{"title":"Reversible Chaotic Encryption Techniques For Images","authors":"N. Shyamala, K. Anusudha","doi":"10.1109/ICSCN.2017.8085656","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085656","url":null,"abstract":"Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use of Arnold's cat map, in which pixel shuffling offers mystifying the image pixels based on the number of iterations decided by the authorized image owner. This is followed by other chaotic encryption techniques such as Logistic map and Tent map, which ensures secure image encryption. The simulation result shows the planned system achieves better NPCR, UACI, MSE and PSNR respectively.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic washout multiple droplet lab on chip routing: Dynamic washing technique","authors":"G. Brindha, G. Rohini, K. Aishwarya, B. Ganga","doi":"10.1109/ICSCN.2017.8085706","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085706","url":null,"abstract":"Digital microfluidic biochip (DMFB) is a technology that has just came up with the aim to attenuate droplets activity on a chip. By manipulating droplets with negligible volumes, the DMFB provides susceptibility with comparatively less human errors than the former routing methods. When two droplets are sharing a same routing path, the second droplet may be contaminated due to the leftovers of the first droplet which affects the assay. To avoid cross contamination 1. A DMFB need to be periodically washed out. 2. Contamination aware routing path need to be calculated. This work attends to utilize both the modified version of the solution. This project work attempts to propose a simultaneous wash out routing algorithm for dynamic parallel droplet testing with reduced timing overhead. A reconfigurable DMFB (Digital Microfluidic Biochip) test bed architecture with N × N pin structure will be designed using HDL. Parallel droplets will be introduced using different input pin channels with addition to that a wash out droplet will also be introduced and kept idle initially. When the destination pins for the actual droplets is configured, shortest path routing prediction will take place in parallel with a multi-objective modified swarm intelligence algorithm which is initiated to predict the routing path of the wash droplet to avoid cross contamination possibilities for the testing droplets. The second routing algorithm is dedicated for wash droplet through which is analyzes the first (droplet) routing result to find possible cross contamination. The modified swarm routing will be gated in case of non-contaminated routing path is already predicted in the first routing which saves the circuit power dissipation.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramesh Duraisamy, S. Dinakar, Vishnusankar Venkittaramanujam, V. Jeyakumar
{"title":"A systematic approach for pulse diagnosis based on siddha medical procedures","authors":"Ramesh Duraisamy, S. Dinakar, Vishnusankar Venkittaramanujam, V. Jeyakumar","doi":"10.1109/ICSCN.2017.8085694","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085694","url":null,"abstract":"Diagnosing Diseases by analyzing the pulseis an automated system to identify the diseases. This project provides necessary details and reports on patients by obtaining their nadi pulses. These pulses are sensed form radial arteries by using the IR sensor. These pulses differ for different kinds of patients and the waveforms obtained from the sensor will also be varying according to the conditions. These pulse signals are too weak and needs amplification and filteration. Set of three IR sensors are placed on the wrist in order to sense three pulses, namely vata, pitta and kapha. The pulse signals obtained from IR sensor were processed through signal processing circuit, which includes signal amplifier, filter and noise reduction circuit. These waveforms are used to detect the diseases in the patient's body by extracting its features. Hence our Indian siddha Practitioners can use this system as automated computer-aided diagnostic tool.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131187040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ravali, Nagapurkar Renuka Vijay, Srilakshmi Jaggavarapu, R. Sakthivel
{"title":"Low power XOR gate design and its applications","authors":"K. Ravali, Nagapurkar Renuka Vijay, Srilakshmi Jaggavarapu, R. Sakthivel","doi":"10.1109/ICSCN.2017.8085699","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085699","url":null,"abstract":"With advent of technology scaling, the prime objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into physical level design that comprises of PMOS and NMOS transistors. In similar way, logic can be implemented in other styles as well, with the difference in number of transistors required. The conventional CMOS design for XOR logic can be possible with 8 or more than 8 transistors, with the methodology discussed in this paper, the same design for XOR logic can be made possible with 6 transistors. The proposed methodology consists of Pass transistor logic and Single feedback topology. This design consumes 50% less power than that of conventional XOR logic design with CMOS technology. Since the design for XOR logic, is useful for variety of applications such as Data encryption, Arithmetic circuits, Binary to Gray encoding etc. the XOR logic has been selected for design. The design explained in this paper is simulated with Cadence 90nm technology.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive survey on sentiment analysis","authors":"S. Rajalakshmi, S. Asha, N. Pazhaniraja","doi":"10.1109/ICSCN.2017.8085673","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085673","url":null,"abstract":"Social media data are effectively used in organizations to gain popularity among its users. Here each user can share their ideas about different things (i.e. product views, general issues and so on.)In this case, sentiment analysis or opining mining is useful for mining facts from those data. The text data obtained from the social network primarily undergoes emotion mining to examine the sentiment of the user message. Most of the sentiment or emotional mining uses machine learning approaches for better results. The principle idea behind this article is to bring out the process involved in sentiment analysis. Further the investigation is about the various methods or techniques existing for performing sentiment analysis. It also presents the various tools used to demonstrate the process involved in sentiment analysis. This article reports about the opportunities and issues existing in the sentiment analysis.