{"title":"Association rules optimization using improved PSO algorithm","authors":"Mayank Agrawal, Manuj Mishra, S. Kushwah","doi":"10.1109/ICCN.2015.76","DOIUrl":"https://doi.org/10.1109/ICCN.2015.76","url":null,"abstract":"In this work, association rules are optimized by using improved particle swarm optimization algorithm (PSO Algorithm). Here improved PSO algorithm means classical PSO algorithm with additional operator in the forms of mutation of genetic algorithm. The basic shortcoming of PSO algorithm is to get trapped into local optima. So for improving this, mutation operator is used additionally in classical PSO algorithm. This operator is used after the initialization phase of PSO algorithm. Firstly, different association rules for generating frequent item sets are generated by standard Apriori algorithm, then improved PSO algorithm is applied on these generated association rules for optimizing them. Experiments are performed on different datasets taken from UCI machine learning repository and results are compared with other previously proposed algorithms, called KNN algorithm and ABC algorithm. These results show that the proposed algorithms efficiency is better than previously proposed algorithms.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced multipath LEACH protocol for increasing network life time and minimizing overhead in MANET","authors":"Priyanka Shakya, V. Sharma, Anil Saroliya","doi":"10.1109/ICCN.2015.30","DOIUrl":"https://doi.org/10.1109/ICCN.2015.30","url":null,"abstract":"Energy utilization is one of the important issues in MANET, efficient routing is necessary to utilize energy consumption and enhance the network performance. A mobile Ad hoc network (MANET) is autonomous, self-organizing and self-configuring network with the capability of rapid deployment in response to application needs. LEACH is an energy based protocol which works on the cluster base mechanism to utilize the energy consumption. The cluster formation is completely depends on the remaining energy of mobile nodes. The cluster has always having more energy than cluster members. In this paper we analyses the performance of LEACH protocol with reactive on demand multipath AOMDV protocol to efficiently utilize the energy constraint in network. Here proposed scheme are not compare with any previous existing scheme. The performance of proposed MAX energy based LEACH-AOMDV is compared with normal LEACH-AOMDV routing and observes that the energy utilization is more in proposed LEACH. In Our experiments show that nodes have at best imprecise state information, especially under high traffic rates. LEACH generates cluster and gives information about energy of each cluster belonging to zone and if energy of the node is higher so LEACH selects that particular node for data transmission that increases the reliable communication. In this paper we also analyse the result in the form of network parameter like throughput, packet delivery ratio, energy consumption via node and routing overhead.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified region based segmentation of medical images","authors":"R. Kashyap, Pratima Gautam","doi":"10.1109/ICCN.2015.41","DOIUrl":"https://doi.org/10.1109/ICCN.2015.41","url":null,"abstract":"Health care applications became boon for the healthcare industry. It needs correct segmentation connected with medical images regarding correct diagnosis. This assures good quality segmentation of healthcare images victimization. The Level set method (LSM) can be a capable technique however quick process employing correct segments is still difficult. The region based model does inadequately for intensity irregularity images. With this cardstock, we have a whole new tendency to propose a better region based level set method of which integrates the altered signed pressure function because of the geodesic active contour models plus the Mumford-Shah model. So as to eliminate the re-initialization procedure for ancient level set model and removes the computationally costly re-initialization. A compared employing ancient model, our model is more durable against images employing weak edge and intensity irregularity. The novelty within our method is to help you locally compute improved Signed pressure function (SPF), which uses neighborhood mean values which enables it to detect boundaries within the homogenous places. Compared with other active design models proposed method derives valuable advantages not stuck just using quick process, automation and correct medical image segments. This method offers undergone numerous analysis tests to prove its importance in medical image segmentation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust FinFET based highly noise immune power gated SRAM circuit design","authors":"N. Bhardwaj, V. Mahor, M. Pattanaik","doi":"10.1109/ICCN.2015.59","DOIUrl":"https://doi.org/10.1109/ICCN.2015.59","url":null,"abstract":"Leakage power dissipation, timing delay and high noise immunity in advanced embedded static random access memories cells are main critical issues in low power battery operated devices. The newly proposed FinFET based highly noise immune Power gated 6T SRAM design is targeting these areas and successfully suppress leakage power dissipation with maintaining stability of data in standby mode. A single ended read and write assist circuitry is also presented to here, which enhancing read and write noise margin for maintaining robustness of SRAM stability. As compared with conventional FinFET SRAM designs in the proposed design, the power dissipation in SLEEP mode is reduced up to 86.8% and, read and write power consumption are up to 98.9% and 16.5%, respectively. The noise margin of proposed design is increased up to 45× as compared to self-reverse biased power gated SRAM at 32nm technology node.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah
