Alagappan Solayappan, Mohamed Ben Haj Frej, S. N. Rajan
{"title":"Energy efficient routing protocols and efficient bandwidth techniques in Underwater Wireless Sensor Networks - a survey","authors":"Alagappan Solayappan, Mohamed Ben Haj Frej, S. N. Rajan","doi":"10.1109/LISAT.2017.8001973","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001973","url":null,"abstract":"The underwater wireless remote sensors convey messages in a range, where there is no possible human intervention. It is difficult to replace the battery in order to sustain energy in an acoustic environment. Moreover, considering the environment, solar energy cannot be used to recharge for batteries. These sensors are required to be awake for an extended period, taking in consideration that they have constrained energy limitations. One of the difficulties in submerged remote sensor systems is the uneven utilization of the energy resources. This will eventually result in lessening the lifetime of the sensors in the underwater networks. When compared to regular wireless sensor networks, Underwater Wireless Sensor Networks (UWSN) have a harsher surrounding, which could be translated into high energy constraints, low bandwidth, decreased throughput, and propagation delay. In multi-hop communication, the distance between the anchor node and the normal node is more considerable; which leads to more consumption of energy. On the other hand, since the distance is longer, it results into signal attenuation, ending into frequency power loss. The speed of the sound in deep ocean should be considered as the depth of the ocean increases. The variation of the speed of the sound results into this specific loss. A typical power spectral density occurs when the combined attenuation and noise are combined. Resulting into a decline of 18 dB within the duration of ten years. Among the layers of acoustic sensor network physical UWSN conventions are outlined in a manner that the energy utilization is compensated. While packets are being forwarded, the energy consumption must be less or balanced, else energy holes are created. In such cases, the energy efficiency, lifetime, and throughput are expanded. In this paper, we are summarizing most of the current energy based routing protocols. The provided information could be useful to analyze and design protocols for wireless underwater sensor networks by reducing energy consumption.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Susrutha Babu Sukhavasi, S. Suparshya Babu, K. Elleithy, Abdelrahman Elleithy
{"title":"Analysis and implementation of proficient Rijndael algorithm with optimized computation","authors":"Susrutha Babu Sukhavasi, S. Suparshya Babu, K. Elleithy, Abdelrahman Elleithy","doi":"10.1109/LISAT.2017.8001977","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001977","url":null,"abstract":"Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security in communications. In this paper, we have implemented 128 bit AES algorithm in hardware descriptive languages. Our proposed implementation has demonstrated efficient results in delay and area. Furthermore, we provide a comparison with the corresponding coding implementations.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131764855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abul Hasan Fazulullah, Purva Vansia, Kartavi Patel, Dipesh Patel, Abdel-shakour Abuzneid
{"title":"Secure transmission with matrix encryption and data compression mechanism","authors":"Abul Hasan Fazulullah, Purva Vansia, Kartavi Patel, Dipesh Patel, Abdel-shakour Abuzneid","doi":"10.1109/LISAT.2017.8001954","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001954","url":null,"abstract":"With emerging technology and support for 4G and 5G network, considering Internet and Intranet, the bandwidth is not a big of a problem as it was before. The main concern now is the implementation of security and how efficiently we can send the data to recipients. We have come up with an awesome concept that takes confidentiality and availability as mainstream. The idea in simple words is like our concept in addition to Dijkstra's algorithm running on SCTP will provide an excellent secure transmission of data over the network. The focus of our research is on how to handle the data in a different way so that we can reduce the amount of space needed for storage and helps to reduce the time and space complexity. This goal will again be helpful when there is a huge junk of data to be sent over the internet in a split of a second. The intent of using SCTP (Stream Control Transmission Protocol) is that it is more reliable and has high throughput both in proactive and reactive manner.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher G. Tsatsis, Katherine E. Rice, V. Protopopova, D. Ramos, Jigar Jadav, J. Coppola, Meg Broderick, D. Putrino
{"title":"Lateropulsion rehabilitation using Virtual Reality for stroke patients","authors":"Christopher G. Tsatsis, Katherine E. Rice, V. Protopopova, D. Ramos, Jigar Jadav, J. Coppola, Meg Broderick, D. Putrino","doi":"10.1109/LISAT.2017.8001960","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001960","url":null,"abstract":"Virtual reality (VR) is being explored as a method of gamification rehabilitation for stroke patients, specifically in lateropulsion patients. VR or Augmented Reality (AR) provides realistic 3-dimensional environments combined with real-time movements. The user is able to concentrate on the scenery and feel removed from their real-life environment and immersed in a new setting. Integrating VR with rehabilitation practices is an accessible way for patients to improve recovery times while using a mobile device to make rehabilitation more accessible to the patient. The goal of this research is to utilize VR as a viable tool for physical therapists to help improve the stamina of recovering patients. The study explores the benefits of changing the environment of the user, to help change their perspective of the world and normalizing the world for lateropulsion stroke patients. This work conducts the necessary research to develop a mobile application which can benefit the lives of stroke patients by potentially decreasing the lateropulsion symptoms.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gurmeet Singh, Vaneet Singh, S. Anand, Brejesh Lall
