2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)最新文献

筛选
英文 中文
Unmanned aerial vehicle based bomb detection 基于无人机的炸弹探测
C. Manoj, N. SaiTeja, R. D. Kumar, M. Priyadarsini, K. Murugesan, I. S. Rao
{"title":"Unmanned aerial vehicle based bomb detection","authors":"C. Manoj, N. SaiTeja, R. D. Kumar, M. Priyadarsini, K. Murugesan, I. S. Rao","doi":"10.1109/ICACCI.2016.7732412","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732412","url":null,"abstract":"In any Bomb rescue operation, time factor plays a vital role. As Bomb can explore at any moment, Our task is to reduce the time consuming to detect the Bomb when compared to manual detection. Detecting Bomb manually is highly risky and much time consuming process. In this paper we propose a new technique using “Quadcopter” nothing but UA V (Unmanned Aerial Vehicle). It is an air vehicle which has multiple rotors (in our paper it is 4) and is controlled by the RC transmitter (joysticks). An attempt has been made to detect the bomb by using Geiger counter module. Geiger module can detect any type of radioactive radiation emitted from the Bomb. Bomb location information is sent to the user by making use of GPS and GSM modules. We integrated Geiger module, GPS module, GSM module, Arduino-UNO as a payload to the quadcopter. We need to pass the quadcopter on the area in which the operator wants to examine and if any Bomb is present, then Geiger tube detects it Then immediately Bomb location is sent to the operator's mobile by GPS and GSM modules. The main objective of this paper is to ensure the safety of the operator and to reduce the detection process time when compared to manual detection.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel and secure methodology for keyless ignition and controlling an automobile using air gestures 一种新颖而安全的方法,用于无钥匙点火和使用手势控制汽车
S. R. Rupanagudi, Varsha G. Bhat, R. Supriya, Riya Dubey, S. Sukumar, S. Karmarkar, K. Amulya, Ankita Raman, D. Indrani, Abhiram Srisai, Mahathy Rajagopalan, V. Venkatesh, Nupur Jain
{"title":"A novel and secure methodology for keyless ignition and controlling an automobile using air gestures","authors":"S. R. Rupanagudi, Varsha G. Bhat, R. Supriya, Riya Dubey, S. Sukumar, S. Karmarkar, K. Amulya, Ankita Raman, D. Indrani, Abhiram Srisai, Mahathy Rajagopalan, V. Venkatesh, Nupur Jain","doi":"10.1109/ICACCI.2016.7732246","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732246","url":null,"abstract":"The past few years has shown a sudden spurt in the field of human computer interaction. The days of using a mouse to control a computer is almost obsolete and people now prefer to use touch screens and more recently, air gestures, for the same. However, the use of gestures is not limited to computers alone. It finds its application in controlling televisions and other home appliances as well. This paper explores one such application where in air gestures could be used to control automobiles. The paper describes a novel method to not only give directions but also password-protect and use special features of the vehicle, using gestures. The complete algorithm was developed using video processing on MATLAB 2011b and was found to be 3.6 times faster than its predecessor algorithms. The same was tested in real-time as well, using a robot prototype and satisfactory results were obtained.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Self power analysing energy efficient protocol (SPAEEP): An adaptive approach 自功率分析节能协议(SPAEEP):一种自适应方法
N. G. Palan, B. V. Barbadekar, Suahs Patil
{"title":"Self power analysing energy efficient protocol (SPAEEP): An adaptive approach","authors":"N. G. Palan, B. V. Barbadekar, Suahs Patil","doi":"10.1109/ICACCI.2016.7732286","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732286","url":null,"abstract":"Main challenge in WSN (Wireless sensor network) faced by researcher is - battery life (energy of a node). In this paper general framework of distributed mechanism of multi-hop WN (wireless network) is considered. Cluster based routing protocols like Low Energy Adaptive Clustering Hierarchy (LEACH), Hybrid Energy Efficiency Protocol (HEEP). Threshold sensitive energy efficient network Protocol (TEEN) and PEGASIS efficiently manages the energy usage. But still these protocol should be thoroughly studied and revised to achieve more energy efficiency. Paper focuses on LEACH protocol, where cluster Head (CH) selection process termed as `round' (r). Each round costs setup and steady state phase of the network. Research proposes novel idea of Self Power Analyzing Energy Efficient Protocol (SPAEEP) with energy model (eM). EM is applied to CH which adaptively decides to initiate next round based on balanced energy. Adaptive decision will help in reducing the number of rounds (r). Application of the same to the nodes will lead to fault tolerant network with proper hand over mechanism. Concept is also extended to 802.15.4 protocol, as it follows standard network architecture. Our results reveal that new method suggested will reduce energy consumption of CH and hence the increased life span of network. The outcome is fault tolerant network.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel feature ranking criteria for interval valued feature selection 区间值特征选择的新特征排序准则