{"title":"Using Geo-location method for lost node in location based services","authors":"Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah","doi":"10.1109/ICCN.2015.68","DOIUrl":"https://doi.org/10.1109/ICCN.2015.68","url":null,"abstract":"The “geo-location” or “location-based services” is an authentication driven system that gives a strong layer in field of lost node localization and that limits the access of information content to specified locations or times with respective to lost node. Yet, the difficulty arises with the GPS related services makes it impractical to incorporate GPS in all the mobile nodes (MN) and subject to availability of GPS signals. The physical location of a particular user or network node at any instant in time is uniquely characterized by a location signature with trace its exact location. These location signature obtain from location node, where several analyst have described how the use of location information can make approach more secured. According to our empirical study the approach can meet the confidentiality, substantiate, clarity, accessibility and practicability of localization of lost node issues in Geo-location authentication systems.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey: Lightweight cryptography in WSN","authors":"S. T. Patel, N. Mistry","doi":"10.1109/ICCN.2015.3","DOIUrl":"https://doi.org/10.1109/ICCN.2015.3","url":null,"abstract":"A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional security measures designed for the resource-rich networks such as LAN etc. are not suitable for the resource-constrained WSN. In presence of such limitations it becomes mandatory to devise lightweight security solutions for data transmission in WSNs. Because of problems in public key cryptography such as costly key computation, longer keys, key vulnerability to brute force attack, key distribution and maintenance, etc., it is not preferred for WSN. The less computation and low memory requirements of symmetric key cryptography with very short length of key (lightweight) justifies its use in WSN to achieve information security. Hence, this paper aims to study, discuss and analyze the Lightweight Cryptographic Algorithms Suitable for Wireless Sensor Networks.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125163106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel
{"title":"Optimization of cooperative spectrum sensing in cognitive radio for mobile communication","authors":"Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel","doi":"10.1109/ICCN.2015.46","DOIUrl":"https://doi.org/10.1109/ICCN.2015.46","url":null,"abstract":"Cognitive radio technology offers a revolutionary solution to spectral resources crisis by looking at the spectrum in an unconventional manner as a multi-dimensional space. The current wireless communication systems are governed by fixed spectrum assignment policy (licensed spectrum), which was proven by measurement to be inefficient. Cognitive radio enables maximum spectrum utilization efficiency through opportunistic access to temporarily unutilized portions of spectrum. In Cognitive Radio spectrum sensing performance is more important. By cooperative spectrum sensing probability of false alarm (Pf) is increased with given probability of detection (Pd). In this paper we formulate a cooperative spectrum sensing as noncooperative game and also formulate a optimization problem, numerical results demonstrate that limited number of SU for cooperative sensing are achieve much better performance than Nash Equilibrium. By selecting optimal strategy SU maximize their utility, maximum spectrum utilization is depend on expected utility under different SNR.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of a 5-pole interdigital band-pass filter at 2.4GHz","authors":"Atul Makrariya, P. Khare","doi":"10.1109/ICCN.2015.19","DOIUrl":"https://doi.org/10.1109/ICCN.2015.19","url":null,"abstract":"In this paper we have designed and analyzed the transmission character of a 5-pole symmetrical interdigital band-pass filter centered at a frequency of 2.4GHz. Interdigital band-pass filter is designed on FR4 substrate with a substrate thickness of 1.6mm and dielectric constant, εr = 4.4. Interdigital Band pass filter is designed and simulated by Finite Element Method (FEM) based commercial software Ansoft's HFSS v13. Various transmission characteristics of band-pass filter like Fractional Bandwidth (FBW), coupling, group delay, etc., are discussed. A FBW of 59.6% is obtained at a center frequency of 2.4GHz.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MITE: Memory integrity based trust evaluation in Wireless Sensor Networks","authors":"S. Desai, M. Nene","doi":"10.1109/ICCN.2015.40","DOIUrl":"https://doi.org/10.1109/ICCN.2015.40","url":null,"abstract":"Trust is quintessential to safety in a network and is the epitome of security. Trust management schemes have been researched and implemented in Wireless Sensor Networks (WSNs) to provide an added advantage over and above the cryptographic security mechanisms. Each trust management scheme deals with the concept of trust and its evaluation in a unique manner. This uniqueness in approach is achieved by using network parameters, QoS, behavior of nodes etc. as metrics to evaluate trust. Every trust management scheme aims at providing resilience to the effect of malicious or selfish nodes. In this paper, we propose a node memory based trust evaluation method by using memory integrity as a metric to evaluate trust. The results indicate the method to be promising to evaluate trust at node-level and network-level.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and deployment of Vehicle Tracking System in VANETs using Xbee Pro: Prototype model","authors":"Nagarjuna Karyemsetty, B. Samatha, K. H. Rao","doi":"10.1109/ICCN.2015.20","DOIUrl":"https://doi.org/10.1109/ICCN.2015.20","url":null,"abstract":"Cooperative and Communication applications place an vital role in vehicular adhoc network(VANET)s for safety messages, warning messages, weather information, Traffic congestion information and road conditions information etc can be communicated from one vehicle node to another vehicle node and vehicle node to road side unit (RSU) within the ITS (Intelligent Transportation Systems). In this paper, we conducted an experimental study to establish a simple network among five vehicle nodes. Design of each vehicle node composed of communication module, Processing module, GPS module and energy source. Each vehicle node transmits its position information along with speed of the vehicle to RSU in which we can trace the movements of vehicle that mean we can monitor the travel path of vehicle in Google map using latitude and longitude transmitted by GPS Receiver. Experiment results proved that the degradation of network performance using zigbee module in dynamic and high speed environment.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}