C. Manoj, N. SaiTeja, R. D. Kumar, M. Priyadarsini, K. Murugesan, I. S. Rao
{"title":"Unmanned aerial vehicle based bomb detection","authors":"C. Manoj, N. SaiTeja, R. D. Kumar, M. Priyadarsini, K. Murugesan, I. S. Rao","doi":"10.1109/ICACCI.2016.7732412","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732412","url":null,"abstract":"In any Bomb rescue operation, time factor plays a vital role. As Bomb can explore at any moment, Our task is to reduce the time consuming to detect the Bomb when compared to manual detection. Detecting Bomb manually is highly risky and much time consuming process. In this paper we propose a new technique using “Quadcopter” nothing but UA V (Unmanned Aerial Vehicle). It is an air vehicle which has multiple rotors (in our paper it is 4) and is controlled by the RC transmitter (joysticks). An attempt has been made to detect the bomb by using Geiger counter module. Geiger module can detect any type of radioactive radiation emitted from the Bomb. Bomb location information is sent to the user by making use of GPS and GSM modules. We integrated Geiger module, GPS module, GSM module, Arduino-UNO as a payload to the quadcopter. We need to pass the quadcopter on the area in which the operator wants to examine and if any Bomb is present, then Geiger tube detects it Then immediately Bomb location is sent to the operator's mobile by GPS and GSM modules. The main objective of this paper is to ensure the safety of the operator and to reduce the detection process time when compared to manual detection.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. R. Rupanagudi, Varsha G. Bhat, R. Supriya, Riya Dubey, S. Sukumar, S. Karmarkar, K. Amulya, Ankita Raman, D. Indrani, Abhiram Srisai, Mahathy Rajagopalan, V. Venkatesh, Nupur Jain
{"title":"A novel and secure methodology for keyless ignition and controlling an automobile using air gestures","authors":"S. R. Rupanagudi, Varsha G. Bhat, R. Supriya, Riya Dubey, S. Sukumar, S. Karmarkar, K. Amulya, Ankita Raman, D. Indrani, Abhiram Srisai, Mahathy Rajagopalan, V. Venkatesh, Nupur Jain","doi":"10.1109/ICACCI.2016.7732246","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732246","url":null,"abstract":"The past few years has shown a sudden spurt in the field of human computer interaction. The days of using a mouse to control a computer is almost obsolete and people now prefer to use touch screens and more recently, air gestures, for the same. However, the use of gestures is not limited to computers alone. It finds its application in controlling televisions and other home appliances as well. This paper explores one such application where in air gestures could be used to control automobiles. The paper describes a novel method to not only give directions but also password-protect and use special features of the vehicle, using gestures. The complete algorithm was developed using video processing on MATLAB 2011b and was found to be 3.6 times faster than its predecessor algorithms. The same was tested in real-time as well, using a robot prototype and satisfactory results were obtained.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self power analysing energy efficient protocol (SPAEEP): An adaptive approach","authors":"N. G. Palan, B. V. Barbadekar, Suahs Patil","doi":"10.1109/ICACCI.2016.7732286","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732286","url":null,"abstract":"Main challenge in WSN (Wireless sensor network) faced by researcher is - battery life (energy of a node). In this paper general framework of distributed mechanism of multi-hop WN (wireless network) is considered. Cluster based routing protocols like Low Energy Adaptive Clustering Hierarchy (LEACH), Hybrid Energy Efficiency Protocol (HEEP). Threshold sensitive energy efficient network Protocol (TEEN) and PEGASIS efficiently manages the energy usage. But still these protocol should be thoroughly studied and revised to achieve more energy efficiency. Paper focuses on LEACH protocol, where cluster Head (CH) selection process termed as `round' (r). Each round costs setup and steady state phase of the network. Research proposes novel idea of Self Power Analyzing Energy Efficient Protocol (SPAEEP) with energy model (eM). EM is applied to CH which adaptively decides to initiate next round based on balanced energy. Adaptive decision will help in reducing the number of rounds (r). Application of the same to the nodes will lead to fault tolerant network with proper hand over mechanism. Concept is also extended to 802.15.4 protocol, as it follows standard network architecture. Our results reveal that new method suggested will reduce energy consumption of CH and hence the increased life span of network. The outcome is fault tolerant network.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel feature ranking criteria for interval valued feature selection","authors":"D. S. Guru, N. V. Kumar","doi":"10.1109/ICACCI.2016.7732039","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732039","url":null,"abstract":"In this paper, novel feature ranking criteria suitable for supervised interval valued data are introduced. The ranking criterion basically used to rank the features based on their relevancy prior to feature selection for pattern classification. In our work, initially, a vertex transformation approach is applied on interval valued data to obtain with a crisp type data. Then, the proposed feature ranking criterion is applied on the vertex interval data to rank the features based on their relevancy. This followed by the selection of top k ranked features from the given d set of interval features. Thus the obtained feature subset is evaluated using suitable learning algorithm. The efficacy of the proposed ranking criteria is validated using three benchmarking interval valued datasets and two symbolic classifiers. Finally, a comparative analysis is given to uphold the superiority of the proposed model in terms of classification accuracy.