{"title":"Design and implementation of four bit arithmetic and logic unit using hybrid single electron transistor and MOSFET at 120nm technology","authors":"V. Raut, P. Dakhole","doi":"10.1109/PERVASIVE.2015.7087063","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087063","url":null,"abstract":"Low power design requires optimization at all levels and recent development in nanoscale devices unlock the idea of hybridization due to which power consumption of a system can be controlled. The implementation of hybrid techniques for the designing of four bit arithmetic and logic unit with low power dissipation is presented in these paper. The characteristics of SET as a low power device and MOSFET as a high speed device produces unique innovations, which is not possible to achieve with only CMOS circuit. The basic hybrid gates designed and simulated as well as new XOR gate is designed for reducing the power dissipation in implementation of four bit hybrid arithmetic and logic unit. Three different full adders designed, simulated and compared in terms of power dissipation.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on distributed techniques for detection of node clones in Wireless Sensor Networks","authors":"Shriya V. Autkar, M. Dhage, S. Bholane","doi":"10.1109/PERVASIVE.2015.7087146","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087146","url":null,"abstract":"Wireless Sensor Networks consists of sensor nodes which are placed in harsh and hostile surrounding where an adversary may capture the nodes, replicate them and use it for its own purpose. If the clone nodes remain undetected, it can disrupt the network functions making it vulnerable to attacks. Hence false data can be injected or the legitimate data can be taken out. Thus to detect the node clone attack to preserve security goals is the fundamental problem in WSN. Centralized methods have been proposed to detect the clones which consist of single point of failure. Hence distributed protocols are more subtle to detect the clone nodes where no central authority is present and each node is responsible for detection. This paper presents various existing witness-based distributed techniques for detecting node clones present in the network.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling, control and response surface analysis of anesthesia","authors":"Joeeta Anurag Tomer, R. Dubey","doi":"10.1109/PERVASIVE.2015.7086999","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086999","url":null,"abstract":"Anesthesia practice is unique in the sense that an anesthetist must target profound drug effect during any surgical stimulus and then reverse the effect rapidly when the procedure is over. This can only be achieved when the anesthetist has in depth knowledge of the relationship between concentration and effect and thus facilitate the transition between anesthetic state and awake state in a smooth way. The parameter which is used to define the right amount of anesthesia is `Depth of Anesthesia' (DoA). A situation involving overdosing or under dosing of anesthetic drug can lead to increased costs incurred, prolonged post-operative stay in the hospitals and in extreme conditions may even lead to death. Earlier larger doses of a single anesthetic agent were used to achieve anesthesia. But it had profound side effects. As such a combination of an anesthetic agent like propofol and an opioid like remifentanil is used, and the modeling is done by a technique which is known as `Three compartment PK-PD model'. The controller used to control the process is `Proportional-Integral-Derivative Controller (PID)'. The interaction between the anesthetic drug and the opioid is then studied, so as to determine the compatibility between the two drugs. The technique which is used in this context is `Response Surface Methodology'. In this paper Response Surface is generated using mat lab and the entire spectrum of drug effect is studied.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of Microstrip Antenna: Knowledge based optimization for the enhancement in the design procedure","authors":"M. P. Ghatule","doi":"10.1109/PERVASIVE.2015.7087211","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087211","url":null,"abstract":"With the rapid spread of radio communication network including cellular phone, Radar Communication System, Navigation, Internet Communication Satellite communication etc., the ANTENNA is basic device which is used in all communication systems. Its proper design is essential to run those systems effectively and gainfully. Conspicuously wide antennas for various transmitting and receiving stations installed on steel towers, suburbs and on the roofs of the buildings and tops of the electrical poles and towers in the city and also in rural area. Thus antenna is the backbone of the any radio wave and microwave communication system.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pooja K. Niranjane, S. Rajput, V. Wadhai, J. Helonde
{"title":"Performance analysis of PUE attacker on Dynamic Spectrum access in cognitive radio","authors":"Pooja K. Niranjane, S. Rajput, V. Wadhai, J. Helonde","doi":"10.1109/PERVASIVE.2015.7086985","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086985","url":null,"abstract":"Spectrum inefficiency is the major problem in the wireless technology. To negotiate this problem the technology called cognitive radio is introduced which is based on software defined radio (SDR). It additionally senses the environment with the help of secondary user to utilize the licensed band when primary user is not accessing the spectrum. Security and privacy are immeasurable challenges in all types of wired and wireless networks. These challenges are of even greater importance in CR networks. The unique characteristic of these networks and the application purposes, they serve make them attractive target for intrusions and other attacks. Primary user emulation attack is one of the major security threats in spectrum sensing. To shrink this we have distinguished various defense techniques which can conflict the PUE attacks.