{"title":"Advanced high speed optical pattern recognition for sur-veillance systems","authors":"E. Priya, N. N. Pragash","doi":"10.1109/ICSCN.2017.8085723","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085723","url":null,"abstract":"Today security is the prime factor needed in all civic places such as Airport, Railway station and Bus stations. Due to absence of extremely fast security systems, lots of damage to human life and public properties were seen in last decade. The proposed design able to capture, recognize and detect the unauthorized person at high speed. The aim of this research work is to design a system that recognizes the pattern at high speed. The 4f system is an image focusing system with intensification factor of unity which can be demonstrated using ray tracing. The 4f system is simulated in MATLAB. Further it can be extended to advanced extremely fast pattern recognition surveillance systems. The optical Fourier transform is performed between the cameras captured image and the conjugate of the database image which is multiplied and projected on the Fourier plane. This provides a pattern recognized image at the output plane at extremely fast rate.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of 5.2 GHz rectangular microstrip patch array antenna using split ring resonator","authors":"Swagata B. Sarkar","doi":"10.1109/ICSCN.2017.8085654","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085654","url":null,"abstract":"Now a days microstrip patch antennas are heavily used in the field of communication for their compact size, low cost, flexibility and efficiency. Different shapes and sizes of patch antennas are available in the market. In this paper effect of split ring resonator on rectangular patch array antenna of 5.2 GHz is discussed. It is seen that the multiple frequencies with different gain, return loss, VSWR are obtained after introducing array geometry with split ring resonator in the Rectangular Patch Antenna. The gain for rectangular patch antenna at 5.2 GHz is 4.39 dB. The gain is 5 DB for rectangular patch array. Gain improved to 8 dB for Rectangular patch array with Split Ring Resonator. Gain improves by 45.12% and bandwidth improves by 56.25%. The FR4 Epoxy substrate is used to design the antenna with HFSS software.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background subtraction algorithm and image skeletonization based anomaly event detection for low resolution video","authors":"V. Murugan, V. Vijaykumar, S. Selvan","doi":"10.1109/ICSCN.2017.8085708","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085708","url":null,"abstract":"Video surveillance system is a major research area of image processing applications. Generally, Low resolution Camera is used for surveillance and thus processing a digital image recorded by such low resolution camera is a challenging task in case of object recognition. A system for low cost, less computation automatic identifying and tracking of objects and events in the low resolution video is presented. The proposed video analyzing system provides best solution by using BGS algorithm, image skeletonization technique and SVM. Experimental results which illustrate this system is optimal for real time applications in video surveillance.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Arivazhagan, W. Jebarani, S. Kalyani, A. Deiva Abinaya
{"title":"Mixed chaotic maps based encryption for high crypto secrecy","authors":"S. Arivazhagan, W. Jebarani, S. Kalyani, A. Deiva Abinaya","doi":"10.1109/ICSCN.2017.8085697","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085697","url":null,"abstract":"In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions. Using mixed chaotic maps which works based on simple substitution and transposition techniques to encrypt the original image yields better performance with less computation complexity which in turn gives high crypto-secrecy. The initial conditions for the chaotic maps are assigned and using that seed only the receiver can decrypt the message. The results of the experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for image encryption.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio frequency anti-jamming capability improvement for cognitive radio networks: An evolutionary game theoretical approach","authors":"B. Deepak, P. Bharathi, Dhananjay Kumar","doi":"10.1109/ICSCN.2017.8085719","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085719","url":null,"abstract":"A cognitive radio is a smart radio that can be programmed and adjusted dynamically on the fly to suit the contextual environmental needs. Many anti-jamming schemes available to protect the Cognitive Radio Networks from jamming attack uses frequency hopping techniques which are deterministic in nature. The deterministic frequency hopping technique is vulnerable to attack at some stage in the real-world scenario. The proposed anti-jamming system for cognitive radio network with adaptive frequency hopping technique efficiently thwarts the RF jamming attack. In the presences of a reactive jammer, two techniques are used to achieve the adaptive frequency hopping: (i) when channel availability reduces below 75 % the Hidden Markov Model (HMM) based algorithm is used, (ii) when the system is in critical state (i.e. channel availability reduces further below 25 %) the interaction between Cognitive radio node and the jammer is modelled using Evolutionary Game Theory (EGT). The results obtained from both models are improved further to find most suitable channel. The simulation results show that the anti-jamming system significantly decreases the probability of bit error to about 48% in the presences of reactive jammer.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low leakage circuit design using bootstrap technique","authors":"V. Sharma","doi":"10.1109/ICSCN.2017.8085677","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085677","url":null,"abstract":"Leakage power dissipation is drastically increasing with the scaling of the each new technology node. The number of gates per chip has increased for improving the performance of the circuits, rise in operating frequency and many more has resulted in greater leakage power dissipation. That demands low power integrated circuits (ICs). In this paper, bootstrapping technique has been used so as to overcome the leakage power dissipation. 