S. A. Hussain, A. Singh, Chandrashekar Ramaiah, S. Hussain
{"title":"A wireless device for patient ECG monitoring and motion activity recording for medical applications","authors":"S. A. Hussain, A. Singh, Chandrashekar Ramaiah, S. Hussain","doi":"10.1109/ICRITO.2016.7785032","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785032","url":null,"abstract":"For Good Mental health and strength of any human life the basic activity regularly to be practiced is a Physical Exercise. The chronic diseases such as Heart attack, Arthritis, Cancer and Diabetes can be easily prevented with regular exercise which also helps to maintain the weight and reduces cholesterol. The researchers have been attracted with this area and its situations for real time monitoring. As GPS have developed to large extent this capability also helps to work in a real time manner. The basic idea is to develop a user-friendly mobile wireless ECG and motion activity recording device. This paper describes a complete remote monitoring solution where Bluetooth electrocardiogram sensor transmits the patient's data related to health immediately on a phone. This Information is displayed and stored in a memory of a mobile phone. The GPRS network connected to the system will provide up to date status of the patient's heart disease. It is designed in such a way to keep the status or monitoring of the patient data to a mobile phone and it is defined as a secure tool for transferring the data from different measuring devices to a mobile platform, this solution ensures that the results displayed on mobile phone are accurate with respect to time and cost. In simple words it provides the best communication between patient and doctor. For achieving disease management and critical success in getting patient data with real time feedback is possible by this activity recording application. This yields in to better result and better treatment for a patient.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on white-box cryptography: Key whitening and entropy attacks","authors":"Kratika Bhatia, S. Som","doi":"10.1109/ICRITO.2016.7784974","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784974","url":null,"abstract":"White-box cryptography is intended on saving software completions of algorithms based on cryptography against the recovery of key. They are mainly applied in applications based on Digital Rights Managements (DRM) as a cost effective substitute. This paper explains White-Box Cryptograph trends and some important problems, also focuses on two most popular cryptographic techniques-key whitening and entropy technique as well as the attacks imposed on them.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement in RED algorithm for isolation of DDOS attack in wired network","authors":"I. Gupta, Sukhbeer Singh","doi":"10.1109/ICRITO.2016.7784982","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784982","url":null,"abstract":"Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed in detail. Also AQM technique like RED has been analyzed. RED queue has been implemented to detect and isolate DDoS attack. To achieve malicious node detection, Min and Max threshold values are used. Results show that network performance has been improved to a great extent in terms of metrics such as packet loss, jitter and throughput.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications and usage of visual cryptography: A review","authors":"Anjney Pandey, S. Som","doi":"10.1109/ICRITO.2016.7784984","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784984","url":null,"abstract":"Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. In this paper, we intend to study the different application areas of Visual Cryptography. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging, multimedia and other such fields. Visual Cryptography comes in the field of data hiding used in cybercrime, file formats etc. This paper focuses on the application areas of visual cryptography from four different research papers/journals which talk about the most important application areas of visual cryptography.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fruit defect detection based on speeded up robust feature technique","authors":"Yogesh, Ashwani Kumar Dubey","doi":"10.1109/ICRITO.2016.7785023","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785023","url":null,"abstract":"This paper elaborated the fruit quality detection technique which was based on external properties of fruits such as shape, size and color. Due to large demand, manual monitoring of fruits are ineffectual for agriculture industry. So, it requires a competent technique which will help agriculture industry to full fill the demand of consumer. The proposed method is based on the use of speeded up robust feature. The method extracts the local feature of the segmented image and describes the object recognition. The objective is to design the defect detection algorithm which will be used for feature extraction and descriptor having less processing time.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinamrata, Rajeev Paulus, A. Jaiswal, Mukesh Kumar
{"title":"MEACSRA: Mobility and energy-aware cross-layer searching routing algorithm for wireless sensor network","authors":"Vinamrata, Rajeev Paulus, A. Jaiswal, Mukesh Kumar","doi":"10.1109/ICRITO.2016.7785016","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785016","url":null,"abstract":"WSNs with randomly deployed nodes, to reduce energy consumption while ensuring the connectivity and power of entire network is an important issue of research. A mobility and energy-aware cross-layer searching routing algorithm works in stationary and mobile scenario with the satisfactory performance in addition to mobility handling, provides route to nodes which forward data between each other directly in a single hop, or indirectly through multiple hops via neighbouring nodes and considers the channel assessing mechanism as well. This algorithm performs better in both CFP and CAP. Markov model analysis shows the state of each step. Cross-layer design considering MAC and PHY layer yields better performance. Simulated result shows energy consumption is efficient in both stationary and mobile scenario for larger scale network.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Mushaib, Rajeev Paulus, A. K. Jaiswal, Aditi Agarwal