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey: Heterogeneous video transcoder for H.264/AVC to HEVC","authors":"S. Kaware, S. Jagtap","doi":"10.1109/PERVASIVE.2015.7087098","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087098","url":null,"abstract":"High Efficiency Video Coding (HEVC) is invented as new video coding standard for improvement of the H.264/AVC coding standard. HEVC currently used to enhance the video compression and quality of video. However, there are a lot of limitations in H.264/AVC encoded video. So the new efficient method is proposed for transcoding the H.264 encoded video into HEVC format. In this paper, different methods for video transcoding are explained which include mode mapping, machine learning, complexity scalable and background modeling.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bhave, Himanshu Kulkarni, Vinay Biramane, Pranali K. Kosamkar
{"title":"Role of different factors in predicting movie success","authors":"A. Bhave, Himanshu Kulkarni, Vinay Biramane, Pranali K. Kosamkar","doi":"10.1109/PERVASIVE.2015.7087152","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087152","url":null,"abstract":"Due to rapid digitization and emergence of social media the movie industry is growing by leaps and bounds. The average number of movies produced per year is greater than 1000. So to make the movie profitable, it becomes a matter of concern that the movie succeeds. Given the low success rate, models and mechanisms to predict reliably the ranking and or box office collections of a movie can help de-risk the business significantly and increase average returns. The current predictive models available are based on various factors for assessment of the movie. These include the classical factors such as cast, producer, director etc. or the social factors in form of response of the society on various online platforms. This methodology lacks to harvest the required accuracy level. Our paper suggests that the integration of both the classical and the social factors (anticipation and user feedback) and the study of interrelation among the classical factors will lead to more accuracy.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic sensor based system for analysis of infection behavior in milk","authors":"Sarita B. Dhoble, N. Choudhari, A. R. Choudhari","doi":"10.1109/PERVASIVE.2015.7087076","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087076","url":null,"abstract":"In human life, milk and milk products are important, necessary and vital food elements, without which the daily meal may not be complete. Food and milk borne pathogens are a major cause of morbidity & mortality in human society. Different types of infections like milk borne pathogens, bacteria, microbes can contaminate milk. This contaminated milk is very dangerous diseases producing potential vehicle. So infection detection in milk are an urgent need of the society to prevent the diseases caused by pathogens. The prime intention of this research has been to develop electronic sensor based system to study the behavior of infections which are occurs in milk. Highly efficient pathogen separation, extraction strategies are needed to achieve successful detection of infection. Therefore electronic sensor system has developed which may be used to study infection information, infection trajectories and its extraction in milk and milk product. The quality of milk samples is tested by checking the pH level by using the electronics ph model developed. The response of sensor system is compared with the response of the same sample in the dairy form using classical methods. The observations and results of this analysis are used to predict the infections present in milk and its food products.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heat recovery system for oven in paint shop","authors":"Sneha Sharma, G. Gaikwad","doi":"10.1109/PERVASIVE.2015.7087052","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087052","url":null,"abstract":"This paper presents the design of heat recovery system for oven in paint shop. The hot air generated in oven is directly passed to the environment through the exhaust. Oven's unused heat is exhausted to atmosphere at High Temperature. The exhausted heat carrying flue gas is at high temperature. The system is to reuse that air for hot water generation. The hot water generated will be at temperature of boiling point approximately. That water then can be used for several processes. Heat energy for total hot water heating is very large. Hence the potential of energy recovery & reuse is realized. Average 90% of energy can be recovered from oven exhaust. The technique used is heat exchanger with gas to liquid heat transfer.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative reinforcement learning approach for routing in ad hoc networks","authors":"Rahul Desai, B. Patil","doi":"10.1109/PERVASIVE.2015.7086962","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086962","url":null,"abstract":"Most of the routing algorithms over ad hoc networks are based on the status of the link (up or down). They are not capable of adapting the run time changes such as traffic load, delay and delivery time to reach to the destination etc, thus though provides shortest path, these shortest path may not be optimum path to deliver the packets. Optimum path can only be achieved when quality of links within the network is detected on continuous basis instead of discrete time. Thus for achieving optimum routes we model ad hoc routing as a cooperative reinforcement learning problem. In this paper, agents are used to optimize the performance of a network on trial and error basis. This learning strategy is based work in swarm intelligence: those systems whose design is inspired by models of social insect behaviour. This paper describes the algorithm used in cooperative reinforcement learning approach and performs the analysis by comparing with existing routing protocols.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}