{"title":"Design and development of aircraft to aircraft communication by Ad-Hoc networks","authors":"A. Vengadesh, P. Gunasekaran","doi":"10.1109/ICCPCT.2015.7159529","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159529","url":null,"abstract":"This paper is designed to develop an air to air navigation like aircraft to aircraft communication (A2AComm) based on Ad-Hoc networks as a communication technology. It is a new communication framework of Ad-hoc network for safe air navigation. The main principle of Ad-hoc network is that, it will track the position of nearby aircrafts with motion, direction and it will establish communication between two or more adjacent flying aircrafts. The design of A2AComm is mainly to avoid air traffic congestion, pointing emergency location, reducing the Air Traffic Contol (ATC) workloads, and preventing aircraft diversion and air accidents. Also its an easy mode of communication between crews from one aircraft to another aircraft using audible and visual alerts. Developement of this design in not based on Global Positioning System (GPS) but fully based on WiMAX and Ad-hoc network principle. Ad-Hoc network communication covers a maximum distance of 1000 meters(1 Km) and has a high bandwidth and high rate of data transmission. The systems comprise computers, communications, sensors, control technologies and management strategies. These function in an integrated manner to improve the functioning of the air transportation systems. It also provides real-time information to the aircrew to improve the safety and efficiency of air to air communication.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76129822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum approach based hybrid classifier for classification of ECG signal","authors":"K. Muthuvel, L. Suresh, T. Alexander, S. Veni","doi":"10.1109/ICCPCT.2015.7159449","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159449","url":null,"abstract":"Heart is one of the crucial parts of a human being. The heart produces electrical signals and these signals are called cardiac cycles. The graphical recording of these cardiac cycle produced by an Electrocardiograph is called as Electro cardio gram (ECG) signal. In this work an algorithm has been developed to detect the five abnormal beat signals which includes Left bundle branch block beat (LBBB), Right bundle branch block beat (RBBB), Premature Ventricular Contraction (PVC), Atrial Premature Beat (APB) and Nodal (junction) Premature Beat (NPB) along with the normal beat. In order to prepare an appropriate input vector for the neural classifier several pre processing stages have been applied. Tri spectrum is used to extract features from the ECG signal. Hybrid classifier is used to classify the ECG beat signal. Hybrid classifier use both ABC algorithm and genetic algorithm to train the beat signals in the neural network. Finally, the MIT-BIH [1] database is used to evaluate the proposed algorithm. The beat classification system gives an accuracy of 71%, sensitivity 67% and specificity 79%.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80069789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Mohan, Hanna G. Elizabeth, P. Navya, V. Bagyaveereswaran
{"title":"Electronic scrutinizer for automobiles","authors":"C. Mohan, Hanna G. Elizabeth, P. Navya, V. Bagyaveereswaran","doi":"10.1109/ICCPCT.2015.7159359","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159359","url":null,"abstract":"Accident rates are tremendously increasing day by day due to reckless driving. It has become a necessary to implement a system which ensures safety. In this context a new system is introduced which monitors over speed conditions, seat belt status and provides a button, named as Ladies' One Button Help(LOBH), for help in emergency conditions. It employs Arduino Uno as controller and uses GPS and GSM modules for communication purposes.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"22 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76521822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Valence arousal similarity based recommendation services","authors":"R. Subhashini, G. Akila","doi":"10.1109/ICCPCT.2015.7159309","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159309","url":null,"abstract":"Web Services play a vital role in e-commerce and e-business applications. A WS (Web Service) application is interoperable and can work on any platform i.e.; platform independent, large scale distributed systems can be established easily. A Recommender System is a precious tool for providing appropriate recommendations to all users in a Hotel Reservation Website. User based, Top k and profile based approaches are used in collaborative filtering algorithm which does not provide personalized results to the users and inefficiency and scalability problem also occurs due to the increase in the size of large datasets. To address the above mentioned challenges, a Valence-Arousal Similarity based Recommendation Services, called VAS based RS, is proposed. Our proposed mechanism aims to presents a personalized service recommendation list and recommending the most suitable service to the end users. Moreover, it classifies the positive and negative preferences of the users from their reviews to improve the prediction accuracy. For improve its efficiency and scalability in big data environment, VAS based RS is implemented using collaborative filtering algorithm on MapReduce parallel processing paradigm in Hadoop, a widely-adopted distributed computing platform.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"52 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88333833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android mobile forensic analyzer for stegno data","authors":"Walter. T. Mambodza","doi":"10.1109/ICCPCT.2015.7159271","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159271","url":null,"abstract":"The advancement of technology has led to better and improved service in mobile communication networks. Smartphones are being used by people for social networking, conducting business transactions as well as committing crime. Anti-Forensic compromises the availability of evidence to the forensic process causing problems to the investigator. The aim of this paper is to provide a solution to the anti-forensic technique of steganography by designing and implementation of an application that will scan, hash and analyze for any hidden information on an image, video or audio file on an android device and collect data for digital profiling or investigation.