{"title":"A novel cluster head selection scheme using fuzzy logic in wireless sensor networks","authors":"Ajai Mishra, Rakesh Kumar, Jitendra Singh","doi":"10.1109/ICGCIOT.2015.7380458","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380458","url":null,"abstract":"Today WSNs having different important role in different fields. Generally WSNs consist of thousands of small, cost effective, constrains on memory and processing capabilities to sense data periodically from predefined region. Wireless sensor network deployed in war like area or area in which after deployment of wireless sensor network any change is not possible. So, energy consumption is one of the major issue in wireless sensor networks. Whole network lifetime depend on how efficiently energy consume in sensor network. Sensor nodes organization is based some characteristics in a number of sensor node chunks called cluster. And clustering is used to reduce data communication cost in wireless sensor networks. A node called cluster head is responsible for collecting sensed data from cluster node transmitting to the BS. An effective cluster head selection scheme may reduce the energy consumption and prolong the network life time. In this paper, we introduce a novel CH selection scheme using fuzzy logic concepts. It is non probabilistic cluster head selection scheme. In this fuzzy logic based clustering scheme, parameters used to select cluster head are residual energy, base station distance, concentration, local distance.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130372976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Awate, Damini Deshmankar, Gayatri Amrutkar, Utkarsha Bagul, Samadhan Sonavane
{"title":"Fruit disease detection using color, texture analysis and ANN","authors":"A. Awate, Damini Deshmankar, Gayatri Amrutkar, Utkarsha Bagul, Samadhan Sonavane","doi":"10.1109/ICGCIOT.2015.7380603","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380603","url":null,"abstract":"Now-a-days as there is prohibitive demand for agricultural industry, effective growth and improved yield of fruit is necessary and important. For this purpose farmers need manual monitoring of fruits from harvest till its progress period. But manual monitoring will not give satisfactory result all the times and they always need satisfactory advice from expert. So it requires proposing an efficient smart farming technique which will help for better yield and growth with less human efforts. We introduce a technique which will diagnose and classify external disease within fruits. Traditional system uses thousands of words which lead to boundary of language. Whereas system that we have come up with, uses image processing techniques for implementation as image is easy way for conveying. In the proposed work, OpenCV library is applied for implementation. K-means clustering method is applied for image segmentation, the images are catalogue and mapped to their respective disease categories on basis of four feature vectors color, morphology, texture and structure of hole on the fruit. The system uses two image databases, one for implementation of query images and the other for training of already stored disease images. Artificial Neural Network (ANN) concept is used for pattern matching and classification of diseases.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of an Ad Hoc Network among Android smart devices","authors":"Tanweer Alam, M. Aljohani","doi":"10.1109/ICGCIOT.2015.7380671","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380671","url":null,"abstract":"Ad hoc network provides facilities to access devices in infrastructure less system without centralized approach. Android based smart devices are able to transmit data in ad hoc network of all active devices without centralized approach. In Comparison of Bluetooth devices the Wi-Fi devices are used for faster speed over longer distance. In this era Android convert the simple phone into Smart phone with the capabilities of wireless networking that are typically used with an IEEE 802.11 access point. We can configure the hardware of Android devices into an ad hoc mode. This mode allows Android device to communicate with other device using point to point communication without an access point. The main focus of this paper is to design and implementation an Ad Hoc Network for communication among Android based Wi-Fi devices.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel cryptographic and steganographic approach for secure cloud data migration","authors":"Ankit Dhamija, V. Dhaka","doi":"10.1109/ICGCIOT.2015.7380486","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380486","url":null,"abstract":"The flexibility to store unlimited data without any worry about storage limitations available at our disposal and the freedom to use it as and when required from anywhere in the world makes cloud computing the most preferred technology & platform to store and transfer data. Organizations and individual users are now very much comfortable to let their all-important data and software reside on the cloud servers and make themselves free from all the concerns of storage and security. However, every flexibility or benefits comes at a price and cloud computing too is not an exception. The threat of user's privacy, data confidentiality & integrity and data safety are always looming around. Among all of these, the secure transfer of data from organization's premises to the cloud servers is of utmost importance. So many encryption techniques and algorithms have been proposed by researchers in recent times to move data securely from their end to the servers. In this research paper, we propose a design for cloud architecture which ensures secure data transmission from the client's organization to the servers of the Cloud Service provider (CSP). We have used a combined approach of cryptography and steganography because it will provide a two way security to the data being transmitted on the network. First, the data gets converted into a coded format through the use of encryption algorithm and then this coded format data is again converted into a rough image through the use of steganography. Moreover, steganography also hides the existence of the message, thereby ensuring that the chances of data being tampered are minimal.