4:1 multiplexer is designed by using bootstrapping technique at 32nm technology node and the results are obtained using Silvaco's tools. The leakage power result obtained had been taken at different voltages (1V, 0.8V, 0.6V, 0.4V) for checking the effect of voltage scaling.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring fishermen safety through a range based system by trizonal localization using low power RSSI","authors":"N. Reddy, G. Ramakrishnan, K. Rajeshwari","doi":"10.1109/ICSCN.2017.8085707","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085707","url":null,"abstract":"In the proposed system a solution is given to the problem of “Fishermen Tracking their location in the sea”. For this the sea area is divided into three zones namely; safe, intermediate and danger. The boat is allowed to roam anywhere within the safety zone. If the boat reaches the intermediate zone, a buzzer alert is given to the fisherman. If the boat reaches the danger zone, an intimation is given to the fisherman where he is supposed to reach the intermediate zone within the specified time. Else the engine gets stopped automatically and the control of the boat goes to the control room The boat will be released only after inspection by the coast guard or after the emergency help is given. The different Ranges are identified using Received Signal Strength Indicator(RSSI).","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers","authors":"R. Nagarathna, S. Shalinie","doi":"10.1109/ICSCN.2017.8085680","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085680","url":null,"abstract":"Current era of networking world witnesses an increase in the number of devices that have intelligent component embedded in them, which leads to an unmanageable state. This has lead to a steady shift towards using Open Software Defined Networks to reduce operational expenditure. The whole of the intelligence lies in the central controller which obviously is the single point of failure. The attackers find it easy to bring down the whole network by saturating the control plane of the SDN which eventually leads to denial-of-service (DoS) to the data plane, through host location hijacking attack. The various strategies proposed to defend the SDN controller from host location hijack attack includes authentication of host which incurs overhead. In this paper we propose SLAMHHA, a Supervised Learning Approach to Mitigate Host location Hijacking Attack. SLAMHHA is implemented in the SDN controller which monitors the legitimacy of the hosts and identifies the clandestine users impersonating the hosts in the data plane. The SLAMHHA algorithm can be implemented in either of the two SDN controller setup (i.e.) in both centralized and decentralized controller setup, been used to set the flow rules and monitor the underlying network. MININET has been used to test the efficiency of the SLAMHHA algorithm. SLAMHHA algorithm was implemented in the POX controller. Numerical results show that SLAMHHA incurs less overhead in terms of CPU and memory consumption when compared to the authentication method. This algorithm blocks the attack within 3 seconds when 100 hosts are impersonated to perform DoS attack. Thus our proposed SLAMHHA algorithm mitigates the host location hijacking attack with less overhead.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of structural connectivity on progression of Alzheimer's disease using diffusion tensor imaging","authors":"R. Chitra, K. Bairavi, V. Vinisha, A. Kavitha","doi":"10.1109/ICSCN.2017.8085686","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085686","url":null,"abstract":"The occurrence of Alzheimer's disease (AD) in the elderly individuals has been increasing at an alarming rate throughout the world over the past decade. Diffusion Tensor Imaging (DTI) has been widely used to study the white matter tracts in the human brain and for the estimation of structural connectivity parameters through the progression of the disease. Previous studies using fMRI focus on functional decline and adding on to this, DTI helps in analyzing the topological and structural integrity. Histopathological studies of the disease have revealed that major cortical neuronal loss occurred in Corpus Callosum and Cingulate Gyrus regions of the brain. In this work, DTI images of four AD patients for three progressive years have been obtained and the structural connectivity parameters namely: Fractional Anisotropy (FA), Axial Diffusivity, Radial Diffusivity and Mean Diffusivity have been estimated at the onset of the disease and for the three progressive years. Results show that the FA values decreased in the progressive years for all patients whereas the diffusivity parameters increased every year showing abnormalities in the connectivity parameters.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image contrast enhancement by automatic multi-histogram equalization for satellite images","authors":"A. Pugazhenthi, L. S. Kumar","doi":"10.1109/ICSCN.2017.8085722","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085722","url":null,"abstract":"In this paper, a new automatic histogram equalization algorithm which is based on Bi-Histogram Equalization (BHE) is proposed. The proposed method preserves the brightness and also improves the contrast. Mean value of the intensity is used for selecting the thresholds to avoid over enhancement also improving contrast of the image. The calculated mean limits the valley points to divide the histogram into small parts which guarantee equal input and output mean brightness. In addition, normalization of image brightness is applied to assure less Absolute Mean Brightness Error (AMBE). The performances of proposed algorithm, Global Histogram equalization algorithm and Bi-Histogram equalization algorithm are measured by calculating another validity parameter called Peak Signal to Noise Ratio (PSNR). The proposed method confirms the improvement in qualitative parameters as compared with the other two algorithms considered.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131293852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}