{"title":"Penalty based weighted cooperative spectrum sensing using normal factor graph","authors":"Guman Kanwar Shekhawat, P. Karmakar","doi":"10.1109/ICACCI.2016.7732029","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732029","url":null,"abstract":"In this paper, we have considered the problem of spectrum sensing in Cognitive Radio Networks (CRN). In these networks, Cooperative Spectrum Sensing (CSS) technique is used to overcome the problem of hidden terminal, fading and shadowing. In this paper, we have proposed the Weighted Cooperative Spectrum Sensing (WCSS) framework using Normal Factor Graph (NFG). The WCSS framework in CRN improves the sensing ability and accuracy of the network. The proposed probabilistic inference modeling of WCSS algorithm deals with the up gradation of weight factor values based on Secondary Users (SU) performance. Simulation result shows that the performance of the proposed scheme is better than the performance of CSS using NFG in time varying fading environment.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131184463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human energy interacting interface: Interface to transform environmental energy into human acquired energy","authors":"A. Dubey, M. Kolhe, V. Singh","doi":"10.1109/ICACCI.2016.7732312","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732312","url":null,"abstract":"The human body acquires energy in many form to manage their activities. This energy enters into human body in the form of food, beverages or any other external source. Few of the vital nutrients are injected into human body via supplementary medicines, etc. Some of the required energy of human body is absorbed naturally from the environment (e.g. vitamin D through sunlight). Human body absorbs limited energy / nutrients from the environment due to lack of proper transformation of energy aspects of human body. Due to this there is requirement of an interface which can help in transforming the environmental energy for fulfilling some aspects of the human body energy requirements. To understand the role of environment energy for its utilization to fulfil the some energy requirement of human body, we have proposed & discussed an interface that has capability of transforming the environmental energy into various aspects of human body energy.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131223554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-reference EWOD driving scheme and cross-contamination aware net placement technique for MEDA based DMFBs","authors":"Pampa Howladar, Debashri Roy, P. Roy, H. Rahaman","doi":"10.1109/ICACCI.2016.7732114","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732114","url":null,"abstract":"Droplet based digital microfluidics is a popular emerging technology for laboratory experiments. However, certain limitations exist in specific cases for implementation that require further enhancement. Pin-count minimization and cross- contamination avoidance between droplets of different biomolecules during droplet routing are primary design challenges for biochips. A competent architecture namely Microelectrode Dot Array (MEDA) has recently been introduced as a new highly scalable, field programmable and reconfigurable dot array architecture which allows dynamic configuration. This work considers the cross contamination problems in pin constrained biochips based on MEDA architecture. In order to reduce the cross-contamination problem, in this work we present a MEDA architecture based cross-reference driving scheme that allows simultaneous driving of multiple droplets and thereby propose a suitable net placement technique applicable for MEDA architecture. The objectives of this proposed technique include reducing the crossovers with intelligent collision avoidance, minimizing the overall routing time and increasing grouping number to reduce the total pin-count. Simulation results thus presented in this paper indicate the efficiency of our algorithm for practical bioassays.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing impact of seasonal rainfall on rice crop yield of Rajasthan, India using association rule mining","authors":"N. Gandhi, L. Armstrong","doi":"10.1109/ICACCI.2016.7732178","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732178","url":null,"abstract":"Developing countries which are highly dependent on agriculture have shown growing concern that climate variability will further impact on food security. It is important to have a deeper understanding of the impact of this climate change on crop production and food security. This paper assesses the impact of distributed seasonal rainfall on rice crop yield of Rajasthan state, India through data visualisation and application of association rule mining techniques. The dataset considered for the present study was of twenty nine districts of Rajasthan state for forty three years from 1960 to 2002 depending on the data availability. Three divisions were made for the rainfall in Kharif season from June to November. Beginning of the season was considered as June and July, Middle of the season as August and September and End of the season as October and November. The effect of variation in the rainfall at the beginning, middle and end of season on the rice crop yield was investigated and some interesting results are reported.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach towards quality assessment of turmeric rhizomes using surface thermal profiles","authors":"N. Saini, Amitava Das","doi":"10.1109/ICACCI.2016.7732260","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732260","url":null,"abstract":"Thermal imaging techniques is an emerging non invasive method that is increasingly being studied for quality evaluation of agricultural and food products. There is limited reported literature on the quality assessment of turmeric rhizomes using machine vision techniques. In our study, we used passive thermography for obtaining surface thermal profiles of turmeric rhizomes at different time instants after the samples were heated for an hour in daylight conditions. The obtained thermal images were processed and the thermal profiles of the samples were computed. After normalization of the obtained thermal profiles, it was observed that the healthy rhizome samples had significantly different thermal profiles than the shriveled ones. The results are promising and further work is required to correlate the thermal profiles of the turmeric rhizomes with their chemical composition.