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129128369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of contrast enhancement techniques on different images","authors":"D. Raj, Pushpa Mamoria","doi":"10.1109/ICGCIOT.2015.7380422","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380422","url":null,"abstract":"Contrast enhancement is an important technique of image processing for the enhancement of contrast of an image in the spatial domain. Numbers of contrast enhancement techniques are available. This paper proposes comparative analysis of various contrast enhancement techniques applied on different types of images. PSNR, MSE value and graphical forms are used to analyze the best enhancement technique on corresponding images.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115960953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Steganography in Big Data","authors":"Pooja, Surendra Yadav, Brahmdutt Bohra, Lakhita","doi":"10.1109/ICGCIOT.2015.7380709","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380709","url":null,"abstract":"In this emerging technological era, Big Data is a very famous name. This paper is presenting a discussion about the security of Log Files, which is considered amongst the major parts in Big Data Technology. The paper is representing different types of log files, and how the security could be implemented on these files using Steganography. Here, we briefly describe about the log files, Steganography, and the role it is playing in the security aspects of Big Data.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review paper on data preprocessing: A critical phase in web usage mining process","authors":"S. Dwivedi, Bhupesh Rawat","doi":"10.1109/ICGCIOT.2015.7380517","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380517","url":null,"abstract":"Web usage mining refers to the process of discovering user access patterns from the log of website. Usually the web log contains unstructured, noisy and irrelevant data. To make this data suitable for pattern mining and pattern analysis it has to be passed through data preprocessing phase. Data preprocessing not only improves the quality of data but it also reduces the size of web log file. Data preprocessing involves several steps including data collection, data cleaning, session identification, user identification and path completion. This paper presents several data preprocessing techniques in order to prepare raw data suitable for mining and analysis tasks.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115761857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to enhance security in WEP","authors":"A. Garg","doi":"10.1109/ICGCIOT.2015.7380532","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380532","url":null,"abstract":"This paper begins by introducing the concept of Ron's Code 4 (RC4). The introductory section gives brief information about the architecture of RC4 and its various flaws. In order to examine the RC4 security threats, this paper will look at both architectural flaws and exceptional flaws. Here, I propose a novel approach to provide additional security to the original RC4 algorithm. With the given 64 bit dynamic key of RC4 (initial vector + fixed key), we have size of the initial vector is 24 bit and size of fixed key is 40 bit. These 40 bit keys are getting changed after a specific time to protect RC4 from brute force.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial components extraction and expression recognition in static images","authors":"Mameeta Pukhrambam, A. Das, Ashim Saha","doi":"10.1109/ICGCIOT.2015.7380558","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380558","url":null,"abstract":"This paper deals with the emotion recognition in static images. Facial feature extraction plays a very important role in recognizing a particular emotion in humans. In this paper, the facial expressions in humans .i.e., happy, anger, sad, neutral and disgust, are recognized with the help Support Vector Machine classifier. First, a static image is taken. Then, skin region is extracted from that image using Hue Saturation Value. After skin region extraction, the right eye, the left eye and the mouth part are extracted as they are the most important part for facial expression recognition. These processes are done for every images collected in the training set. Then, Support Vector Machine classifier is used to classify which image belongs to which class category by comparing the feature vectors of the trained images. This paper produces a model which predicts a set of testing images into which class categories the image belongs to, namely anger, disgust, fear, happy and neutral.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static code analysis and detection of multiple malicious Java applets using SVM","authors":"Sapana Y. Salunkhe, T. Pattewar","doi":"10.1109/ICGCIOT.2015.7380711","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380711","url":null,"abstract":"An applet that performs an action against the will of the user who invoked it should be considered malicious. A malicious applet is applet that attacks the local system of a Web surfer. They can even seriously damage a Java user's machine. The problem of malicious Java applets, that is currently not well addressed by existing work. We have developed a tool for malicious Java applets, which we call Jarhead. The approach is based on static code analysis. The approach extracts features from Java applets, and uses machine learning technique called support vector machine(SVM) to produce a tool. This approach is able to detect both known and previously-unseen real-world malicious applets.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}