N. Aggarwal, T. S. Chohan, K. Singh, R. Vohra, S. Bahel
{"title":"Relative analysis of AODV & DSDV routing protocols for MANET based on NS2","authors":"N. Aggarwal, T. S. Chohan, K. Singh, R. Vohra, S. Bahel","doi":"10.1109/ICEEOT.2016.7755355","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755355","url":null,"abstract":"To design any wireless network, routing and protocol selection are of important consideration. In Mobile Adhoc Networks (MANET), routing protocols should have best throughput with minimum delay. So the performance in critical situations is the main concern of mobile networks. In this paper, wireless network of mobile nodes has been designed with defined parameters and the relative analysis is carried out on Adhoc On-demand Distance Vector (AODV) and Destination Sequenced distance Vector (DSDV) protocols using NS2 simulator. The Throughput of generating and receiving packets, Jitter on sending and receiving side and End to end delay are the common parameters used for the comparison.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Razaque, Sai Subramanya Vamsi Chavali, Sundeep Goud Malkapuram, S. Nadimpalli, Suharsha Vommina, Dinesh Kumar Atukuri, Vamsee Sai Malllapu
{"title":"Trans receiving multimedia using Raspberry-Pi","authors":"A. Razaque, Sai Subramanya Vamsi Chavali, Sundeep Goud Malkapuram, S. Nadimpalli, Suharsha Vommina, Dinesh Kumar Atukuri, Vamsee Sai Malllapu","doi":"10.1109/ICEEOT.2016.7755019","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755019","url":null,"abstract":"Internet of things (IOT) can be considered as a combination of effective hardware and impressive software which results in smart objects which are able to communicate and interact among themselves. However, data flow accuracy between two movable devices is a growing problem. This paper proposes and implements two approaches: Discrete Cosine Transfer (DCT) and Inter-Process Communication (IPC) for maintaining stable communication. In our proposed approach, we use a movable semi-autonomous robot that travels to remote places in order to transmit and receive the information. The Receiving and transmitting process is handled using an IPC. The IPC is supported by using network layers that provide accurate interaction between multiple objects. DCT helps save bandwidth by compressing the technique when the IPC is initiating the communication process. The DCT involves in compressing the data and converting it into sin and cos signals. Our proposed approaches, DCT and IPC, are implemented using the Python platform. Our proposed approaches deployed on robots could improve accuracy and reduce bandwidth consumption that will help in military and coal mining applications.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of document clustering using semantic approach","authors":"Nagma Y. Saiyad, H. Prajapati, V. Dabhi","doi":"10.1109/ICEEOT.2016.7755154","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755154","url":null,"abstract":"Document clustering is the application of cluster analysis to textual documents. It is commonly used technique in data mining, information retrieval, knowledge discovery from data, pattern recognition, etc. In traditional document clustering, a document is considered as a bag of words; where semantic meaning of word is not taken into consideration. However, to achieve accurate document clustering, feature such as meanings of the words is important. Document clustering can be done using semantic approach because it takes semantic relationship among words into account. This paper highlights the problems in traditional approach as well as semantic approach. This paper identifies four major areas under semantic clustering and presents a survey of 23 papers that are studied, covering major significant work. Moreover, this paper also provides a survey of tools specifically used for text processing, and clustering algorithms, that help in applying and evaluating document clustering. The presented survey is used in preparing the proposed work in the same direction. This proposed work uses the sense of a word for text clustering system. Lexical chains will be used as features that are to be developed using the identity/synonymy relation from WordNet ontology as background knowledge. Later, clustering will be done using the lexical chains.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology generators for Software Defined Network testing","authors":"S. Nandi","doi":"10.1109/ICEEOT.2016.7755247","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755247","url":null,"abstract":"Software Defined Networking (SDN) is the potential future backbone of all computer networking. The main advantage of SDN is that it separates the control plane from the data plane. This delegates switching/routing decisions to a controller that is connected to the switches. The connectivity of the switches and controllers can be represented as a network topology. Usually a network topology has to be developed manually by hand before it can be imported to a simulator/emulator (like Mininet) for testing and evaluation. To ease this tedious problem, two topology generators have been proposed and implemented in Mininet. The first is a random topology generator based on the Erdös-Rényi model and the second is a generator that uses a SNAP format dataset to build the topology. Both the generators have been tested by generating large-scale topologies and they have been found to be working as desired.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on Iris recognition system","authors":"Sandeep Patil, Shreya Gudasalamani, N. Iyer","doi":"10.1109/ICEEOT.2016.7755084","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755084","url":null,"abstract":"Biometrics recognition is the use of physiological and behavioral traits to identify an individual. Many biometric traits have been developed and are being used to authenticate the person's identity. Iris recognition system are widely used and have been proved to be efficient at individual recognition with high accuracy and nearly perfect matching. The Iris feature of two eyes of same person are not similar making it more secured way of authentication compared to other Biometric recognition systems. This paper provides a review of various methods and algorithms used by authors and their effect on performance of Iris recognition system along with identification of gap for future work. This paper also briefs about the publicly available Iris database for experimenting and researches.