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient video segmentation and transmission usingcloud storage services","authors":"N. Kalaiselvi, A. Gayathri, K. Asha","doi":"10.1109/ICSCN.2017.8085678","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085678","url":null,"abstract":"Android is an operating system which is available in smartphones and tablets. It uses touch gestures which correlate as activities to perform the operations to embed with the real world actions. Recent technologies adapts android as the primary element because of its salient features and open environment which could be customized in high technological devices. Another secured feature of Android is its availability on Pc devices. Android could be easily customized and manipulated when compared with IOS. Mobile Cloud Network (MCN) is the most essential applications for video transmission. Mobile Cloud Network is used for live video streaming in secured storage. In this article we examined live video recording and streaming process with cloud storage and also investigated various techniques on video fragmentation to store the resources on concurrent video transmission over heterogeneous wireless networks.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of binning in Histograms of Oriented Gradients method representation","authors":"K. Karthikeyan, A. Karpagam, M. Manikandan","doi":"10.1109/ICSCN.2017.8085684","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085684","url":null,"abstract":"This paper focuses on comparing orientation binning to perform Histograms of Oriented Gradients algorithm for the feature extraction process. The HOG algorithm comprises of gradient computation, orientation binning and block normalization aimed towards object detection. Three angles of binning are considered for (3bins, 6bins, and 9bins) with angles.64×128 image sample is taken from INRIA Person Data set to extract the feature points, using which human detection can be enhanced. The HOG technique is observed through various orientation binning obtained from experimental simulation results on MATLAB.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectral efficiency analysis of subcarrier and link incorporation for optimizing the resource allocation in 4G LTE cellular systems","authors":"S. Karthika, P. Indumathi","doi":"10.1109/ICSCN.2017.8085709","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085709","url":null,"abstract":"Neighbouring cells deteriorates the performance of Orthogonal Frequency Division Multiplexing Access (OFDMA) cellular networks particularly for edge users due to Inter Cell Interference (ICI). In this paper, subcarrier integration with suitable links is proposed for minimizing ICI after Self Organized Resource Allocation (SORA) and Link Grouping Algorithm (LGA) is used to selects the satisfactory links between the terminals i.e. eNodes (eNB) and User Equipments (UEs). In this paper, Subcarrier Grouping Algorithm (SGA) is used to choose the best available resources to the selected links and Particle Swarm Optimization (PSO) is used to find the best incorporation of Subcarriers — Link from the results of grouping algorithm. The combination of SGA and LGA without consideration of any optimization techniques is referred as Subcarrier-Link Grouping Resource allocation (SLGRA) algorithm. Proposed algorithm is compared with existing methods such as Low Interference Subcarrier Allocation (LISA) and Greedy Subcarrier Allocation (GSA). SLGRA with optimization technique is referred as Subcarrier Link Integration Optimized Resource Allocation (SLIORA). Improvement of proposed method is calculated in terms of percentage for scenarios with different user densities.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of segmentation techniques for intravascular ultrasound (IVUS) images","authors":"A. Swarnalatha, M. Manikandan","doi":"10.1109/ICSCN.2017.8085670","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085670","url":null,"abstract":"A specially designed instrument is the Intravascular Ultrasound (IVUS). It is made up of tiny ultrasound probing device at the end part of the catheter. The blood vessels are visualized by using this system through ultrasonic visualization technique inside and also competent of viewing the diseased vessels and detecting the placement of the vessels also detecting and measuring length of the plaque present. IVUS is a well-organized technique for detecting coronary calcium. However IVUS has a drawback in measuring the calcium thickness, and in identifying the arc of the calcium layer. Thus the occurrence of the deposited plaque and calcium along the walls of coronary vessel is a sign of escemic heart diseases. In this paper, we are presenting some of the segmentation techniques that are used for the IVUS images. The techniques that are reviewed here are Fuzzy C-Means segmentation, Edge-Tracking and gradient-based techniques, The Circle Hough Transform technique are used for the detecting and measuring the size and arc of a calcium presented in IVUS image and by minimizing the error detection that are completed by the doctors during naked eye medical revision.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Lakshminarasimman, S. Ruswin, K. Sundarakantham
{"title":"Detecting DDoS attacks using decision tree algorithm","authors":"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham","doi":"10.1109/ICSCN.2017.8085703","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085703","url":null,"abstract":"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}