利用8051单片机实现太阳跟踪太阳能电池板的硬件实现
Vasu Sharma, V. K. Tayal
{"title":"Hardware implementation of sun tracking solar panel using 8051 micro-controller","authors":"Vasu Sharma, V. K. Tayal","doi":"10.1109/ICRITO.2017.8342475","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342475","url":null,"abstract":"The Solar panel consists of a number of Solar cells transforms sun's energy into electrical energy. If the solar panel is continuously aligned along with Sun rotation, higher efficiency may be obtained. In this paper, a solar tracking hardware implementation is proposed which tracks the Sun's movement throughout the day. The affordable solar panel design is based on using 8051 micro-controller, dc motor and light sensor aligned in a simple circuit. The main aim is to enhance the existing solar panel output. The output of the proposed solar tracking panel is found to be 32.17% higher as compared to the static Flat solar panel.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fractal antenna for wireless applications 无线应用的分形天线
S. Khade, Pallavi Dhanendra Bire
{"title":"Fractal antenna for wireless applications","authors":"S. Khade, Pallavi Dhanendra Bire","doi":"10.1109/ICRITO.2017.8342461","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342461","url":null,"abstract":"In this paper, a compact single-element fractal antenna system measuring 20×15 mm2 is proposed. The ring resonator increased the number of resonances which make antenna multiband. The reflection coefficient of antenna is found to be below −10dB in the range of 5.1–6.3 GHz and 7.5–8.8 GHz. The performance of the antenna is studied in terms of mutual coupling, pattern of radiation, realized peak gain, directivity and VSWR. The maximum gain of antenna found to be 2.14dB.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison and failure mode analysis of current signature based relay health monitoring schemes 当前基于签名的中继健康监测方案的比较与失效模式分析
Priyanka Wadhawan, M. Kumar, A. Mayya, P. P. Marathe
{"title":"Comparison and failure mode analysis of current signature based relay health monitoring schemes","authors":"Priyanka Wadhawan, M. Kumar, A. Mayya, P. P. Marathe","doi":"10.1109/ICRITO.2017.8342417","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342417","url":null,"abstract":"Electromagnetic relays are widely used to communicate safety signals in critical applications, where the failure of the relay leads to risk. Traditionally, there are various techniques for relay health monitoring, that is, finite impulse test (FIT), read back and spare contact reading. These techniques are either intrusive (e.g. FIT and spare contact reading) or does not test the relay completely (e.g. read back). Recently it has been shown that current signature of energizing/de-energizing relay can be used to estimate health of relay contacts. The relays used in safety applications are normally kept energized to ensure fail-safeness. So, of all prominent failure modes of electromagnetic relay, welded contact (i.e. no changeover on relay de-energization) is the most critical one. The current signature of de-energizing relay is employed to detect welded contacts. The paper compares three diverse relay health monitoring schemes and one scheme is analysed for effect of component failure using FMEA (Failure Mode and Effects Analysis).","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning resources as a service (LraaS) for Higher Education Institutions in Sultanate of Oman 阿曼苏丹国高等教育机构学习资源服务(LraaS)
Anjum Zameer Bhat, Baldev Singh, A. Singh
{"title":"Learning resources as a service (LraaS) for Higher Education Institutions in Sultanate of Oman","authors":"Anjum Zameer Bhat, Baldev Singh, A. Singh","doi":"10.1109/ICRITO.2017.8342486","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342486","url":null,"abstract":"Cloud computing more commonly known as on demand computing has hugely impacted every field and changed the perception of how future IT services could be provided to organizations of discrete scale and requirements. Providing organizations with more robust, reliable and available infrastructure with literally no administrative overhead and much lesser cost, cloud computing has been a revolution in the recent history of Information and Communications Technology. Cloud Computing has benefitted organizations literally in every field of expertise irrespective of their size. Higher Education Institutions are certainly not an exception and many of the higher education institutions have successfully implemented cloud and are hugely benefitting from it. This research paper studies the common IT infrastructure of Higher Education Institutions in Sultanate of Oman and articulates how cloud computing can prove to be beneficial for higher education institutions in Sultanate of Oman.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Iterative parallel shift sort : Optimization and design for area constrained applications 迭代并行移位排序:区域约束应用的优化与设计
Sumit Diware, S. B. Krishna
{"title":"Iterative parallel shift sort : Optimization and design for area constrained applications","authors":"Sumit Diware, S. B. Krishna","doi":"10.1109/ICRITO.2017.8342427","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342427","url":null,"abstract":"Sorting is an important computational task needed in almost all the modern data processing applications. Insertion sort is one of the simplest algorithms used for sorting. However, implementation of insertion sort in sequential execution leads to a time complexity O(n2) making it less efficient. This often leads to not preferring this sorting algorithm for many applications. This paper explores the insertion sort implementation in VHDL using parallel shift sort technique which results in linear time complexity O(n). The designed model is further optimized for operation at higher data rates. An iterative design using the optimized model is then implemented on Xilinx Spartan-6 FPGA which uses in-place computations and allows processing of large data with less hardware resources. This makes the iterative design ideal for area constrained applications which operate in a dynamic input environment with fixed hardware such as real time sensor data processing.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust modeling for secure route discovery in mobile ad-hoc networks 移动ad-hoc网络中安全路由发现的信任建模
G. Wadhwani, S. Khatri, S. K. Muttoo
{"title":"Trust modeling for secure route discovery in mobile ad-hoc networks","authors":"G. Wadhwani, S. Khatri, S. K. Muttoo","doi":"10.1109/ICRITO.2017.8342457","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342457","url":null,"abstract":"Mobile ad-hoc network can be established without any predefined infrastructure and nodes in it communicate with each other in an arbitrary way. All the nodes are expected to have routing capabilities to facilitate communication in the network. The arbitrary movement of nodes and presence of compromised nodes renders the requirement of a route discovery method which can suggest a trustworthy route. In this paper a route discovery technique is suggested based on trust and hop count to find the most trustworthy and optimal path between a pair of communicating nodes. In the proposed method trust is calculated on the basis of direct observation and recommendations from other trustworthy nodes. The impact of recommendations on aggregated trust depends upon the number of interactions between recommender and recommended node. The nodes which are forwarding more number of packets with lesser delay are said to be trustworthy.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of IoT security at network layer 网络层物联网安全分析
Rahul Sharma, Nitin Pandey, S. Khatri
{"title":"Analysis of IoT security at network layer","authors":"Rahul Sharma, Nitin Pandey, S. Khatri","doi":"10.1109/ICRITO.2017.8342495","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342495","url":null,"abstract":"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信