{"title":"Satellite image processing","authors":"K. Vani","doi":"10.1109/ICSCN.2017.8085410","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085410","url":null,"abstract":"Satellite image processing plays a vital role for research and developments in Astronomy, Remote Sensing, GIS, Agriculture Monitoring, Disaster Management and many other fields of study. Satellite images are recorded in digital forms and then processed by the computers to extract information. Variations in the scene characteristics are represented as variations in brightness on images. A particular part of scene reflecting more energy will appear bright while a different part of the same scene that reflecting less energy will appear black. Digital image consists of discrete picture elements called pixels. Each pixel is a number represented as DN (Digital Number), that depicts the average radiance of relatively small area within a scene.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131701742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust audio watermarking for monitoring and information embedding","authors":"R. Subhashini, K. B. Bagan","doi":"10.1109/ICSCN.2017.8085650","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085650","url":null,"abstract":"The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple audio watermarking algorithm. And then the watermark embedding and detection process will be takesplace. Then the results will gives the high fidelity robust audio watermarking algorithms. Then these algorithms will gives the high robustness and also achieves high capacity against the common signal manipulation. It also gives the flexibility of utilizing the watermarking techniques with different watermarking audio.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic segmentation and recognition of iris images: With special reference to twins","authors":"C. N. Devi","doi":"10.1109/ICSCN.2017.8085415","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085415","url":null,"abstract":"This paper describes an automatic approach for iris segmentation and recognition with focus on twins. The technique entails localizing and segmenting the iris, followed by iris normalization and obtaining distinctive features. Lastly, iris templates are matched to realize one to one and one to many recognition in twins. Further, effect of various template sizes on the accuracy and memory requirement are studied. To our knowledge, this is the first iris based authentication with special emphasis on twins.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Literature survey on traffic-based server load balancing using SDN and open flow","authors":"S. Raghul, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085416","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085416","url":null,"abstract":"At large data centers, server load balancing is used to balance the incoming requests among the servers to avoid excessive overloading of any individual server. However the present methods are static and suffer from many drawbacks. Static methods do not offer an even balance of data among servers and require dedicated hardware for load balancing. Hence, dynamic methods are required to enhance the load balance of server. Dynamic method provides load balancing of server inclusion of the dynamic state of traffic on the network. In this paper, the need for dynamic load balancing methods of SDN is discussed and provided with the literature survey of the existing static load balancing schemes.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flower species recognition system using convolution neural networks and transfer learning","authors":"I. Gogul, V. S. Kumar","doi":"10.1109/ICSCN.2017.8085675","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085675","url":null,"abstract":"Automatic identification and recognition of medicinal plant species in environments such as forests, mountains and dense regions is necessary to know about their existence. In recent years, plant species recognition is carried out based on the shape, geometry and texture of various plant parts such as leaves, stem, flowers etc. Flower based plant species identification systems are widely used. While modern search engines provide methods to visually search for a query image that contains a flower, it lacks in robustness because of the intra-class variation among millions of flower species around the world. Hence in this proposed research work, a Deep learning approach using Convolutional Neural Networks (CNN) is used to recognize flower species with high accuracy. Images of the plant species are acquired using the built-in camera module of a mobile phone. Feature extraction of flower images is performed using a Transfer Learning approach (i.e. extraction of complex features from a pre-trained network). A machine learning classifier such as Logistic Regression or Random Forest is used on top of it to yield a higher accuracy rate. This approach helps in minimizing the hardware requirement needed to perform the computationally intensive task of training a CNN. It is observed that, CNN combined with Transfer Learning approach as feature extractor outperforms all the handcrafted feature extraction methods such as Local Binary Pattern (LBP), Color Channel Statistics, Color Histograms, Haralick Texture, Hu Moments and Zernike Moments. CNN combined with Transfer Learning approach yields impressive Rank-1 accuracies of 73.05%, 93.41% and 90.60% using OverFeat, Inception-v3 and Xception architectures, respectively as Feature Extractors on FLOWERS102 dataset.