{"title":"Solving Intersection Searching problem for spatial data using bloom filters","authors":"Prerna Budhkar","doi":"10.1109/CONECCT.2013.6469310","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469310","url":null,"abstract":"In a generalized Intersection Searching problem, a set S of spatial objects is pre-processed so that for a given a query object q, the question that whether q intersects with any object of S can be answered efficiently. A technique to solve Intersection Searching problem on spatial data using bloom filter is presented. Bloom filter on conventional data has been proved to be one of the most successful technique for solving set-membership problem. The presented method applies space filling curves on spatial objects to fetch appropriate information about these divisions. It then converts this information into a bloom filter which can be used for addressing intersection searching problem. The technique performs the intersection search query in O(1) amortized time. The space required to store the pre-processed spatial data set is linear to number of objects in the dataset.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124985657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. S. Sunish Kumar, C. V. Shyam David, P. Menon, V. Jayasree
{"title":"A statistical modeling of QoS in an Optical Burst Switched network","authors":"O. S. Sunish Kumar, C. V. Shyam David, P. Menon, V. Jayasree","doi":"10.1109/CONECCT.2013.6469292","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469292","url":null,"abstract":"In this paper a novel analytical model for the analysis of QoS in an Optical Burst Switching (OBS) network is described. This model is based on considering the Data Burst (DB) blocking probability at the optical node together with physical channel impairments like fiber cut between the nodes, for ensuring the QoS demanded. Here the primary importance is given for preventing the Data Burst (DB) loss while propagating from an ingress node to an egress node through intermediate switching nodes. At each node, prior information about the blocking probability in the immediate successor node and detection of fiber cuts between the nodes are required. So a non-homogenous Markov chain is used to find state of the node in relation to DB blocking probability after `n' states of the node. Upon detecting the fiber cut or probability of DB blocking in the immediate successor node, the present node invokes a Genetic algorithm to find the alternate shortest path for bypassing the immediate succeeding node in the specified light path. Furthermore, the blocking probability of DB with and without the Fiber Delay Lines (FDL) are considered and compared in this paper.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gradient sample argument weighting for robust image region description","authors":"John-Olof Nilsson, P. Handel","doi":"10.1109/CONECCT.2013.6469287","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469287","url":null,"abstract":"The weighting of gradient sample arguments for the creation of descriptors of image regions is studied. The descriptors are interpreted as binned and weighted argument kernel density estimates and thereby their defining attributes are identified as the binning rules and the weighting. The weighting is further studied and four different weighting strategies are analyzed. The naive constant weighting is argued to have a poor robustness to image perturbations. As an answer to this, the customary gradient magnitude weighting is motivated. However, the short-comings of this approach are pointed out and two novel weighting strategies are suggested. The first suggested weighting gives a system parameter determining a distinctiveness to robustness trade-off with the customary magnitude weighting being a special case of it. The second suggested weighting gives a similar robustness as the first one, but at a lower computational cost. Finally, the effects of the different weighting strategies are demonstrated with real imagery data and synthetic perturbations.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114955293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of erroneous power control on the performance of overloaded cellular UCDS-CDMA","authors":"Ashutosh Kumar Singh, Pardeep Singh","doi":"10.1109/CONECCT.2013.6469305","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469305","url":null,"abstract":"Channel overloading in Code Division Multiple Access (CDMA) paves the way to achieve more no of users (>N) in a space with dimension equal to the spreading factor (N). It puts its own priority over the conventional CDMA to provide broadband access in cellular wireless communication. A new overloading scheme for the uplink of cellular CDMA has been proposed in [7] using unequal chip delay spreading (UCDS). It divides all the active users into G groups with each group containing L number of users. Each user in a group is assigned the same orthogonal code, but with different chip durations (multiple of Tc/L). For spreading, all the L Users in a group use the assigned