{"title":"Comparison of digital watermarking techniques","authors":"J. Aparna, Sonal Ayyappan","doi":"10.1109/I2CT.2014.7092189","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092189","url":null,"abstract":"Digital watermarking is the method of hiding digital data in any form of multimedia data such as image, audio, video, etc. Digital watermarks are used for verifying the integrity and authenticity of multimedia data and also used to prevent fraud and forgery. This paper performs a comparative analysis of different image watermarking techniques. The watermarking techniques based on DCT, DWT and a combination of DCT and DWT is implemented. These methods use Singular Value Decomposition (SVD) of the cover image and watermark for embedding the watermark. Different attacks are applied on the watermarked image in order to analyze the robustness of each algorithm.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing energy consumption in large scale wireless sensor network using adaptive duty cycle algorithm","authors":"Laxmi D. Dongre, V. Gulhane","doi":"10.1109/I2CT.2014.7092194","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092194","url":null,"abstract":"In a large scale wireless sensor networks, monitoring particular area requires large number of nodes to be active. As the numbers of nodes are more, the energy consumed by each node will be more. Energy is the most critical issue in wireless sensor networks. At MAC level, duty cycle scheduling is being used to improve energy efficiency and a large research is being still going on how to schedule the duty cycle. The duty-cycle is a process that frequently repeats sleep and wake periods. In this paper, to minimize energy consumption the sleep time of node will be adjust in such a way that it should get active only when there is an event in the network. The aspiration of this research is to design adaptive duty cycle algorithm for wireless sensor networks that minimizes energy usage. The algorithm will work over both scenario i.e., high as well as low traffic. Due to its adaptive nature, the energy consumption will be lesser which will help improves life span of network.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid model to detect phishing-sites using clustering and Bayesian approach","authors":"Rahul Patil, Bhushan Dasharath Dhamdhere, Kaushal Sudhakar Dhonde, Rohit Gopal Chinchwade, Swapnil Balasaheb Mehetre","doi":"10.1109/I2CT.2014.7092141","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092141","url":null,"abstract":"Phishing sites are the major attacks by which most of internet users are being fooled by the phisher. The replicas of the legitimate sites are created and users are directed to that web site by luring some offers to it. There are certain standards which are given by W3C (World Wide Web Consortium), based on these standards we are choosing some features which can easily describe the difference between legit site and phish site. We are proposing a model to determine the phishing sites to safeguard the web users from phisher. The features of URL along with the features of Web Page in HTML tags are considered to determine the attack. Here Clustering of Database is done through K-Means Clustering and Naive Bayes Classifier prediction technique is applied to determine the probability of the web site as Valid Phish or Invalid Phish. K-Means Clustering is applied on initial URL features and Validity is checked if still we are not able to determine the Validity of Web Site then Naive Bayes Classifier is applied onto URL as well as HTML tag features of Site and probability is evaluated based on training model.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131604616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chethan Sharma, S. Basheer, Anish Francis, V. Jayakrishna
{"title":"Radon transform processed neural network for lung X-ray image based diagnosis","authors":"Chethan Sharma, S. Basheer, Anish Francis, V. Jayakrishna","doi":"10.1109/I2CT.2014.7092284","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092284","url":null,"abstract":"A novel method for image diagnosis with artificial learning is presented-ray images tuberculosis patients is subjected to neural network learning for prediction of diagnosis. The X-ray images of lungs are normally difficult for diagnosis, since its similarity to lung cancer. Under and over diagnosis of lung X-ray images is a difficult medical problem to resolve. In the present work radon transform of the x-ray images is fed to back propagation neural network trained with Levenberg algorithm. The present methodology gives sharp results, distincting the normal and abnormal images.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless sensor nodes for long range surveillance using MIMO","authors":"Vasant Deokamble, D. Bhalerao","doi":"10.1109/I2CT.2014.7092159","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092159","url":null,"abstract":"Wireless sensor network is attracting attention of many researchers as it has capability to sense and communicate happening of events. Much of the research is being done in the routing section of this technology. Sensor networks have limited transmission range which makes it impaired for some applications. By use of transmit and receive diversity (MIMO) in conjunction with the Space Time Block Coding it becomes possible to transmit data over longer range(1.6 times the SISO). In this paper operation of WSN in diversity environment is tested and it is found that long range transmission is possible at no significant loss of major Quality-of-Service parameters. Extensive simulation is done on NS2.