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrator circuit using differential difference current conveyor transconductance amplifier","authors":"Ravipati Linita, V. V. Reddy, Avireni Srinivasulu","doi":"10.1109/ICSCN.2017.8085420","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085420","url":null,"abstract":"An integrator circuit is presented in this paper that has used Differntial Difference Current Conveyor Transconductance Amplifier (DDCCTA). It has one DDCCTA and one passive component. It has been realized only with first order low pass response. The operation of the circuit has been observed and enforced at a supply voltage of ± 1.8V (bias current 50pA) using cadence and the model parameters of gpdk 180nm CMOS technology. The worthy of the proposed circuit has been test checked using DDCCTA and further tested for its efficiency on a laboratory breadboard. In this commercially available AD844AN and LM13600 ICs are used. Further, the circuit presented in this paper is impermeable to noise, possessing low voltage and insensitive to temperature.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine condition monitoring using audio signature analysis","authors":"B. Rubhini, P. Ranjan","doi":"10.1109/ICSCN.2017.8085717","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085717","url":null,"abstract":"Continuous Condition Monitoring of the machine is importan to improve efficiency of the machine, to avoid unexpected accidents and financial losses. Condition monitoring using audio signal processing is focused in this paper. The sound of the machine carries information about the machine condition. The change in features of audio signal are observed using the Peak Variation Response (PVR) of the Fast Fourier Transform (FFT) of signal. In this paper, the conventional FFT method has been used to prove that, it is sufficient for the detection of abnormalities due to different loading condition of the machine using audio signature. And a study on PVR of Intrinsic Mode Function (IMF) has been carried out to present the cause of variation in the energy and frequency of the oscillations of audio frequency (AF) modulated signals.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of programmable read only memory using reversible decoder on FPGA","authors":"Gopi Chand Naguboina, K. Anusudha","doi":"10.1109/ICSCN.2017.8085645","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085645","url":null,"abstract":"Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder. PROM finds its applications in cell phones, RFID tags, video game consoles, medical devices, computers and other electronic devices. An n input and k output Boolean function f (a1, a2, a3, ….an) (referred as (n, k)) is said to be logically reversible if and only if, the number of inputs are equal to the number of outputs i.e., ‘n’ equals ‘k’ and the input pattern uniquely maps the output pattern. The reversible logic must run both forward and backward as well such that the inputs can also be retrieved from outputs. There are many reversible logic gates in literature like NOT gate, Feynman Gate (CNOT gate), Double Feynman Gate, Peres Gate, TR gate, Seynman Gate and many more. Fan-out and Feed-back are not allowed in Logical Reversibility. To overcome the Fan out limitation, the signals from required output lines are duplicated to desired lines using additional reversible combinational circuits. Reversible Logic owns its applications in various fields which include Quantum Computing, Optical Computing, Nano-technology, Computer Graphics, low power VLSI etc., Reversible logic is gaining its own importance in recent years largely due to its property of low power consumption and low heat dissipation. In this paper, the Programmable Read Only Memory (PROM) using reversible decoder which has less heat dissipation and low power consumption is proposed. The designed circuit is analyzed in terms of quantum cost, garbage outputs and number of gates. The Circuit has been designed and simulated using Xilinx software and implemented on FPGA SPARTAN — 3E.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on ARP cache poisoning and techniques for detection and mitigation","authors":"Jitta Sai Meghana, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085417","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085417","url":null,"abstract":"Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptual video hashing using 3D-radial projection technique","authors":"R. Sandeep, Saksham Sharma, P. Bora","doi":"10.1109/ICSCN.2017.8085727","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085727","url":null,"abstract":"A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that vary the perceptual contents of the video. The wide scale applications of perceptual hash in the world of multimedia, such as video authentication, video copyright protection, and video retrieval, emphasize the importance of this area of research. This work generates a perceptual hash from the video using the 3D-radial projection of the pixels and assesses the differentiating capabilities and the perceptual robustness of the hash generated. This method is the 3D extension of the 2D radial projection based image hashing. In this work, the variance of the luminance values of the projected pixels is calculated for each randomly generated sub-tensor. The variance of all the sub-tensors are averaged along the second dimension and projected onto the discrete cosine transform (DCT) basis. The performance measure of the proposed work is assessed using the receiver operating characteristic (ROC) curves. Simulation results indicate that the performance of the proposed method is satisfactory for both the content-preserving and the content changing attacks.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}