{"title":"Human gait analysis using wavelet de-noising and total variation filtering","authors":"Amit Singh, Abhishek Thakur","doi":"10.1109/ICGCIOT.2015.7380554","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380554","url":null,"abstract":"This paper analyses the walking gait of a person in time domain, frequency domain and time-frequency domain for counting of steps. The human gait movement is the primary source of movement for humans. This movement is one of the primary causes of energy consumption for the human body. While it is one of the most common features of living beings, it is complex to understand and analyze. The human gait movement consists of cycles of repeated motion. These repeated patterns can be analyzed and understood in order to extract different features of walking. In this paper, human gait movement data is acquired with a foot mounted accelerometer followed by detailed decomposition and extraction of patterns by Fourier Transform, FFT and WT.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building engineering e-learning grid to foster engineering aptitude and Engineering attitude by leveraging ICT","authors":"Himdweep Walia, S. Katiyar","doi":"10.1109/ICGCIOT.2015.7380429","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380429","url":null,"abstract":"Today each and every country is facing the challenge to keep up its competitive advantage vis a vis other countries. They have realized the importance of innovation, research and development as necessary tools to keep them competitive and build their leadership position. Engineers play a pivotal role in building such sustainable competitive advantage for the country by providing solutions to the various technical and social issues. There is a strong need in country like India to build engineering pool with high caliber of Engineering attitude and aptitude. This pool will provide the requisite capability to create innovative solutions in various technical fields. The challenge being faced by academic institutes is how to provide engineering educations which will enable them to build such pool. The convergence of information and communication technologies (ICT) is providing such enabling platform for these institutes. They can build collaborative learning environment and link it to the education grid for engineers. This paper focuses on how an e-learning grid can be created and collaborative learning environment can be established in the various engineering collages and ICT can be leveraged which will facilitate in building research oriented mindset and high caliber engineers with high aptitude to find solutions to problems. This paper will provide the guidelines on what engineering institutes should do to leverage the ICT technologies and how they can build collaborative learning environment and contribute to the national engineering e-learning grid.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of guest VM's on xen hypervisor","authors":"Anchal Pokharana, Rahul Hada","doi":"10.1109/ICGCIOT.2015.7380696","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380696","url":null,"abstract":"A virtual machine (VM) has access only a portion of computer resources but that appears to be a whole computer. Virtual machines are running on the same computer system hardware. The performance of the virtual machines are depends on the performance of the host operating system on which they are running. In this work the performance of different guest VM's on the same host operating system has been analyzed. For this experimentation Ubuntu (Linux based operating system) is used as host operating system and Ubuntu as well as CentOS operating systems are used as guest operating system. Performance measurement of the virtual machines is done in the same conditions for both guest operating systems using different benchmark. In this work the performance of different guest VM has been analyzed using SysBench on CPU performance, Mutual Exclusion, Threads and Online Transaction Processing Test performance parameters. Results shows that for CPU Performance and mutex, CentOS 6.3 gives better results and for OLTP and Threads performance test Ubuntu performs well.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Life-Cycle Tracking System of home automation devices (LED Bulbs)","authors":"Sujeet Pandey, Arnab Paul, L. J. Chanu","doi":"10.1109/ICGCIOT.2015.7380719","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380719","url":null,"abstract":"Rapid growth in the field of IoT makes our life very simple and easy. The IoT technology gives rise to a new era where “Things Speak”. Hitherto we only have heard people connected to the internet but today the scenario has totally changed. Now every object and machine is getting connected to the internet. IoT brings life to the machines and we can visualize a world where a new communication system has been established between Man and Machine (M2M communication). Earlier we have seen communication between “man-to man” and “machine-to-machine”, but today Man-to-Machine communication is also possible. There are many areas in Home Automation System where researches are going on to make the life much better. “Life-Cycle Tracking System of LED Bulbs” also belongs to one of those categories. The proposed model will provide a platform to a user to track the lifetime of an LED bulb. The benefit of using this model is that, if it is applied to all the connected devices then it can also be integrated with the Big Data where it will provide a lot of data about an individual device. The idea of Life Cycle Tracking System may also solve many industrial problems, by giving the up-to-date status of all the devices and machines.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of cooperative relay assisted transmission models in LTE system","authors":"Patteti Krishna, K. K. Rao, T. Kumar","doi":"10.1109/ICGCIOT.2015.7380642","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380642","url":null,"abstract":"The User Equipments (UE) nowadays are able to provide various internet applications and services that raise the demand for high speed data transfer and Quality of Service (QoS). Accordingly, next generation mobile communication systems driven by these demands are expected to provide higher data rates and better link quality compared to the existing systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are strong multiple access candidates for the uplink of the International Mobile Telecommunications-Advanced (IMT-Advanced). These multiple access techniques in combination with other promising technologies such as multi-hops transmission and Multiple-Input-Multiple-Output (MIMO) will be utilized to reach the targeted IMT-Advanced system performance. In this paper, OFDMA and SC-FDMA are adopted for the downlink and uplink transmission of Long Term Evolution (LTE). Two transmission scenarios are considered, namely the single hop transmission and the relay assisted transmission (two hops). In addition, a hybrid multiple access technique that combines the advantages of OFDMA and SC-FDMA in term of low Peak-to-Average Power Ratio (PAPR) and better link performance in terms of Symbol Error Rate (SER) has been proposed in relay assisted transmission scenario. Simulation results show that the obtained results from the relay-assisted transmission (two hops) are better than those obtained from the direct transmission (one hop) for all the studied scenarios.