2017 International Conference on Inventive Computing and Informatics (ICICI)最新文献

筛选
英文 中文
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography 利用椭圆曲线密码技术实现长寿命manet的主动秘密共享
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365362
N. Kumar, A. Basit, Priyadarshi Singh, V. Venkaiah
{"title":"Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography","authors":"N. Kumar, A. Basit, Priyadarshi Singh, V. Venkaiah","doi":"10.1109/ICICI.2017.8365362","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365362","url":null,"abstract":"Since MANETs are infrastructure-less, they heavily use secret sharing techniques to distribute and decentralize the role of a trusted third party, where the MANET secret s is shared among the legitimate nodes using (t, n) threshold secret sharing scheme. For long lived MANETs, the shared secret is periodically updated without changing the MANET secret based on proactive secret sharing using Elliptic Curve Cryptography(ECC). Hence, the adversary trying to learn the secret, needs to gain at-least t partial shares in the same time period. If the time period and the threshold value t are selected properly, proactive verifiable secret sharing can maintain the overall security of the information in long lived MANETs. The conventional cryptographic algorithms are heavy weight, require lot of computation power thus consuming lot of resources. In our proposal we used Elliptic Curve Cryptography to verify commitments as it requires smaller keys compared to existing proactive secret sharing techniques and makes it useful for MANETs, Which are formed of resource constraint devices.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Removal of muscle artifacts from EEG based on ensemble empirical mode decomposition and classification of seizure using machine learning techniques 基于集成经验模态分解和癫痫发作分类的脑电肌肉伪影去除
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365259
K. Dutta, Kavya Venugopal, S. A. Swamy
{"title":"Removal of muscle artifacts from EEG based on ensemble empirical mode decomposition and classification of seizure using machine learning techniques","authors":"K. Dutta, Kavya Venugopal, S. A. Swamy","doi":"10.1109/ICICI.2017.8365259","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365259","url":null,"abstract":"Occurrence of sudden burst of excess electricity in the brain, manifesting as seizure is common phenomenon observed in patients with epilepsy: a neurological disorder that affects approximately 70 million people in the world. The epilepsy mainly divided into two types — Partial and Generalized. Electroencephalograms (EEG) recordings can capture the brain's electrical signals, but diagnosis of epilepsy and identifying its correct class is time consuming and can be expensive due to the need for trained specialists to perform the interpretation, because of the nature of EEG signal, which normally get contaminated by noises and artifacts (signals other than brain activity), which affects the visual analysis of EEG and impairs the results of EEG signal processing. We present de-noising of EEG signal using Ensemble Empirical Mode Decomposition (EEMD) and classification based on machine learning Technique using MATLAB.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Arduino based logic for ECM remote testing by generating engine and vehicle speed signals 基于Arduino的ECM远程测试逻辑,生成发动机和车辆速度信号
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365217
R. Heda, P. A. Kulkarni, Navreet Saini, Shailendra Kelkar
{"title":"Arduino based logic for ECM remote testing by generating engine and vehicle speed signals","authors":"R. Heda, P. A. Kulkarni, Navreet Saini, Shailendra Kelkar","doi":"10.1109/ICICI.2017.8365217","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365217","url":null,"abstract":"In diesel engine, a lot of work is going on to enhance the capability of Engine Control Module (ECM) by adding different improved features. Most of the new features directly or indirectly have engine and vehicle speed as their contributing parameters. We need to provide actual engine and vehicle speed signals while testing these features and other ECM parameters which are affected by engine and vehicle speed. The instruments involved in generating these signals are not cost-effective. Digital circuits used to generate engine and vehicle speed signals have low cost but are inaccurate. So, this paper provides a low-cost Arduino Timer and Interrupt based solution for generating these speed signals with high accuracy and precision. A graphical user interface (GUI) is also developed to get accurate (numeric) input from user. To mimic all possible engine speed conditions, crank cam displaced speed signals were also generated and given to ECM. The hardware developed using Arduino can be used for testing of ECM remotely irrespective of actual vehicle or engine availability as it is self-sufficient of providing crank, cam and vehicle speed signals.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-commerce sentiment analysis using graph based approach 基于图的电子商务情感分析方法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365197