D. S. Guru, N. V. Kumar
{"title":"Novel feature ranking criteria for interval valued feature selection","authors":"D. S. Guru, N. V. Kumar","doi":"10.1109/ICACCI.2016.7732039","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732039","url":null,"abstract":"In this paper, novel feature ranking criteria suitable for supervised interval valued data are introduced. The ranking criterion basically used to rank the features based on their relevancy prior to feature selection for pattern classification. In our work, initially, a vertex transformation approach is applied on interval valued data to obtain with a crisp type data. Then, the proposed feature ranking criterion is applied on the vertex interval data to rank the features based on their relevancy. This followed by the selection of top k ranked features from the given d set of interval features. Thus the obtained feature subset is evaluated using suitable learning algorithm. The efficacy of the proposed ranking criteria is validated using three benchmarking interval valued datasets and two symbolic classifiers. Finally, a comparative analysis is given to uphold the superiority of the proposed model in terms of classification accuracy.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy aware routing in WSN for pest detection in coffee plantation 咖啡种植区害虫检测的无线传感器网络能量感知路由
Roshan Zameer Ahmed, R. Biradar
{"title":"Energy aware routing in WSN for pest detection in coffee plantation","authors":"Roshan Zameer Ahmed, R. Biradar","doi":"10.1109/ICACCI.2016.7732078","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732078","url":null,"abstract":"Coffee production stands crucial asset in growing the economy of varied countries. The serious impact to the coffee plantation is due to the pest named Coffee White Stem Borer (CWSB). CWSB once enters into coffee stem, it bores inside and does not reveal its existence till the plant completely collapses. Current manual methods to identify and reduce the damage to coffee plantation fail to arrest CWSB attacks. We propose a novel idea of arresting the growth of CWSB to enhance coffee productivity by means of Wireless Sensor Networks (WSNs). WSN deployed in the coffee field covers all the stems of coffee plants and if CWSB is detected, it transmits such information to a nodal center so that necessary measures could be taken to reduce the further growth of the pest. In this paper, we propose an Energy aware Routing in WSN for Pest Detection (ERWPD) for transmitting the information of CWSB existence in the Coffee Arabica plants through Cluster-Heads (CHs) to the sink node (a nodal center). The CH aggregates the data received from the primary nodes and forwards it by establishing routes to the sink. Route establishment takes place by flooding of Route REQuest packets (RREQ) and creating Route REPly packet (RREP) at the sink node. Energy conservation is achieved by reducing the number of control packets required for route establishment. The simulation analysis of ERWPD illustrates better packet delivery ratio, lower delays and overheads in comparison to Data Routing In-Network Aggregation (DRINA).","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blind symbol rate estimation by exploiting cyclostationary features in wavelet domain 利用小波域环平稳特征的盲码率估计
Sushant Kumar, V. Bohara, S. Darak
{"title":"Blind symbol rate estimation by exploiting cyclostationary features in wavelet domain","authors":"Sushant Kumar, V. Bohara, S. Darak","doi":"10.1109/ICACCI.2016.7732302","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732302","url":null,"abstract":"In multi-standard wireless communication receivers, an estimation of the symbol rate is critical to blindly demodulate received signal. Symbol rate estimation at high signal-to-noise (SNR) ratio has been studied extensively in the literature and many computationally efficient methods have been proposed. However, symbol rate estimation at low SNR environment is still a challenging task. In this paper, a new method for accurately estimating the symbol rate of any received signal has been proposed. To the best of our knowledge, proposed method is the first which exploits cyclostationary features of received signal in wavelet domain. Simulation results validate the superiority of the proposed method over others especially at low SNR values. At the end, detailed complexity analysis based on total number of gate counts is presented.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel and efficient design of golay encoder for ultra deep submicron technologies 一种新型、高效的超深亚微米光栅编码器设计
