{"title":"A Braille-based mobile communication and translation glove for deaf-blind people","authors":"Tanay Choudhary, Saurabh Kulkarni, P. Reddy","doi":"10.1109/PERVASIVE.2015.7087033","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087033","url":null,"abstract":"Deafblind people are excluded from most forms of communication and information. This paper suggests a novel approach to support the communication and interaction of deaf- blind individuals, thus fostering their independence. It includes a smart glove that translates the Braille alphabet, which is used almost universally by the literate deafblind population, into text and vice versa, and communicates the message via SMS to a remote contact. It enables user to convey simple messages by capacitive touch sensors as input sensors placed on the palmer side of the glove and converted to text by the PC/mobile phone. The wearer can perceive and interpret incoming messages by tactile feedback patterns of mini vibrational motors on the dorsal side of the glove. The successful implementation of real-time two- way translation between English and Braille, and communication of the wearable device with a mobile phone/PC opens up new opportunities of information exchange which were hitherto un-available to deafblind individuals, such as remote communication, as well as parallel one-to many broadcast. The glove also makes communicating with laypersons without knowledge of Braille possible, without the need for trained interpreters.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117188956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review: Front windshield wiper controller system for synchronisation of two wiper motors","authors":"R. Pawar, S. K. Shah","doi":"10.1109/PERVASIVE.2015.7087121","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087121","url":null,"abstract":"Synchronisation of motors is required in applications, where two or more motors are used. Conventional Tandem motion uses the high speed DC motor; where it is problematic to vary the speed of the wiper arms. Also there are weight and space constraints. In proposed system a pair of synchronized windshield wipers is used, in which each wiper arm is driven by its own independent motor. Traditional rigid mechanical linkages, driven by a single DC motor are removed for the sake of weight and space. For synchronisation and to avoid collision a closed loop control system is used. By Synchronising Two DC Motors, which are controlled using Peripheral Interface Controller (PIC) or Field Programmable Gate Array (FPGA), problems regarding Weight and Space can be solved. At present, synchronisation is achieved using Digital Signal Processor (DSP). As Cost of DSP is more, it is proposed to implement design using PIC. Also to get more design flexibility, system is implemented using FPGA. The results, which are going to obtain with PIC or FPGA, have to compare with the results that have obtained with existing method of Synchronisation by using DSP.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"14 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection system using fuzzy genetic algorithm","authors":"Yogita Danane, T. Parvat","doi":"10.1109/PERVASIVE.2015.7086963","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086963","url":null,"abstract":"Computer security has become an important part of the day today's life. Not only single computer systems but an extensive network of the computer system also requires security. In achieving the safety of the systems, an Intrusion Detection System (IDS) plays a significant role. IDS is a software that monitors the computer network and detects the suspicious activities that occur in the systems or network. The process of intrusion detection includes detecting intrusion. Intrusion is a suspicious activity attempted by the attacker. This paper presents a fuzzy-genetic approach to detecting network intrusion. Paper presents the results of the proposed system in terms of accuracy, execution time, and memory allocation. To implement and measure the performance of the system the KDD99 benchmark dataset is used. The KDD99 dataset is a benchmark dataset that researchers use in various network security researches. Genetic algorithm includes a development and collection that uses a chromosome like data structure and develop the chromosomes using selection, crossover and mutation operators. Fuzzy rule sorts network attack data.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent developments in distance protection of compensated transmission lines","authors":"A. Purohit, V. Gohokar","doi":"10.1109/PERVASIVE.2015.7087055","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087055","url":null,"abstract":"Growing dependence of modern society on electrical energy has resulted into increasingly complex nature of electrical power systems. It requires operation of the network closer to their stability limits. This leads to compensated transmission lines. Installing capacitors of fixed or controllable value provides a viable solution to improve power system stability and also to optimize power flow transmission capability of electrical grids transmission capability of power grid, optimize power flow and to improve system stability. However, installations of capacitors results into changing directions and values of fault currents and voltages in the networks. It causes problems for protective relays and fault locators. Distance relay is prone to maloperate due to large variations in voltage and current. Since fault location and classification are important tasks to safe guard electric power systems, as per the literature survey various practical or theoretical schemes are used to attain the reliable protection system for transmission lines equipped with compensation capacitors. This paper highlights merits and demerits of different methodologies to enhance distance protection of compensated transmission lines.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel color image steganography using Vector Quantization Codebook Generation methods LBG, TCEVR and KFCG","authors":"Sudeep D. Thepade, S. Thube","doi":"10.1109/PERVASIVE.2015.7087056","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087056","url":null,"abstract":"Steganography is the science of coverted communication in which information is hidden to provide secrecy. In this hiding technique secret information or message is concealed into other innocent data such as text, audio, image etc. The main objective of Steganography is to preserve covert communication among two parties. Steganography plays crucial role in various applications like modern printers, intellectual property rights, network security. Also it is used by intelligence services. As color image requires large hiding capacity, most of the existing steganography schemes are proposed for gray images. To improve hiding capacity in addition to having minimum alterations to host image, the paper propose a technique of hiding secret color image into cover image with same size as secret image. In the proposed method vector quantization (VQ)is applied to secret color image to get compressed data and that compressed data is concealed into host color image using Least Significant Bit (LSB) replacement technique. Experiment was conducted on 15 secret images, each one embedded into 15 cover images. Experimentation carried out using three different VQ methods, like Linde-Buzo-Gray(LBG), TCEVR (Thepade's Cosine Error Vector Rotation) and KFCG (Kekre's Fast Codebook Generation). Experiment shows KFCG performs better followed by TCEVR over conventional method like LBG. In all VQ methods high cluster size gives better quality of reconstructed secret.