Monali Bordoloi, S. K. Biswas
{"title":"E-commerce sentiment analysis using graph based approach","authors":"Monali Bordoloi, S. K. Biswas","doi":"10.1109/ICICI.2017.8365197","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365197","url":null,"abstract":"An efficient sentiment analysis technique for deep understanding of the underlying meaning and sentiment of a given set of text is highly desirable in many application domains. This paper proposes an effective sentiment analysis model that makes use of keyword extraction and polarity assignment techniques using graph based approach for the advanced analysis of mobile handset reviews collected from different electronic commercial sites. Efficient keyword extraction plays a vital role in sentiment analysis and thus has been used in this paper using degree centrality measure. A domain dedicated polarity assignment technique has been used to assign significant and relevant polarity to the most important keywords that can best describe and represent the underlying meaning and opinion or sentiment of the data. The proposed model outperforms some of the existing models.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and analysis of CPW-Fed microstrip patch antennas for wide band applications 宽带用CPW-Fed微带贴片天线的设计与分析
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365216
R. Mishra, Ranjan Mishra, P. Kuchhal, N. Kumari
{"title":"Design and analysis of CPW-Fed microstrip patch antennas for wide band applications","authors":"R. Mishra, Ranjan Mishra, P. Kuchhal, N. Kumari","doi":"10.1109/ICICI.2017.8365216","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365216","url":null,"abstract":"A CPW-Fed microstrip patch antenna of size 21×22×1.6 mm3 along with its three variants is proposed in this paper. Two slots are introduced on the patch of the base antenna to study the antenna parameters, in terms of bandwidth, gain and directivity for analysis. The proposed antennas are suitable for wireless wideband applications roughly between frequency ranges of 4 GHz to 14 GHz approximately. All three antennas are showing good return losses, high bandwidth of approximately about 10 GHz, peak gain and directivity of approximately 4 dB. The microstrip antenna structures are configured on FR4 epoxy substrate. The configurations are simulated and analyzed using Ansys HFSS software. This study would be helpful in the designing of compact microstrip antennas with enhanced bandwidth for various purposes in the field of wireless communications in general and various earth science applications in particular at super high microwave frequency.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ECU diagnostics validator using CANUSB ECU诊断验证器使用CANUSB
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365257
Abhijit D. Sutar, S. Shinde
{"title":"ECU diagnostics validator using CANUSB","authors":"Abhijit D. Sutar, S. Shinde","doi":"10.1109/ICICI.2017.8365257","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365257","url":null,"abstract":"An ECU diagnostics provides information about ECU behavior which in turn provides the overall health of the vehicle. An OBD (On-Board Diagnostics) takes necessary corrective actions for preventing accidents and hazards by detecting vehicle system's malfunction. The driver and passenger safety can be taken care with the help of diagnostics. For ECU diagnostics validation, most of the OEMs, Tier-1, and Tier-2 use a Vector Tool “CANoe” during ECU development phase. The CANoe is very powerful tool. However, its cost is ∼ €10,000. The proposed system can be used to perform the similar functionality of ECU diagnostics validation during ECU development phase. It uses CANUSB as hardware interface and software developed in Microsoft C# language as application software. It is the cost-effective special tool which uses single CAN channel for transmitting and receiving various CAN messages to/from ECU. Using this tool, the diagnostic messages and vehicle messages can be simulated & sent and ECU response can be validated. The tool would be having user-friendly easy to use GUI, manual as well as cyclic auto transmission mode with message logging feature. The overall tool cost would be ∼ ₹35,000.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"212 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of QC-LDPC codes with girth 6 using Log Domain sum product algorithm 用对数域和积算法分析周长为6的QC-LDPC码的性能
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365366
J. Mathur, Alpana Pandey