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133699163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-factor authentication using threshold cryptography","authors":"Vishnu Venukumar, V. Pathari","doi":"10.1109/ICACCI.2016.7732291","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732291","url":null,"abstract":"Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be stored for the lifetime of the authentication process. They also involve security risks whenever an authentication process requires the user's password at a public place like a Point-of-Sale terminal or an open ATM booth. This work proposes a more secure, efficient, convenient and flexible multi-factor authentication technique using threshold cryptography.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient method of detecting exudates in diabetic retinopathy: Using texture edge features","authors":"Priyadarshini Patil, Pooja Shettar, Prashant Narayankar, Mayur Patil","doi":"10.1109/ICACCI.2016.7732206","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732206","url":null,"abstract":"Ophthalmologists analyze fundus images of eye extensively as a non invasive diagnosis tool for various internal eye defects. Diabetic retinopathy is an eye complication specially seen in diabetic patients, causing damage to retina which may lead to blindness. The major symptoms of this disorder is the presence of exudates, a pus like fluid oozed from damaged blood vessels due to high blood sugar. This hardens on the retina of patient, leading to blindness. In this paper, we propose a methodology for automatic detection of exudates. We remove the non exudates like optic disc, blood vessels, and blood clots in two phases using Gradient Vector Flow Snake algorithm and region growing segmentation algorithm. This improves efficiency of detection by masking false exudates. Then, we detect exudates using Gabor filter texture edge detection based segmentation algorithm. To reduce computational complexity, only Gabor filters tuned to two higher frequencies and four orientations are used. We have implemented the proposed methodology on 850 test images. We have obtained a high efficiency of 87% true exudates.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical feature extraction/selection for small infrared target","authors":"N. Pokhriyal, S. K. Verma","doi":"10.1109/ICACCI.2016.7732355","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732355","url":null,"abstract":"Feature extraction and selection have become necessary steps for `low loss dimension reduction'. Machine learning, data mining and pattern recognition are the respective fields to use this methodology. In small target infrared image many false alarms may occur due to different clutters. In machine learning, for preprocessing set of relevant features of the target is required and for dimensionality reduction selection of most appropriate feature subset is done for the classification purpose. To reduce false alarm rate, this paper focuses on extraction of relevant features of small infrared target where each feature is analyzed statistically and selection of relevant feature subset is done by using forward feature selection approach and there is reduction in false alarm rate by a factor of 2.3 in compare to filter based detection by using classifiers.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"8 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of olfactory receptors using a parametric model","authors":"Pranay Sakhare, Rajneesh Rani, R. Rout","doi":"10.1109/ICACCI.2016.7732165","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732165","url":null,"abstract":"Human nose can smell number of chemicals having distinct odors. These odor molecules are detected by the olfactory receptors. Olfactory Receptors (ORs) have a large family of mouse, rat, human, chimpanzee, earthworm, dog, etc. As there are number of families of distinct species, the mouse OR genes are identified to work upon, because restricted amount of work has been done using this species. In this paper, OR family of mouse and human has been studied by using quantification of Barcode matrix, DNA walk and Haar wavelet coefficients. These parameters have been studied for the proper understanding of their DNA sequences, to know the difference between intricate sequences of DNA and to know the hidden symmetries between the DNA sequences. Subsequently, clustering method is applied after knowing the quantitative results. Then a proper study has been done for the clustering results to examine the mouse OR. Using this proposed model, a probable justification or deterministic nullification can be given that whether a given sequence of DNA string composed of nucleotides is a probable mouse OR or not.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network processor — A simplified approach for transport layer offloading on NIC","authors":"G. Gadre, S. Badhe, Kedar Kulkarni","doi":"10.1109/ICACCI.2016.7732440","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732440","url":null,"abstract":"High performance Network Interconnect is the most important component in High Performance Computing systems. The Network Interconnect mainly consists of three components: Network Interface Card, Switch fabric, and Light weight protocol stack. In order to achieve high bandwidth and low latency, transport protocol is offloaded to Network Interface Card. In transport offload model, the Network Interface Card is not only involved in data transfer but also involved in protocol processing. Protocol processing is a very complex task that involves multiple variables and intricate functionality. Therefore, it would be very beneficial if the Network Interface Card can provide enough flexibility to support multiple protocols. Enhancing support for multiple functionalities will empower the Network Interface Card to support multiple applications. Traditionally, the fixed custom logic in FPGA or ASIC was used for protocol processing. But, it is very difficult to achieve flexibility in the fixed custom logic. To overcome this issue, Network Processor, which provides a lot of flexibility, has emerged as an alternative for conventional hardwired logic. In this paper, we present a novel architecture that makes use of a RISC processor as the Network processor for high-speed network interfaces. We focus on the use of Network Processor in protocol processing. We also share how useful Network Processor is for supporting additional features, even after the complete NIC architecture was finalized. We also explain the debugging strategy, which is very helpful for debugging complex protocol processing.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}