{"title":"Modelling and Adaptive Systems for Smart Cities","authors":"M. Mohammadian","doi":"10.1109/ICRITO.2018.8748465","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748465","url":null,"abstract":"This paper considers the use of a multi-agent system for control of a multi traffic lights. The proposed model consists of a community of agents that autonomously act in cooperation with other agents using a set of fuzzy logic (FL) systems to control traffic at several intersections. Each agent system acts initially independently to control each traffic signal in an online real-time manner. Each agent adjusts traffic timing on each traffic signal. The effectiveness of the multi-agent system for controlling traffic signals is established through simulations. The multi-agent system used controls multi traffic signals. The results are promising, and they support the expandability of the model used using hierarchical fuzzy logic systems and multi-agent systems.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123016878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Water Leakage Detection and Localization","authors":"A. Purwar, Mohit Patel, M. Garg, Karan Ahuja","doi":"10.1109/ICRITO.2018.8748372","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748372","url":null,"abstract":"The 21st century era is witnessing continuous technological advancements and rapid degradation of our natural resources. Water, which is one of the basic necessities, is under scarcity. There is a need to find ways to conserve and save every single drop of water. To confront from scarcity of water and preserve it using a more efficient method, the idea has been presented in this paper. The idea focuses on developing and implementing an efficient and optimized water utilization system in which automation is done using the sensor data for the quantity of water supplied from the main supply tank to its respective sub tanks with an efficient and optimized leakage detection system in the supply lines. Leakage amount in the supply lines is detected based on the concept of difference between water delivered to various nodes by the main tank and received by the various nodes, and the exact location of the leakage is determined using a new approach based on transmission line and circuit theory concepts. The main advantage of using the proposed leakage detection scheme is to reduce the cost to existing leakage detection schemes without comprising the accuracy of the system. While most of the schemes employ sensors and other costly elements thus causing the increase in the system cost, this scheme is very simple and practical as it does not require any sensors and other costly elements but only requires very simple hardware requirements such as coaxial cable, copper wire and waveform analyzer.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Different Selfish Node Detection Techniques in DTN","authors":"Atul Sharma, Lakshay","doi":"10.1109/ICRITO.2018.8748620","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748620","url":null,"abstract":"DTN is a network which is designed for environment in which frequent delays are occurred and no direct path is available between source and destination. In DTN security of data transmission is a challenging task because data transmission between source and destination is totally dependent on intermediate nodes. Sometime these intermediate nodes may behave no cooperatively in network. There are number of attacks available such as selfish node attack, byzantine attack, black hole attack and denial of service attack. To overcome this kind of problem number of techniques were proposed by different researchers. In this paper an analysis on these techniques will be presented.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Laha, Ankur Ganguly, Rishav Bhattacharya, P. Sadhu, A. K. Naskar
{"title":"IoT based Street Light Visibility and Water Logging Monitoring for Development of a Smart City","authors":"S. Laha, Ankur Ganguly, Rishav Bhattacharya, P. Sadhu, A. K. Naskar","doi":"10.1109/ICRITO.2018.8748798","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748798","url":null,"abstract":"In modern world, one of the key agenda of the government is to build up the smart city for easy accessibility of all the facilities. IOT can be the significant option to build up such smart cities throughout the country. This paper is mainly focusing on building such smart cities with high quality identification and adaptation technique of light intensity of the streets with water logging area controlling and monitoring through IOT. This system is controlled by an embedded body configured with ESP12, Node Red, three stage water height detection sensor and LDR module. Through the LDR light sensor the signal gets processed by the Node-Mcu and is sent to the local control room via Internet. Solar panel has been used here as a power source to charge the lithium battery of the device. When the visibility range of light of any street is not up to the mark of human eye visibility range then the data will be sent from local control room to the head control room along with the area location where the street light visibility is not suitable for human eye. In this way the head control room will get a real time system to monitor information of the lightning conditions in a single dashboard display. After analyzing the data the following conclusions can be derived that, it might have been possible that some lights have been damaged or had been stolen. Therefore the visibility range is not up to the mark. More light have to be deployed for proper visibility of that street. Similarly in rainy season the system will operate with the water level sensor to indicate which area of the city is water logged due to heavy rain. The whole system will be deployed in street light posts preferably for easy identification of those areas visibility range and water logging condition monitoring purpose. The system has been planned to develop a smart city for smooth functioning of the human daily life with preventing wastage of energy.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121873797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swati Narang, P. K. Kapur, D. Damodaran, R. Majumdar