{"title":"Performance analysis of QC-LDPC codes with girth 6 using Log Domain sum product algorithm","authors":"J. Mathur, Alpana Pandey","doi":"10.1109/ICICI.2017.8365366","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365366","url":null,"abstract":"This paper presents Bit error Rate performance Analysis of Quasi Cyclic Low Density Parity Check Codes (QC-LDPC) with girth 6 using Log Domain sum product and Simple Log Domain Sum Product Algorithm for Decoding. The approach to construct Parity Check matrix for LDPC codes is based on sparse Lower Upper decomposition. Then to create QC-LDPC matrix counter shifting, interleave mapping, Set XORing, Circulant Shifting and Randomization processes are being used. The constructed QC-LDPC codes is of a girth 6 on / code Rate have row weight 6 and column weight 3. Bit error rate performance is done through simulation to be calculated for various code length such as code I (960, 480), code II (1980, 990) and code III (1080, 540).","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web complexity factors! A novel approach for predicting size measures for web application development 网络复杂性因素!一种用于预测web应用程序开发的大小度量的新方法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365266
S. Saif, A. Wahid
{"title":"Web complexity factors! A novel approach for predicting size measures for web application development","authors":"S. Saif, A. Wahid","doi":"10.1109/ICICI.2017.8365266","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365266","url":null,"abstract":"Effort estimation is critical phase in web application development. Effort estimates are directly influenced by web application size. Accuracy in size creates accuracy in estimate efforts. Web application size is determined by eliciting various web sizing measures and are calculated as web size metrics like LOC, FP, WO, etc. Web size metrics are actually obtained by aggregating quantitate and qualitative behaviour of functional and dimensional size measurements. There is no standard approach that can guide through proper elicitation, elaboration and selection of size measures for web application development. This study attempts to propose new size measurement approach, the Web Complexity Factor (WCF) to obtain size measures for web application. WCF has five measuring factors. WCF is first and primary component to develop effort estimation model for web effort estimation.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fault aware adaptive routing algorithm for mesh based NoCs 基于网格的noc故障感知自适应路由算法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365199
Jyoti Khichar, S. Choudhary
{"title":"Fault aware adaptive routing algorithm for mesh based NoCs","authors":"Jyoti Khichar, S. Choudhary","doi":"10.1109/ICICI.2017.8365199","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365199","url":null,"abstract":"In this paper, we present a modified fault aware routing algorithm for on-chip communication that detects precise locations of the faulty nodes and faulty links on the network and routes the data by bypassing the faults. The proposed routing method is based on recursive error detection mechanisms and provides adaptive routing path from source tile to destination tile in the dynamic NoCs environment where the position and number of faulty nodes/links alter during runtime. We also compare our proposed routing algorithm with other existing fault-tolerant routing algorithms such as XY, fault tolerant XY and dynamic adaptive, considering latency, throughput and number of packets lost as performance metrics. The results show that the proposed routing algorithm results in lesser packet loss and higher throughput in case of node or link failures.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The proposal of complex safety analysis for development of dynamical systems 动力系统开发中复杂安全分析的提出
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.15584/ETI.2016.1.26
M. Štrbo
{"title":"The proposal of complex safety analysis for development of dynamical systems","authors":"M. Štrbo","doi":"10.15584/ETI.2016.1.26","DOIUrl":"https://doi.org/10.15584/ETI.2016.1.26","url":null,"abstract":"The aim of the article is to propose a complex methodology for implementing a safety analysis of dynamical systems. The safety analysis is performed in the process of control system development, especially aiming at safety-critical processes of system operation. The methodology was divided into seven basic steps. The individual steps of the methodology are carried out in a hierarchical sequence. The step “Preliminary Hazard Analysis” consists of the PHI and PHA methods. Further, roles of individual methodology steps are detailed. In the second part of the article, the principle of safety-critical process monitoring based on models is described.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116880192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信