unique code with the insertion of predefined time delay. During spreading each user in a group has to go through unequal time delay between each successive spreading chip. Addition of suitable delays helps in maintaining the correct time alignment among all the users in a group. The receiver uses a very simple orthogonal successive interference cancellation (OSIC) multi user detector in order to recover the message bits of all the users. In this paper, the performance of this new overloading scheme (UCDS-CDMA) with an overloading factor (OF) of TWO has been evaluated with different levels of error in power control. The system model has been designed mainly for the uplink of the cellular CDMA over an additive white Gaussian noise (AWGN) channel. The effect of erroneous power control in the uplink of UCDS-CDMA costs a SNR of 1.1 dB, 1.3 dB and 1.6 dB as compared to the conventional perfectly power controlled underloaded CDMA (OF=1) with the power control error of 1 dB, 1.5 dB and 2 dB respectively at a BER of 10-3.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123862740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear estimation and control of wind turbine","authors":"R. Saravanakumar, D. Jena","doi":"10.1109/CONECCT.2013.6469307","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469307","url":null,"abstract":"Wind energy is one of the major renewable energy sources which continue to be one of the fastest growing power generation sectors. For variable speed operation of wind energy conversion system, it is required to generate the maximum power at below the rated speed using an authentic and powerful control strategy. Wind speed has the major impact on the dynamics and control of wind turbines. But in practice there is no accurate measurement of effective wind speed available for direct measurement. In this paper a new technique is proposed for optimal power generation of wind turbine below rated speed without estimating the wind speed. An extended Kalman filter (EKF) is used to estimate the rotor speed and a proportional (P) controller is used to track the error between the measured and estimated rotor speed. The output of the P controller is the estimated aerodynamic torque. The estimated aerodynamic torque and the rotor speed act as an input to the aerodynamic torque feed-forward (ATF) controller. The output of the ATF controller is the generated torque. As the aerodynamic torque is highly dependent on the wind speed so it cannot be controlled. So we have to control the generated torque by using ATF for generating optimal power output. Finally the estimated outputs are validated through correlation analysis.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Mishra, J. Kishore, R. Shetty, A. Malhotra, R. Kukreja
{"title":"Robust template matching based obstacle tracking for autonomous rovers","authors":"P. Mishra, J. Kishore, R. Shetty, A. Malhotra, R. Kukreja","doi":"10.1109/CONECCT.2013.6469290","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469290","url":null,"abstract":"Detection and tracking of moving obstacles is central to collision free navigation of autonomous rovers in dynamic environments. Template matching based methods for obstacle tracking have been proposed in literature. These methods have limitations in tracking dynamic obstacles owing to scale and rotation variations. These variations arise due to relative velocity between the rover and the obstacle to be tracked. Due to the relative velocity, the correlation between the template of the obstacle and the region in the image corresponding to the obstacle in successive frames degrades. In this paper we present three schemes targeted at improving robustness of template matching based tracking technique using monocular vision. The algorithms presented account for the geometric constraints posed on an image captured from a fixed camera mounted on a mobile platform. We present experimental results comparing the performance of our technique with the existing template matching based techniques. Also, we present two real-time applications in the form of object following behavior and obstacle avoidance behavior to demonstrate its efficacy and computational feasibility.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal image fusion in Visual Sensor Networks","authors":"D. Egfin Nirmala, R. Vignesh, V. Vaidehi","doi":"10.1109/CONECCT.2013.6469319","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469319","url":null,"abstract":"In this paper, we present a novel method for adaptive fusion of multimodal surveillance images, based on Non-Subsampled Contourlet Transform (NSCT), which has an improved performance over Visual Sensor Networks (VSN). In sensor networks, energy consumption and bandwidth are the main factors that determine the lifetime of the sensors. In order to reduce the energy and bandwidth used in transmission, the proposed method uses Compressive sensing (CS) which can compress the input data in the sampling process efficiently. Since CS is more efficient for sparse signals, in this work, each sensor image is first