{"title":"Assessment of spectral efficiency about 900 MHz using GSM and CDMA technologies for mobile cognitive radio","authors":"S. Mule, G. C. Manna, N. Nathani","doi":"10.1109/PERVASIVE.2015.7087043","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087043","url":null,"abstract":"Basis of cognitive radio is to exploit unused frequency channels in licensed bands. Recently standardised IEEE 802.22 set of cognitive radio protocols envisages fixed and nomadic receivers at below 800 MHz bands. Existing mobile communication system uses CDMA in 800 MHz band and GSM in 900 MHz band. Research works has established that there are some vacant channels in these mobile communications bands which are permanently available and can be deployed as Cognitive Control Channel (CCC) and Cognitive Pilot Channel (CPC). Dynamically available vacant channels in these frequency bands can be deployed for cognitive traffic. In the present study, conventional Radio frequency scanners available for different bands and dedicated engineering handsets are used for measurement of data speed in these bands. Drive tests were carried out in dense city of Kolkata across the length and breadth and spectral efficiency value was measured from data speed. The results can be utilized to take decision for appropriate Radio Access Technologies (RAT) to deploy for mobile cognitive radio in uplink and downlink directions in these frequency bands.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review: FPGA based word matching stage of BLASTN","authors":"S. Bhalekar, P. Chilveri","doi":"10.1109/PERVASIVE.2015.7087107","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087107","url":null,"abstract":"Molecular Biologists use Basic Local Alignment Search Tool (BLAST) as one of the most popular sequences analysis tool. BLAST is a design used to efficiently find similar regions between the two sequences that have biological significance. As the size of genome sequences is increasing rapidly, the computation time of BLAST is continuously increasing to perform a complete genomic database search. Hence there is a need to accelerate this search process. In this paper, a new approach is proposed to scan the genomic sequence databases of Deoxyribonucleic Acid (DNA) using field programmable gate array (FPGA) based hardware. To accelerate the word matching stage of BLASTN, specifically designed for DNA sequences, and to derive its efficient architecture, a reconfigurable architecture is proposed.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130086463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on designing framework for analyzing twitter spammers using forensic method","authors":"Ankita M. Ghate, L. Malik","doi":"10.1109/PERVASIVE.2015.7087158","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087158","url":null,"abstract":"In the last few decades, a dynamic growth in the number of research works conducted in the area of cyber forensic. This paper gives short reviews analysis and detecting twitter spammers using network forensic approach. In Today's world a social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. Digital forensics is an established field in civilization and criminal investigations. In the enterprise, digital investigations are often associated with incident response the detection and investigation of online social networking spammers. This paper examines the comparison of different forensic tool and its parameters. The previous results focus a number of usability issues that need to be taken into consideration when designing and implementing network forensic tools. In this paper general methodology is discussed for forensic data analysis and also the survey of various forensic data analysis tools and approach in use to capturing data from different resources.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114915009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical modelling of forced circulation evaporator pilot plant","authors":"Abhijeet Kishorsingh Sukede","doi":"10.1109/PERVASIVE.2015.7087006","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087006","url":null,"abstract":"Process control, design and optimization are the key features of any industry and continue to improve because of highly increasing global competition. Pilot plant plays a vital role in analyzing the effect of variables at various process conditions and for optimal study of the process. This paper presents nonlinear mathematical model of a laboratory based forced circulation evaporator pilot plant. The modeling is done considering mass balance and energy balance equations. The open loop validation of entire model is done in MATLAB. Various key parameters like level, pressure and composition of material are considered and monitored while modeling. The obtained model was then used as basis for the implementing advanced control strategies, physical study of the pilot plant, controlling plant dynamics etc.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion avoidance and control in Delay Tolerant Networks","authors":"P. Patil, M. Penurkar","doi":"10.1109/PERVASIVE.2015.7087132","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087132","url":null,"abstract":"In Delay Tolerant Network (DTN), the available resources like buffer size, bandwidth etc., are limited and easily gets consumed, which results in network congestion and adversely affects the overall network performance, Due to its network characteristics and custody transfer mechanism the standard TCP congestion control mechanism is not suitable for DTN. The congestion control in DTN is the area under the research because as DTN tries to establish a network in an unfavorable environment where network infrastructure is not available and if it succeeds then the high priority messages must not be dropped because it will affect the overall objective of DTN, as some of the application areas are highly sensitive. Some of the congestion control strategies have been discussed, compared after which a CASE routing algorithm is proposed by studying them.