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91475072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of dual-hop mixed relaying cooperative networks with Nth best-path selection","authors":"S. Arunmozhi, G. Nagarajan","doi":"10.1109/ICCPCT.2015.7159431","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159431","url":null,"abstract":"Cooperative relaying is one of the promising technology which is used to improve coverage and spatial diversity. A new relay strategy, the Nth Best-Relay Selection scheme is proposed to improve the bandwidth penalty and to increase the spatial diversity by using a sub-optimal allocation for the relay relative distance between the source and destination in a multi-hop cooperative systems. A single branch dual-hop network and dual branch dual-hop network with adaptive Decode-and-forward (DF) and Amplify-and-forward (AF) cooperative diversity systems is considered. The proposed Nth Best-Relay selection scheme over single branch dual-hop system is compared with dual branch dual-hop network using the closed-form expression. The BER (Bit error rate) and Outage probability using binary and quadrature phase shift keying modulation schemes (BPSK & QPSK) with adaptive mixed decode-and-forward (DF) and amplify-and-forward (AF) cooperative diversity systems over Rayleigh fading channel were estimated. Results show that in the Nth best relay the diversity order is equal to (M -N +2) where M is the number of relays.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"21 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87057368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of compact UWB hexagonal monopole antenna with frequency notch characteristics","authors":"Manaswinee Sahoo, S. Pattnaik, S. Sahu","doi":"10.1109/ICCPCT.2015.7159388","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159388","url":null,"abstract":"This paper presents the design of compact coplanar waveguide fed ultra wide band antenna having frequency Notch characteristics. The designed antenna shows a dual band notch characteristic. Hexagonal star type of fractal responsible for creating notched band centered at 5.2 GHz for WLAN elemination has been used in this work. In order to avoid interference with X-band uplink satellite communication system at 8.2 GHz, an opposite W shaped fractal curve at feed line has been used. Hexagonal monopole radiator has contributed to the resultant bandwidth of 3.1-11.2 GHz with VSWR<;2 by increasing the characteristics of matching at lower frequencies with an exception of two notched bands. A theoretical formulation to calculate the notch frequency is also validated.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90679177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User authentication scheme based on Fast-Walsh Hadamard transform","authors":"A. Remya, A. Sreekumar","doi":"10.1109/ICCPCT.2015.7159355","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159355","url":null,"abstract":"User authentication scheme in context of audio can be achieved by labeling the speech signal with key signal dependent physical features. The key features for the development of the label are identified by using the common classification schemes such as ANN, kNN and SVM. The relevant features are given as input to an online QR code generator to obtain the QR code which is employed as the watermark. Using the FWHT transform, speech signal is then labeled and the confirmation along with comparison at the receiving end guarantees speaker authentication.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89014303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of very fast transient overvoltages and mitigation techniques of a gas insulated substation","authors":"Nikhil Pathak, T. Bhatti, Ibraheem","doi":"10.1109/ICCPCT.2015.7159278","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159278","url":null,"abstract":"The very fast transient overvoltages (VFTOs) generated due to switching operations of gas insulated substations (GIS) are dangerous to the equipments connected to the substations. In special cases these transients may cross the Basic Insulation Level (BIL) of the GIS. In this paper, these transient voltages are investigated at the different sensitive locations of a 400 KV GIS. VFTOs of the GIS are calculated using EMTDC/PSCAD software. Hence, the suppression of the VFTOs is also an important field of interest. The suppression techniques to reduce the VFTOs are also discussed in this paper.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"74 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85988863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based security solution for android smartphones","authors":"T. Marengereke, K. Sornalakshmi","doi":"10.1109/ICCPCT.2015.7159512","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159512","url":null,"abstract":"In this paper, we define SIEM and we discuss Android security monitoring as well as recent research in Android security systems. Then, we propose a cloud based security system for collection, visualization, analysis and correlation of application logs, statistics and determining abnormal application and network behavior on the device. If abnormal behavior is detected an appropriate alert is sent back to the device for remedial action. In the case of abnormal network traffic, then firewall rules to be updated on an implementation of an IPTABLES/ NETFILTER firewall to block unwarranted network traffic. Furthermore a web interface is created to enable visualization of logs and all data collected from the device. So it serves as an intrusion mitigation solution coupled with security information audit web portal. This paper highlights the architecture of the proposed system.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"27 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86179771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}