decomposed into sparse and dense components. We have introduced Contourlet Transform for this decomposition because of its ability to capture and represent smooth boundaries of objects in images, so that the reconstructed images have a better quality. The reconstructed input images are fused using an adaptive algorithm based on NSCT in a centralized server. The improvement in the quality of the fused image is achieved by the use of an image fusion metric and a search algorithm to assign optimum weights to the various regions in the segmented source images. Experimental results show, no significant change in the quality of the fused images with and without compression. The results show that the proposed method achieves better visual quality and objective metrics than the state-of-art methods.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A thermal imaging based wireless sensor network for automatic water leakage detection in distribution pipes","authors":"R. Parida, V. Thyagarajan, S. Menon","doi":"10.1109/CONECCT.2013.6469289","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469289","url":null,"abstract":"Water leakage is a significant problem in both developing and developed countries causing water loss in water-distribution systems. Leakage causes economic loss in the form of wastage of water, damage to pipe networks and foundations of roads and buildings, and also poses risk to public health due to water contamination. The lost or unaccounted amount of water is typically 20-30 percent of production. Some older systems may lose even up to 50 percent. The water pipe networks in houses as well as public places are generally concealed and hence detecting water leakage in the initial stages before an upcoming damage is difficult. The existing technologies for detecting leakage have various limitations such as efficiency being dependent on size, material and depth of pipes, need for manual intervention, dependency on weather and surface conditions and effect of water pressure. In this paper, we propose an automated water leakage detection system using a wireless sensor network created along the distribution pipes based on thermal (IR) imaging. Thermal imaging has the capability to work in low lighting or dark conditions and helps in capturing the contrast between hot and cold areas created due to water leakage. A network of low cost, low power thermal imaging sensors each having its own processing and Radiofrequency (RF) Transreceiver units and operating independent of pipe, weather or surface conditions is proposed in this paper. A central database is updated on a real-time basis, enabling very early leakage detection and initiating subsequent action to address the problem. An example system evaluation is performed and results highlighting the power and cost impact of the sensor network system are presented.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130892964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An investigation of passive optical networks for India based neutrino observatory","authors":"V. Singh, N. Chandrachoodan, A. Prabhakar","doi":"10.1109/CONECCT.2013.6469316","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469316","url":null,"abstract":"The India-based neutrino observatory (INO) is being designed with an iron calorimeter (ICAL) as the neutrino detector. The ICAL consist of about 30,000 resistive plate chambers (RPCs) at INO which will act as the neutrino detectors. Each RPC is expected to generate data at a maximum of 2.52 Mbps, which will then be multiplexed further at the backplane. We compare a controller area network against a Passive Star Optical Network (PSON), in terms of technical feasibility, optical link budgets and costs. We then characterize the PSON using a microcontroller based application specific hardware.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multichannel sampling method for 2-D finite-rate-of-innovation signals","authors":"S. Mulleti, Basty Ajay Shenoy, C. Seelamantula","doi":"10.1109/CONECCT.2013.6469313","DOIUrl":"https://doi.org/10.1109/CONECCT.2013.6469313","url":null,"abstract":"We address the problem of sampling and reconstruction of two-dimensional (2-D) finite-rate-of-innovation (FRI) signals. We propose a three-channel sampling method for efficiently solving the problem. We consider the sampling of a stream of 2-D Dirac impulses and a sum of 2-D unit-step functions. We propose a 2-D causal exponential function as the sampling kernel. By causality in 2-D, we mean that the function has its support restricted to the first quadrant. The advantage of using a multichannel sampling method with causal exponential sampling kernel is that standard annihilating filter or root-finding algorithms are not required. Further, the proposed method has inexpensive hardware implementation and is numerically stable as the number of Dirac impulses increases.","PeriodicalId":374175,"journal":{"name":"2013 IEEE International Conference on Electronics, Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125935728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}