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120946697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrabody communication for human area network application","authors":"C. Kumar, Hiren R. Italia","doi":"10.1109/I2CT.2014.7092155","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092155","url":null,"abstract":"Intrabody communication (IBC) is a novel data transmission method to transmit the data using human body as a transmission channel. In this paper we have taken efforts to develop a methodology for IBC. The IBC will play a vital role for the data transmission through the human body. The idea is driven from the vision of a cable free secure data transmission system. This paper examines the data transmission between the two mobile devices for the different conditions, different distances, different modes, IBC transceiver design and the practical uses in future.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of efficient MEMS based actuator for drug delivery applications","authors":"V. Khare, Agnimitra Singh","doi":"10.1109/I2CT.2014.7092014","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092014","url":null,"abstract":"The advancements in drug delivery system are of great value when the betterment of human life comes into one's mind. Although so many improvisations have already been done over the years, but many challenges remain in this area. Typically, a drug delivery system consists of drug reservoir and a micropump and micropump requires an actuator for the purpose of pumping the fluid. In the present work, piezoelectric actuator is used because of its faster response time in generating large amount of force. The aim of the project is to design such an efficient piezoelectric actuator based on MEMS technology for delivering required amount of the fluid to the target site. For this, here, the software that is being used is COMSOL 4.3 Multiphysics.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of variation of design parameters on displacement and driving voltage of comb-drive actuators","authors":"A. Priyadarshini, R. Mahapatra","doi":"10.1109/I2CT.2014.7092328","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092328","url":null,"abstract":"A comb-drive actuator consists of two interdigitated comb structures, where one comb is fixed and the other comb is connected to a spring structure. A design of electrostatic comb-drive actuator is presented in this paper with different spring configurations i.e. fixed-fixed beam, crab-leg flexure beam and folded-flexure beam. The design parameters considered here are beam length, number of comb fingers and gap between the comb fingers. The effect of their variation on displacement and driving voltage of movable comb has been studied. Such actuators find extensive use in micro-positioning applications such as micro-tweezers. An increased displacement of comb drive actuator is subsequently accomplished for the same driving voltage, for folded-flexure beam configuration with increased beam length, higher number of comb-fingers and reduced gap between the comb-fingers. The beam length has been varied from 280μm to 320μm, number of moving comb fingers from 8 to 32 and gap between fingers has been reduced from 7μm to 1.6μm. The structures are further modified to decrease the requirement of driving voltage for even larger displacement, which include use of three-folded flexure and usage of jagged-shaped comb fingers and thus reducing requirement of driving voltage to 17V, increasing displacement to 11.102μm and increasing capacitance to 7819.728pF. Polysilicon is the structural material used for the designs. The simulation software used in this study is COMSOL Multiphysics, which offers Finite Element Analysis for calculation of displacement of movable fingers.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"16 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical modeling of threshold voltage for SiGe MOSFET with two dimensional effects","authors":"R. Mahajan, D. Gautam","doi":"10.1109/I2CT.2014.7092218","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092218","url":null,"abstract":"Dynamics of threshold voltage for pseudomorphic SiGe structure is presented in this paper. Poisson's equation has been solved analytically considering short channel effects. Simulation obtained from analytical are in good agreement with the results from Silvaco TCAD. Validation of model for specific range of substrate concentration has been done. Analytical model developed can be extended for the use of high-k material structure as well. This work presenting as a compact solution for high-k SiGe MOSFET structure.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129828723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A qualitative analysis of code clones and object oriented runtime complexity based on method access points","authors":"Amr F. Desouky, Matthew D. Beard, L. Etzkorn","doi":"10.1109/I2CT.2014.7092292","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092292","url":null,"abstract":"In this paper, we present a new object oriented complexity metric based on runtime method access points. Software engineering metrics have traditionally indicated the level of quality present in a software system. However, the analysis and measurement of quality has long been captured at compile time, rendering useful results, although potentially incomplete, since all source code is considered in metric computation, versus the subset of code that actually executes. In this study, we examine the runtime behavior of our proposed metric on an open source software package, Rhino 1.7R4. We compute and validate our metric by correlating it with code clones and bug data. Code clones are considered to make software more complex and harder to maintain. When cloned, a code fragment with an error quickly transforms into two (or more) errors, both of which can affect the software system in unique ways. Thus a larger number of code clones is generally considered to indicate poorer software quality. For this reason, we consider that clones function as an external quality factor, in addition to bugs, for metric validation.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}