{"title":"Analyzing and shrinking network inaccessibility in ZIGBEE wireless communication by comparing it with TDMA-MAC protocol","authors":"Mohammad Mushaib, Rajeev Paulus, A. K. Jaiswal, Aditi Agarwal","doi":"10.1109/ICRITO.2016.7785018","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785018","url":null,"abstract":"The ZIGBEE standard is one of the basal elucidation protocol proposed for wireless sensor networks. The protocol describes a flexible MAC layer layout to meet a variety of applications. Since WSN is pertinence-specific it is very termitable to provide a generic explication for all type of applications and topologies. Network inaccessibility is a sensual affair derived from the subsistence of fault stirring the elucidation services bestowed by the Medium Access Control (MAC) sub-layer. Network inaccessibility is the cause of communication black-out. This cause prevention in communication and may create disruption of network operation. For network inaccessibility a diagnostic miniature is passed-down in Wireless Sensor network to present ZIGBEE as a case study. In this paper network accessibility is reduced by using star and tree topology and implementing TDMA-MAC protocol and ZIGBEE MAC protocol in WSN network and comparing through-put, end-to end delay and packet delivery ration in two scenarios. A Network Simulator (NS-2) is used to check the effectiveness of different topologies.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Malgaonkar, Sanchi Soral, S. Sumeet, Tanay Parekhji
{"title":"Study on big data analytics research domains","authors":"S. Malgaonkar, Sanchi Soral, S. Sumeet, Tanay Parekhji","doi":"10.1109/ICRITO.2016.7784952","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784952","url":null,"abstract":"Data Analytics is the trending domain that analyses data to observe patterns and predict future outcomes. The outcomes are based upon analysis of past and current trends and behaviors. Data analytics deals with both descriptive and predictive analyses of data. Descriptive Data Analytics summarizes the data, it's behavior and draws useful conclusion from it. Predictive Data Analytics is the branch of data analytics that predicts future outcomes based on the current and historical data. These future predictions are drawn by observing patterns followed for past data and outcomes for the past events for similar scenarios. In this paper, various branches of data analytics have been discussed. Big data analytics architecture gives an overview of the various tools and system structure involved in big data analytics. Big data analytics is closely related to data mining and hence, implements data mining algorithms. Latter part of the paper covers machine learning algorithms and neural networks for training the dataset to recognize patterns for the modeled data and predict outcomes based on the training and pattern recognition. Modeling of data using neural networks helps in generating accurate and exhaustive outcomes.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of cluster and tree based data aggregation techniques in Vehicular Ad-Hoc Networks","authors":"Shaurya Gupta, R. Poonia","doi":"10.1109/ICRITO.2016.7784994","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784994","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) allows nodes or vehicles to intercommunicate with each other on a particular path. Some of the examples of its applications include enhancing road safety and supporting drivers and offer information facility like junction collision warning and intelligent traffic administration. The purpose of this paper is to study the components of data aggregation, data flow model for Vehicular Ad-hoc Networks along with data aggregation techniques. Later, we find out the best technique for VANET.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel approach for cache memory simulation at approximately-timed TLM abstraction level for SMP system","authors":"Nishit Gupta, Sunil Alag","doi":"10.1109/ICRITO.2016.7785002","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785002","url":null,"abstract":"To meet the ever increasing high speed computing requirements of complex System on Chips (SoC), there has been an increasing trend towards adopting Symmetric Multiprocessing (SMP) Systems encapsulating multiple processing cores each having multi-level cache memory for faster accesses. At an early design phase, estimating the requirement of - cache memory size and levels, prefetching strategy, snooping mechanism and coherency protocol to be adopted may save a lot of RTL simulation time and SoC area. Also, optimized cache parameters facilitate better SoC performance in terms of Bandwidth, latency, FIFO depth, arbitration policies etc. of various IP cores. In this work, keeping above in view, a novel approach is proposed to simulate coherent (Multi-Level) Cache Memory based on MESI protocol for Multi-Core Symmetric Multiprocessing (SMP) System deploying the benefits of Timed TLM simulations at an early design phase. The proposed Cache Memory system is provided with the memory reference traces extracted from earlier SoC simulation. Based on the user requirement, a memory hierarchy is dynamically generated which produces various cache memory access statistics which can be appropriately used for optimizing Cache Memory parameters.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122406240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}