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116465280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity and access management- a comprehensive study","authors":"A. Sharma, Sarita Sharma, Meenu Dave","doi":"10.1109/ICGCIOT.2015.7380701","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380701","url":null,"abstract":"With advent of cloud computing and web 2.0, both users and organizations have benefitted. But security still remains a major concern. Identity and access management provides a solution to manage user credentials, authenticate and authorize users. Concept of federated identity based on trust relationship among various identity providers and service providers has made it possible for user to access multiple services without the need of providing passwords to various service providers. Single Sign On has solved the problem of maintaining multiple passwords for different services. In this paper we have briefly discussed what is Identity and access management, its services and popular standards like SAML2.0, OAuth, OpenID.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of rectangular microstrip fatch antenna using metamaterial for WLAN application at 24 GHz","authors":"Rekha Kumari Bagri, S. Meena","doi":"10.1109/ICGCIOT.2015.7380500","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380500","url":null,"abstract":"This present technique show proposed metamaterial (MTM) structure is designed for better result in bandwidth and reduction in the return loss at operating frequency 24 GHz. The proposed antenna is designed on The proposed antenna is designed on low cost FR-4(lossy) substrate and this proposed antenna is fed by 50 Ω microstrip line and having dimension is 2935(L) Mm×299(W) Mm × 1.6(h) Mm by using CST MWS Software. This paper show Metamaterial structure is designed by rectangular SRR with thin wire loaded on Rectangular Mcrostrip patch antenna by using CST MICROWAVE STUDIO(computer simulation technology software). The bandwidth of metamaterial increased upto 1249MHz as comparison to RMPA and Return loss = -28076717dB. This antenna is more suitable for WLAN application in communication at 2.4GHz operating frequency in S-band.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance enhancement of a Malware Detection System using score based prioritization of snort rules","authors":"Pritpal Singh, Sunny Behal, Krishan Kumar","doi":"10.1109/ICGCIOT.2015.7380636","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380636","url":null,"abstract":"Snort is an open source Intrusion Detection System (IDS) that uses a rule-based approach to detect different kinds of malware, online attacks, vulnerabilities, etc. The performance of a Malware Detection System (MDS) deployed in a large network depends on the nature and type of rules stored in its database. As the number and type of attacks are increasing, more number of rules are appended in the MDS database. This increase in the size of rule database itself becomes the bottleneck in the performance of the MDS. This paper proposes a rule scoring based mechanism for prioritizing the snort rules so as to optimize the number of rules in the MDS database. Only those rules are retained in the database whose total score is greater than the computed threshold value. The results show that the performance of MDS has enhanced remarkably.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125818422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Yokesh, S. Karthik, Y. Jagadeesh, R. Sathiendran
{"title":"Low cost self powered sand rover system for desert region surveillance","authors":"K. Yokesh, S. Karthik, Y. Jagadeesh, R. Sathiendran","doi":"10.1109/ICGCIOT.2015.7380655","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380655","url":null,"abstract":"General land locomotives for surveillance systems are not highly efficient when compared to the sand locomotives because of slipping in sand. In loose sand the coherent force between two particles is very less thus making the system slip easily. Thus the rover should have contact up to some depth in the sand and now with that grip in it, it should move to the next step. Similarly the proposed sand rover system here has the capability to move in the loose sand of desert regions. It can also move as a normal vehicle which can be transformed manually. A surveillance system is placed in it along with a solar panel for supply. It is controlled through wireless DTMF (dual tone multiple frequency) system. This method is efficient in all terrains in for the purpose of surveillance.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhijeet Kothawade, Jagdish Bagul, Milan Harak, B. Patil
{"title":"Ranking based prediction of keyword over big databases","authors":"Abhijeet Kothawade, Jagdish Bagul, Milan Harak, B. Patil","doi":"10.1109/ICGCIOT.2015.7380590","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380590","url":null,"abstract":"This Keyword queries provide fluent access to data over big databases, but there is problem of low and poor ranking quality or priority problem of obtaining results after querying .To satisfy the user it is necessary to identify the queries that have low ranking quality. In this paper, we are creating a framework to calculate the ratio of degree of difficulty of keyword query on the big databases by observing the properties of hard queries, in consideration with both unstructured and the content of the database and the results of query. We are giving the ranking to predicted query results as per user requirement for the database. We create our keyword prediction architecture is made against two algorithms popular for keyword search ranking methods and these methods will work on unstructured big databases. Our unique results show that our methods or algorithms predict the hard queries with high accuracy for unstructured database. We going to reduce the difficulty of keyword prediction over the unstructured big databases and also we trying reducing noise occurred because of ranking mechanism of unstructured database. Further, we present methods to minimize the incurred time overhead.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}