{"title":"Prioritizing Types of Vulnerability on the Basis of their Severity in Multi-version Software Systems using DEMATEL Technique","authors":"Swati Narang, P. K. Kapur, D. Damodaran, R. Majumdar","doi":"10.1109/ICRITO.2018.8748720","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748720","url":null,"abstract":"Software Vulnerabilities presents high risk to the software system’s security. Researchers have been working on risk reduction posed by vulnerabilities before its fixation. Prioritizing the fixation of these vulnerabilities on the basis of their criticality and severity is an important step in this direction. The vulnerabilities which occur repeatedly in consecutive versions and are interdependent on each other seems to be highly critical. This paper focuses on types of vulnerabilities interdependent on each other occurring again and again in an n-version software. Our focus is to propose a cause effect diagram using an MCDM technique (multi-criteria decision-making) for vulnerability prioritization. The MCDM technique which we chose to use here is DEMATEL i.e., decision-making trial and evaluation laboratory for prioritization of these interdependent vulnerabilities and advocating a cause-effect relationship using diagram. Finding of severity, prioritization according to that severity measure, proposing of cause-effect relationship obtained through DEMATEL seems to be a more practical approach and a better solution of prioritization.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epileptic Data Classification Using Frequency Power Estimation of Channel (FP1-F7) in Children","authors":"Alpika Tripathi, Geetika Srivastava, P. Maurya","doi":"10.1109/ICRITO.2018.8748624","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748624","url":null,"abstract":"Epilepsy is the most common neurological disorder in which a person experienced repeated seizures. The seizures are caused by abnormal changes in the electrical and chemical activity in the brain. Early identification and treatment of epilepsy can give good result. About two-third of all children population affected with epilepsy, experience increased seizures with time till their teenage. Conventionally the epileptic data is detected by visual inspection and EEG plot, which greatly depends upon expertise of the examiner. According to latest reports, as high as 23% of total affected population is wrongly diagnosed for epilepsy. Since the antiepileptic medicines approved by FDA, also have numerous side effects, hence it becomes crucial to identify epilepsy correctly. The correct identification is more crucial in where these side effects can cause much damage to the overall development. The authors of this paper have proposed frequency power estimation technique for correct diagnosis of epilepsy using channel(FP1-F7) of EEG data in children below 5 years. The proposed technique correctly detects epileptic cases in children with 90% accuracy.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conference Organizers","authors":"","doi":"10.1109/icrito.2018.8748752","DOIUrl":"https://doi.org/10.1109/icrito.2018.8748752","url":null,"abstract":"","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UX Engagement and Interaction","authors":"Y. Oyedele, D. Greunen, A. Veldsman","doi":"10.1109/ICRITO.2018.8748639","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748639","url":null,"abstract":"People encounter diverse ICT products, from social environments to formal environments. However, the engaging experience with each product differs from user to user. Many studies that have been done on the engagement of users with technology differ in what is considered as the user’s engagement. This paper proposes that the emotional, cognitive and behavioural engagement that occurs concurrently with a user’s encounter with technology, constitute the holistic User Experience (UX) Engagement and Interaction. Though conceptually separate, the dimensions for user engagement during the experiencing period are intertwined as such that the measurement approach for a dimension, extends to parts of another dimension. Such considerations could give a more holistic meaning to the measurement of the real engagement that the user has with the product in the experiencing period.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124788433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal Processing Challenges in Biohybrid System Design","authors":"Z. Babic","doi":"10.1109/ICRITO.2018.8748714","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748714","url":null,"abstract":"Biohybrid systems are new and rapidly growing field, rising up new paradigms in system theory and signal processing. In this paper, cognitive biosensors, biohybrid system modeling and communication in biohybrid systems are analyzed from the signal processing point of view. Some examples are presented, including a new approach to signal processing in cognitive biosensors with group-living animals.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Order Reduction Usage of Stability Equation Method Designed for Discrete-Time Systems","authors":"D. K. Sambariya, Trishla Sharma","doi":"10.1109/ICRITO.2018.8748665","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748665","url":null,"abstract":"This paper presents, a higher-order transfer function of DTS, reduced with stability equation method (SEM). For the reduction of DTS transfer function, indirect method is used. The ROM (Reduced Order Model) is founded on the pole-zero designs. In this work, using the SEM shows the graphical evaluation of step responses of ROM and other literature methods. The comparison displays improved results of proposed ROM than further approaches obtainable in literature. The analysis stays founded upon settling time, peak time, peak and rise time information of real model and ROM.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}