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensorless speed control of Brushless DC Motor using fuzzy controller","authors":"J. S. Rao, G. R. Kumar, O. Sekhar","doi":"10.1109/ICEEOT.2016.7755483","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755483","url":null,"abstract":"This paper proposes a fuzzy controlled integrated speed - Sensorless approach for the speed control of Brushless DC Motor (BLDCM). This speed sensorless approach employs a load observer to estimate the disturbed load torque, and thus develops a speed sensorless algorithm. For the load observer, the inputs are mechanical rotor inertia constant and the friction coefficient, which are estimated using the recursive least-square rule. Thus this approach is insensitive to motor parameter variations and integrated drift problem. The proposed algorithm is simple when compared to extended Kalman filter in estimating the speed. A comparison is made among fuzzy controller, modified model reference adaptive control and PI controller. It is found that the fuzzy controller has superior performance over other two controllers. The proposed scheme is simulated using MATLAB/Simulink.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption","authors":"N. S. Sai Srinivas, Md Akramuddin","doi":"10.1109/ICEEOT.2016.7754990","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7754990","url":null,"abstract":"AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design approach is entirely based on pre-calculated look-up tables (LUTs) which results in less complex architecture, thereby providing high throughput and low latency. There are basically three different formats in AES. They are AES-128, AES-192 and AES-256. The encryption and decryption blocks of all the three formats are efficiently designed by using Verilog-HDL and are synthesized on Virtex-7 XC7VX690T chip (Target Device) with the help of Xilinx ISE Design Suite-14.7 Tool. The synthesis tool was set to optimize speed, area and power. The power analysis is made by using Xilinx XPower Analyzer. Pre-calculated LUTs are used for the implementation of algorithmic functions, namely S-Box and Inverse S-Box transformations and also for GF (28) i.e. Galois Field Multiplications involved in Mix-Columns and Inverse Mix-Columns transformations. The proposed architecture is found to be having good efficiency in terms of latency, throughput, speed/delay, area and power.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexural behavior of reinforced geopolymer concrete beams","authors":"Aslam Hutagi, R. Khadiranaikar","doi":"10.1109/ICEEOT.2016.7755347","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755347","url":null,"abstract":"The present investigation embodies the flexural behavior of Geopolymer Concrete (GPC) beams cured under ambient temperature. Twelve reinforced concrete beams of size 175mm × 250 mm × 1500 mm were tested. The beams were tested under four point bending over an effective span of 1200mm. The percentage of tensile reinforcement and compressive strength of concrete were taken as the variables while maintaining the same cross section. The behavior was studied with reference to first crack load, service load and ultimate load. The results were found to be similar to that of conventional cement concrete reinforced beams.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection as well as removal of black hole and gray hole attack in MANET","authors":"N. Sharma, A. Bisen","doi":"10.1109/ICEEOT.2016.7755409","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755409","url":null,"abstract":"A lot of mobile network works in today network Mobile Ad-hoc Network is a special kind of network which works on variable (not fixed) networks. Due to dynamic characteristics and addictive functionality, these are suffers from various types of attacks. Black-hole and gray-hole attack is one type of attack which harms and attacks on MANET. In this attack the malicious (unwanted node) distract the data packets that it feels is having shortest and the freshest route to the destination node so sender forwards all the data packets to it. After receiving the data packets, it drops them to create a Denial of service attack or processes to extract information from the packet. In this paper a technique is being proposed for detection of the black-hole or malicious node. In this technique, a new procedure a kind of trap method is added in AODV protocol for the detection of malicious nodes. When the Black-hole node is detected after that an alarming method is triggered to make other nodes aware of malicious nodes.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of blood cancer in microscopic images of human blood samples: A review","authors":"M. Saritha, B. Prakash, K. Sukesh, B. Shrinivas","doi":"10.1109/ICEEOT.2016.7754751","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7754751","url":null,"abstract":"For the fast and cost effective production of patient diagnosis, various image processing techniques or software has been developed to get desired information from medical images. Acute Lymphoblastic Leukemia (ALL) is a type of leukemia which is more common in children. The term `Acute' means that leukemia can progress quickly and if not treated may lead to fatal death within few months. Due to its non specific nature of the symptoms and signs of ALL leads wrong diagnosis. Even hematologist finds it difficult to classify the leukemia cells, there manual classification of blood cells is not only time consuming but also inaccurate. Therefore, early identification of leukemia yields in providing the appropriate treatment to the patient. As a solution to this problem the system propose individuates in the blood image the leucocytes from the blood cells, and then it selects the lymphocyte cells. It evaluates morphological index from those cells and finally it classifies the presence of leukemia. In this paper a literature review is been conducted on various techniques used for detecting cancer cells.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}