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134414344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on noise cancellation techniques of speech signal by adaptive filtering","authors":"Anuja N. Untwale, Kishori S. Degaonkar","doi":"10.1109/PERVASIVE.2015.7086974","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086974","url":null,"abstract":"With the help of different digital signal processing techniques speech signals can be used for many applications like speaker recognition, biomedical engineering, communication area and industrial applications. Degradation of speech signals occurs due to unavoidable noise sources and hence causes problems in respective applications. An efficient technique for noise removal is adaptive filtering; as it does not require signal statistics. This paper gives details about various available adaptive techniques that are useful for improving signal to noise ratio of speech signals. These techniques are studied based on the factors complexity, convergence and computation time, stability and SNR.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active warden for TCP sequence number base covert channel","authors":"Dr. Dhananjay M Dakhane, P. Deshmukh","doi":"10.1109/PERVASIVE.2015.7087183","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087183","url":null,"abstract":"Network covert channel generally use for leak the information by violating the security policies. It allows the attacker to send as well as receive secret information without being detected by the network administrator or warden in the network. There are several ways to implement such covert channels; Storage covert channel and Timing covert channel. However there is always some possibility of these covert channels being identified depending on their behaviour. In this paper, we propose, an active warden, which normalizes incoming and outgoing network traffic for eliminating all possible storage based covert channels. It is specially design for TCP sequence number because this field is a maximum capacity vehicle for storage based covert channel. Our experimental result shows that propose active warden model eliminates covert communication up to 99%, while overt communication is as intact.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121370428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Residual Energy based combine estimation of imperfections of receiver in MIMO-OFDM system","authors":"V. Hendre, M. Murugan, Rohini V. Jawale","doi":"10.1109/PERVASIVE.2015.7087041","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087041","url":null,"abstract":"The performance of Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems is seriously affected by various imperfections at receiver such as In-phase/Quadrature-phase (I/Q) imbalance, Carrier Frequency Offset (CFO) and DC offset. The proper estimation of theses imperfections at the receiver lead to increase the Bit Error Rate (BER) performance of the system. The training sequence based estimation is proposed in this paper for combine correction of I/Q imbalance and CFO estimation. Channel Residual Energy (CRE) is used for estimation. The performance of the proposed system is based on Crammer-Rao bound. Simulation results shows that our proposed method gives improved results over IQ-CFO-FD method for joint estimation of (I/Q) imbalance, (CFO) and channel response. Also we show that as number of transmit antennas increases at transmitter side then mean square error is reduced, this leads the further reduction in these imperfections in MIMO-OFDM systems.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust encryption method for speech data hiding in digital images for optimized security","authors":"S. Kulkarni, S. B. Patil","doi":"10.1109/PERVASIVE.2015.7087134","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087134","url":null,"abstract":"Steganography is a art of hiding information in a host signal. It is very important to hide the secret data efficiently, as many attacks made on the data communication. The host signal can be a still image, speech or video and the message signal that is hidden in the host signal can be a text, image or an audio signal. The cryptography concept is used for locking the secret message in the cover file. The cryptography makes the secret message not understood unless the decryption key is available. It is related with constructing and analyzing various methods that overcome the influence of third parties. Modern cryptography works on the disciplines like mathematics, computer science and electrical engineering. In this paper a symmetric key is developed which consists of reshuffling and secret arrangement of secret signal data bits in cover signal data bits. In this paper the authors have performed the encryption process on secret speech signal data bits-level to achieve greater strength of encryption which is hidden inside the cover image. The encryption algorithm applied with embedding method is the robust secure method for data hiding.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Appraise of similarity measures in image compression using vector quantization codebooks of Thepade's Cosine and Kekre's Error Vector Rotation","authors":"Sudeep D. Thepade, Ashish Devkar","doi":"10.1109/PERVASIVE.2015.7087142","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087142","url":null,"abstract":"Vector Quantization (VQ) is an efficient lossy image compression technique used in codebook generation. The selection of similarity measure for codebook generation affects the distortion between original and reconstructed image. This paper presents comparison of twelve assorted similarity measures for image compression using Kekre's Error Vector Rotation (KEVR) and Thepade's Cosine Error Vector Rotation (TCEVR)code book generation algorithm. The codebook of four different sizes 128, 256, 512 and 1024 are generated for 20 images using 12 different similarity measures. These similarity measures are chosen from five different families such as Minkowski, L1, Squared L2, Intersection and Fidelity. The images are reconstructed from respective codebooks and compared with original image with respect to Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The results have shown that similarity measures belonging to SquaredL2and Fidelity family such as Squared, Euclidean and Square-Chord give lower MSE and higher PSNR values as compared to others. The TCEVR gives better compression over KEVR for all similarity measures except Fidelity family.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}