{"title":"Study of variations in electrical impedance measurements with different impurities in vegetable phantoms","authors":"Gurmeet Singh, Vaneet Singh, S. Anand, Brejesh Lall","doi":"10.1109/LISAT.2017.8001986","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001986","url":null,"abstract":"Electrical Bioimpedance study is a noninvasive, low cost and a commonly used approach for finding the physiological and pathological status of biological tissues. Various methods are used for analyzing and measuring bioimpedance data for evaluation of clinical status. The objective of this paper is to analyze the variations in electrical impedance measured using four electrode method Impedance is measured with Ag/AgCl surface electrodes when there is a change in the conductivity deep inside the tissue using precision impedance analyzer in vegetable phantom.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effects of technological and organizational innovations on business value in the context of a new product or service deployment","authors":"E. Davis","doi":"10.1109/LISAT.2017.8001971","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001971","url":null,"abstract":"This research is a qualitative case study that examines transformative technical adaptations and organizational process changes in the context of a new product deployment in a large telecommunications corporation. The research advances the existing body of knowledge and understanding of how the interactions of technology and organizational changes contribute to the successful deployment of new product and service initiatives that generate business value.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reader leveled RFID localization approaches and their simulation","authors":"Matthew Chan, Xiaowen Zhang","doi":"10.1109/LISAT.2017.8001967","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001967","url":null,"abstract":"We propose two RFID localization approaches to ascertain the estimated location of a target that has a passive tag affixed. The antennas of the RFID readers are installed on the ceiling of an indoor environment as this setup will facilitate the daily routine operations of warehouses, retail stores and libraries. The reader leveled nearest-neighbor and multilateration schemes take advantage of detectable counts of target scan, applying different power levels on each scan. The technique is highly resistant to the noise and interference of other radio waves. The outcomes of the simulation demonstrate remarkably accurate performance.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solis Flores","authors":"Christine Kong, D. Westerfeld","doi":"10.1109/lisat.2017.8001987","DOIUrl":"https://doi.org/10.1109/lisat.2017.8001987","url":null,"abstract":"Solar energy is harvested, traditionally, either through photovoltaic technology or through the ingestion of crops. Since the two functions are utilized in distinct areas of human lives, it is assumed the two cannot coexist. This paper proposes a design for the integration of photovoltaic technology and plant physiology. The Solis Flores is an autonomous solar panel powered system that is intercropped within agricultural fields. This plant inspired photovoltaic system is synchronized with the agricultural crop fields by monitoring their health statuses. The Solis Flores surveys soil moisture levels and pH levels to manage and improve the agricultural plant health without competing for land. Through the inspiration of plant anatomy and function, the Solis Flores utilizes solar energy as its source energy, and rooted sensors to analysis possible health contingencies then communicate to the user the status of the field. The Solis Flores' solar panels, resembling the leaves and flowers of a plant, is designed to sun track and optimize the collection of solar energy. The circuitry is protected by a housing unit resembling a pot which also host the internal battery storage powering the complete system. The Solis Flores implements a wireless ad hoc network or WANET and a sensor based plant health monitoring system to an autonomous solar panel system. The ZigBee XBee platform is the WANET system chosen due to its range capacity and power efficiency. In addition, the XBee is designed to enable a security authentication allowing additional units to join or leave the network. Each Solis Flores has a master microcontroller which will monitor the soil moisture and pH level. Under stressful situations the microcontroller will be alerted and the message will be broadcasted across the network. The user as coordinator of the network can access the status of the field and monitor the crop health. This data can be logged in an external storage for seasonal evaluation and tracking. Through the successful implementation, the union between plant physiology and the technological expansion can be further explored.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Chiriaco, A. Franzen, Rebecca Thayil, Xiaowen Zhang
{"title":"Finding partial hash collisions by brute force parallel programming","authors":"Vincent Chiriaco, A. Franzen, Rebecca Thayil, Xiaowen Zhang","doi":"10.1109/SARNOF.2016.7846725","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846725","url":null,"abstract":"A hash function hashes a longer message of arbitrary length into a much shorter bit string of fixed length, called a hash. Inevitably, there will be a lot of different messages being hashed to the same or similar hash. We call this a hash collision or a partial hash collision. By utilizing multiple processors from the CUNY High Performance Computing Center's clusters, we can locate partial collisions for the hash functions MD5 and SHA1 by brute force parallel programming in C with MPI library. The brute force method of finding a second preimage collision entails systematically computing all of the permutations, hashes, and Hamming distances of the target preimage. We explore varying size target strings and the number of processors allocation to examine the effect these variables have on finding partial collisions. The results show that for the same message space the search time for the partial collisions is roughly halved for each doubling of the number of processors; the longer the message is the better partial collisions are produced.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}