Chiranjeevi Sheelam, J. Ravindra
{"title":"A novel and efficient design of golay encoder for ultra deep submicron technologies","authors":"Chiranjeevi Sheelam, J. Ravindra","doi":"10.1109/ICACCI.2016.7732059","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732059","url":null,"abstract":"This paper lays out two different approaches for generation of binary golay code (23, 12). Namely, Linear feedback shift register (LFSR) based CRC and hardware architecture based on CRC. There are certain disadvantages associated with these two architectures. To overcome those disadvantages, a new architecture has been proposed for binary golay code (23, 12) generation. This paper also presents an efficient hardware architecture to generate extended golay code (24, 12). High speed, low latency, low area and low power architecture has been designed and verified.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic ranking of essays using structural and semantic features 使用结构和语义特征的文章自动排名
Sunil Kumar Kopparapu, A. De
{"title":"Automatic ranking of essays using structural and semantic features","authors":"Sunil Kumar Kopparapu, A. De","doi":"10.1109/ICACCI.2016.7732098","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732098","url":null,"abstract":"Evaluating an essay automatically has been an area of active research even though there has been a shift to multiple choice answers in many competitive exams. In this paper, we propose an unsupervised technique to rank essays based on the structural and semantic content of the essays. The approach is unsupervised because it makes use of a the complete set of essays to determine the rank of the an individual essay. We purposely avoid deep parsing and the approach is based on use of both structural features of the essay and also the semantic content of the essay. We evaluate the proposed approach on a set of essays submitted to a competition generated from a single prompt. We compare the ranks of the essays with the ranks given by two different human evaluators. The results show a good correlation between the proposed unsupervised algorithm and the human evaluators. The proposed approach, as designed, is independent of any external knowledge base.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"38 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment NvCloudIDS:用于检测云环境中网络和虚拟化层入侵的安全架构
P. Mishra, E. Pilli, V. Varadharajan, U. Tupakula
{"title":"NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment","authors":"P. Mishra, E. Pilli, V. Varadharajan, U. Tupakula","doi":"10.1109/ICACCI.2016.7732025","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732025","url":null,"abstract":"Today we are living in the era of Cloud Computing where services are provisioned to users on demand and on a pay-per-use basis. On oneside, Cloud Computing has made things easier but it has also opened new doors for cyber attackers. In this paper, we propose an efficient security architecture named as NvCloudIDS to deal with intrusions at Network and Virtualization layer in Cloud Environment. NvCloudIDS performs the behavioral analysis of network traffic coming to or going from Cloud Networking Server (CNS) and provides first level of defense from intrusions at network level. It also performs Virtual Machine (VM) memory introspection and VM traffic analysis at hypervsior layer of Cloud Compute Server (CCoS) and provides second level of defense at virtualization level. The architecture of NvCloudIDS is primarily designed to improve the robustness and power of attack detection of IDS by leveraging Virtual Machine Introspection (VMI) and Machine learning techniques. The framework is validated with recent intrusion dataset (UNSW-NB) and malware binaries collected from research centers and the results seem to be promising.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Breast cancer detection using non-invasive method for real time dataset 实时数据集的非侵入性乳腺癌检测方法
Basavaraj Hiremath, S. Prasannakumar, K. Praneethi
{"title":"Breast cancer detection using non-invasive method for real time dataset","authors":"Basavaraj Hiremath, S. Prasannakumar, K. Praneethi","doi":"10.1109/ICACCI.2016.7732124","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732124","url":null,"abstract":"Breast Cancer is one of the most horrible and dangerous diseases that affect women health. This paper aims to detect the breast cancer in a non-invasive manner with the help of mammograms and enables advanced characterization of the lesion using following steps: mammogram enhancement using adaptive median filter, cancer area detection using seed value based segmentation, extraction of CSLBP and GLDM features and finally, classification of cancer using RBF-SVM. The Algorithm is evaluated on real time mammogram breast dataset consisting of 249 images and for the considered dataset, accuracy is found to be 95.18%.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信