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks","authors":"Ashish Jain, V. Tokekar","doi":"10.1109/PERVASIVE.2015.7087174","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087174","url":null,"abstract":"Mobile ad hoc network (MANET) is lacking infrastructure support, so nodes of MANET are vulnerable to attacks. Denial of Service attacks (DOS) makes network inaccessible to users. Black hole attack is a type of DOS attack, in which mischievous node claims that it has a route towards the destination node. Ad Hoc on Demand Distance Vector (AODV) routing protocol is affected by Black hole attack. The proposed solution is based on first Route Reply (RREP) caching mechanism in AODV protocol. Simulation results show performance improvement in routing protocol.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of 3-D faces with missing parts and line scratch removal using new technique","authors":"A. A. Pawar, N. Patil","doi":"10.1109/PERVASIVE.2015.7087053","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087053","url":null,"abstract":"This paper presents an implementation of face recognition, which is a very important task of human face identification. Line scratch detection in images is a highly challenging situation because of various characteristics of this defect. Few characteristics are considered with the different texture and geometry of images. We propose a useful algorithm for frame-by-frame line scratch detection in face image which deals with 3D approach and a filtering of detection. The temporary filtering algorithm can be used to remove false detection due to thin vertical structures by detecting the scratches on an image. Experimental evaluation can be detecting the lines and scratches on a face image and they used to solve this difficult approach. Our method is used with missing parts in an image. Three-dimensional face recognition is an extended method of facial recognition is considered according with the geometry and texture of a face. It has been elaborated that 3D face recognition methods can provide high accuracy as well as high detection with a comparison of 2D recognition. 3D avoids such mismatch effect of 2D face recognition algorithms. Additionally, most 3D scanners achieve both a 3D mesh and the texture of a face image. This allows combining the output of pure 3D matches with the more traditional algorithms of 2D face recognition, thus producing better performance.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiband smart fractal antenna design for converged 5G wireless networks","authors":"S. Patil, Vandana Milind Rohokale","doi":"10.1109/PERVASIVE.2015.7087020","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087020","url":null,"abstract":"Forthcoming Fifth Generation wireless network will be converged version of all the available wireless and wired networks including cognitive radio network, Wi-Fi, cellular, Wi-Max, WSN, IoT, Li-Fi, satellite communication and optical fiber network. Presently in the era of 4G, numbers of researchers have designed different antennas which can integrate maximum four services. This research work proposes design and implementation of Multiband Fractal smart antenna for at least seven converged wireless network services. The antenna works for several services such as GSM (0.89-0.96GHz), DCS (1.71-1.88GHz), WLAN/WSN (2.44-2.45GHz), LTE (1.7-1.9GHz), Wi-Fi/Wi-Max (2.68-6.45GHz), HIPER LAN2 (5.15-5.25GHz) and Ku Band (8-12GHz) application. The antenna planed to be designed and optimized by making using of commercially available software-High Frequency Structure Simulator (HFSS).","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of 10 port router for network on chip (NoC)","authors":"Somashekhar Malipatil, S. Rekha","doi":"10.1109/PERVASIVE.2015.7087013","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087013","url":null,"abstract":"Network on chip is an emerging technology which provides data reliability and high speed with less power consumption. With the technological advancements a large number of devices can be integrated into a single chip. So the communication between these devices becomes vital. The network on chip (NoC) router is used for such communication. This paper focuses on the design analysis of 10 port router. The delay (2.571ns) and power (80.98mW) is minimized by using crossbar switch. The proposed architecture of 10 port router is simulated and synthesized in Xilinx ISE 14.4 software.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132425836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sonali D. Patil, P. Deshmukh, Tejal Chavan, Priyanka Sangwan, Vinay Shastri, Akash Sunthwal
{"title":"Reduced share size Audio Secret Sharing","authors":"Sonali D. Patil, P. Deshmukh, Tejal Chavan, Priyanka Sangwan, Vinay Shastri, Akash Sunthwal","doi":"10.1109/PERVASIVE.2015.7087082","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087082","url":null,"abstract":"Communication over the network generally consists of conveying the messages in the form of texts and images. In recent times communication through audio has been introduced and has changed the scenario of transmission and reception of messages, which makes it mandatory to provide proper security to the audio data. Audio Secret Sharing provides a means of transmitting the secret audio message over a network securely. This is done essentially by dividing the original secret message into a pre-defined number of shares. To formulate the original secret a specified number of shares have to be combined and anything less than the specification provided would render the message unattainable. This paper puts forth the Audio Secret Sharing scheme based on Matrix Projection. The proposed scheme lends security and reliability to the audio files and also the share size has been reduced to a great extent.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}