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy aware routing in WSN for pest detection in coffee plantation","authors":"Roshan Zameer Ahmed, R. Biradar","doi":"10.1109/ICACCI.2016.7732078","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732078","url":null,"abstract":"Coffee production stands crucial asset in growing the economy of varied countries. The serious impact to the coffee plantation is due to the pest named Coffee White Stem Borer (CWSB). CWSB once enters into coffee stem, it bores inside and does not reveal its existence till the plant completely collapses. Current manual methods to identify and reduce the damage to coffee plantation fail to arrest CWSB attacks. We propose a novel idea of arresting the growth of CWSB to enhance coffee productivity by means of Wireless Sensor Networks (WSNs). WSN deployed in the coffee field covers all the stems of coffee plants and if CWSB is detected, it transmits such information to a nodal center so that necessary measures could be taken to reduce the further growth of the pest. In this paper, we propose an Energy aware Routing in WSN for Pest Detection (ERWPD) for transmitting the information of CWSB existence in the Coffee Arabica plants through Cluster-Heads (CHs) to the sink node (a nodal center). The CH aggregates the data received from the primary nodes and forwards it by establishing routes to the sink. Route establishment takes place by flooding of Route REQuest packets (RREQ) and creating Route REPly packet (RREP) at the sink node. Energy conservation is achieved by reducing the number of control packets required for route establishment. The simulation analysis of ERWPD illustrates better packet delivery ratio, lower delays and overheads in comparison to Data Routing In-Network Aggregation (DRINA).","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind symbol rate estimation by exploiting cyclostationary features in wavelet domain","authors":"Sushant Kumar, V. Bohara, S. Darak","doi":"10.1109/ICACCI.2016.7732302","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732302","url":null,"abstract":"In multi-standard wireless communication receivers, an estimation of the symbol rate is critical to blindly demodulate received signal. Symbol rate estimation at high signal-to-noise (SNR) ratio has been studied extensively in the literature and many computationally efficient methods have been proposed. However, symbol rate estimation at low SNR environment is still a challenging task. In this paper, a new method for accurately estimating the symbol rate of any received signal has been proposed. To the best of our knowledge, proposed method is the first which exploits cyclostationary features of received signal in wavelet domain. Simulation results validate the superiority of the proposed method over others especially at low SNR values. At the end, detailed complexity analysis based on total number of gate counts is presented.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel and efficient design of golay encoder for ultra deep submicron technologies","authors":"Chiranjeevi Sheelam, J. Ravindra","doi":"10.1109/ICACCI.2016.7732059","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732059","url":null,"abstract":"This paper lays out two different approaches for generation of binary golay code (23, 12). Namely, Linear feedback shift register (LFSR) based CRC and hardware architecture based on CRC. There are certain disadvantages associated with these two architectures. To overcome those disadvantages, a new architecture has been proposed for binary golay code (23, 12) generation. This paper also presents an efficient hardware architecture to generate extended golay code (24, 12). High speed, low latency, low area and low power architecture has been designed and verified.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic ranking of essays using structural and semantic features","authors":"Sunil Kumar Kopparapu, A. De","doi":"10.1109/ICACCI.2016.7732098","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732098","url":null,"abstract":"Evaluating an essay automatically has been an area of active research even though there has been a shift to multiple choice answers in many competitive exams. In this paper, we propose an unsupervised technique to rank essays based on the structural and semantic content of the essays. The approach is unsupervised because it makes use of a the complete set of essays to determine the rank of the an individual essay. We purposely avoid deep parsing and the approach is based on use of both structural features of the essay and also the semantic content of the essay. We evaluate the proposed approach on a set of essays submitted to a competition generated from a single prompt. We compare the ranks of the essays with the ranks given by two different human evaluators. The results show a good correlation between the proposed unsupervised algorithm and the human evaluators. The proposed approach, as designed, is independent of any external knowledge base.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"38 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment","authors":"P. Mishra, E. Pilli, V. Varadharajan, U. Tupakula","doi":"10.1109/ICACCI.2016.7732025","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732025","url":null,"abstract":"Today we are living in the era of Cloud Computing where services are provisioned to users on demand and on a pay-per-use basis. On oneside, Cloud Computing has made things easier but it has also opened new doors for cyber attackers. In this paper, we propose an efficient security architecture named as NvCloudIDS to deal with intrusions at Network and Virtualization layer in Cloud Environment. NvCloudIDS performs the behavioral analysis of network traffic coming to or going from Cloud Networking Server (CNS) and provides first level of defense from intrusions at network level. It also performs Virtual Machine (VM) memory introspection and VM traffic analysis at hypervsior layer of Cloud Compute Server (CCoS) and provides second level of defense at virtualization level. The architecture of NvCloudIDS is primarily designed to improve the robustness and power of attack detection of IDS by leveraging Virtual Machine Introspection (VMI) and Machine learning techniques. The framework is validated with recent intrusion dataset (UNSW-NB) and malware binaries collected from research centers and the results seem to be promising.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Basavaraj Hiremath, S. Prasannakumar, K. Praneethi
{"title":"Breast cancer detection using non-invasive method for real time dataset","authors":"Basavaraj Hiremath, S. Prasannakumar, K. Praneethi","doi":"10.1109/ICACCI.2016.7732124","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732124","url":null,"abstract":"Breast Cancer is one of the most horrible and dangerous diseases that affect women health. This paper aims to detect the breast cancer in a non-invasive manner with the help of mammograms and enables advanced characterization of the lesion using following steps: mammogram enhancement using adaptive median filter, cancer area detection using seed value based segmentation, extraction of CSLBP and GLDM features and finally, classification of cancer using RBF-SVM. The Algorithm is evaluated on real time mammogram breast dataset consisting of 249 images and for the considered dataset, accuracy is found to be 95.18%.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}