{"title":"A New Design Strategy of Sharp Cut-off FIR Filter with Powers-of-two Coefficients","authors":"Subhabrata Roy, A. Chandra","doi":"10.1109/WISPNET.2018.8538605","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538605","url":null,"abstract":"Optimal design of fixed coefficient finite wordlength linear phase FIR digital filters for custom ICs has been the focus of research during the last few decades. With the ever increasing demands for higher throughput and low power circuits, design of FIR filters with reduced hardware complexity has received serious attention day by day. This paper addresses the design problem of linear phase, sharp cut-off FIR filter with discrete coefficients. Number of simulation results has been presented in this regard so as to compare the performance of discrete coefficient filter with that of the continuous one. Supremacy of the proposed scheme over other existing works has also been established by means of a number of parameters pertaining to frequency response of the designed filter.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"635 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76814930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Chandrappa, H. Pavan, M. V. M. Sagar, M. Dakshayini
{"title":"IoT Security Solution to Avoid Theft","authors":"D. Chandrappa, H. Pavan, M. V. M. Sagar, M. Dakshayini","doi":"10.1109/WISPNET.2018.8538735","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538735","url":null,"abstract":"In these days security has become one of the most important societal concerns to be addressed. This is because of the increased robbery and intrusion cases at almost all the places like home, temples, colleges, offices etc. So people are finding it difficult to lead a secure, peaceful and happy life. Hence in this paper, an efficient IoT smart security system has been designed and developed that continuously monitors and informs the authorized person in case of intrusion is detected. An alarm is also raised locally that intimates the neighbouring people about the presence of intruder. This Theft Control unit has been developed using IoT technologies (IoT-TCU). The demonstration of this system have proved in successfully sending a message and raising an alarm, when any intruder is detected there by reducing the chances of theft by alerting the nearby and authorised people with the required information about the presence of intruder ontime.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"209 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NOVEL CAZAC Sequence Based Timing Synchronization Scheme for OFDM System","authors":"Anuja Das, B. Mohanty, B. Sahu","doi":"10.1109/WISPNET.2018.8538566","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538566","url":null,"abstract":"Several classical timing synchronization schemes have been proposed for the timing synchronization in OFDM systems based on the correlation between identical parts of OFDM symbol. These schemes show poor performance due to the presence of plateau and significant side lobe. In this paper we present a timing synchronization schemes with timing metric based on a Constant Amplitude Zero Auto Correlation (CAZAC) sequence. The performance of the proposed timing synchronization scheme is better than the classical techniques.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79497080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunayana Tirumalasetty, Vidwan Reddy Patlolla, Rakshith Tirumalasetty, Manish K. Arya, R. Agrawal, G. Hossain, A. Jothi, Ashwani K. Dubey, R. Challoo, Ayush Goyal
{"title":"Graphical Computational Tool for Segmentation of Gray and White Matter Regions in Brain MRI Images","authors":"Sunayana Tirumalasetty, Vidwan Reddy Patlolla, Rakshith Tirumalasetty, Manish K. Arya, R. Agrawal, G. Hossain, A. Jothi, Ashwani K. Dubey, R. Challoo, Ayush Goyal","doi":"10.1109/WISPNET.2018.8538587","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538587","url":null,"abstract":"There is a need for computational tools for processing medical patient data and extracting clinically relevant information from patient images for providing patient-specific personalized treatment. Tools have been and are actively being developed by software engineers and programmers in the field of bio-medical image processing for assisting doctors, scientists and researchers. This paper presents an independent stand-alone software application that is a graphical computational tool with a user interface for automatic segmentation of brain MRI images. The same software tool subsequently functions as a neurological disease prediction framework for detection of disease, dementia, impairment, injury, lesions, or tumors in brain MRI images. Brain MRI image segmentation techniques have become an important tool for neurologists to detect disease and cure patients in their early stages of the disease so detected. The tool presented in this paper facilitates the user to automatically segment the regions of brain MRI images using an algorithm called adapted fuzzy c-means (FCM). This methodology for segmentation is based on pixel classification technique, in conjunction with connected region analysis.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81545252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Thoshith, Samarth Mulgund, Praveen Sindgi, N. Yogesh, R. Kumaraswamy
{"title":"Multi-Modal Humanoid Robot","authors":"S. Thoshith, Samarth Mulgund, Praveen Sindgi, N. Yogesh, R. Kumaraswamy","doi":"10.1109/WISPNET.2018.8538449","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538449","url":null,"abstract":"Human-Robot Interaction deals with the direct use of robotic systems to interact with humans in particular context. In this paper, a humanoid is developed which can understand the commands in the form of speech and gesture. A connectedword speaker-independent speech recognition system is built using Mel Frequency Cepstral Coefficient and Gaussian Mixture Model in Kaldi toolkit. Gesture recognition is implemented using Convolutional Neural Network.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"10 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81550186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN","authors":"T. Nivedha, K. Jayanthi","doi":"10.1109/WISPNET.2018.8538476","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538476","url":null,"abstract":"In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"728 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76777861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamer F. Hafez, Ali Badawey Ali, R. S. Ali, Nadia Abd-Alsabour
{"title":"IT and Developing Countries With a Case Study of Recycling","authors":"Tamer F. Hafez, Ali Badawey Ali, R. S. Ali, Nadia Abd-Alsabour","doi":"10.1109/WISPNET.2018.8538623","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538623","url":null,"abstract":"The importance of non-governmental organizations (NGOs) in the renaissance of developing countries is constantly increasing in performing many activities such as keeping the environment. On the other hand, these societies suffer from the problem of garbage disposal although such garbage represents real wealth and added value if they could have been utilized optimally. This paper discusses this issue and proposes a comprehensive and easily used system that aims at managing the recycling of different types of garbage. It also includes nonprofit activities such as donating and facilitating the collecting of the garbage from different donors through a network of a wide range of charities.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74795479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Small Motion Magnification Using Automated RoI Selection and Spatial Co-ordinate Approach","authors":"M. Kumar, Tilendra Choudhary, M. Bhuyan","doi":"10.1109/WISPNET.2018.8538534","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538534","url":null,"abstract":"This paper presents a new framework to magnify small motions present in videos, which are invisible to the naked eyes. The proposed method is based on spatial coordinates. It has an ability to magnify motions of our interest in presence of large background motions as well as static background. It is assumed that the camera is static when the video is recorded. Initially, regions of interest (RoI) are detected in our method, which need to be magnified. Histogram of oriented gradients (HoG) with thresholding is used to estimate the RoIs. Subsequently, a feature point tracker is used to detect the motion of feature points with respect to time. Finally, the velocity of these feature points are amplified by a magnification factor, which results in a video with small motions amplified. The proposed method provides a newly introduced block based spiral search technique for automatically detecting RoIs. The qualitative analysis of the experimental results shows that the proposed method can produce significant motion magnification even for very small motions. The experimental results show the efficacy of the proposed motion amplification scheme.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"333 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80565814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Language Identification From Speech Features Using SVM and LDA","authors":"J. Anjana, S. Poorna","doi":"10.1109/WISPNET.2018.8538638","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538638","url":null,"abstract":"Speech based language identification system has a wide range of applications in the field of telephone services, multilingual translation services, government intelligence and monitoring etc. Identifying the exact speech feature for classification is an important problem in the language identification research area. In this work, we are comparing the performance measures of a language identification system using two different supervised learning algorithms. Mel frequency cepstral coefficients and formant feature vectors are extracted for classification purpose. The system which is developed using the database of seven different Indian languages is capable of identifying languages with LDA giving a maximum classification accuracy of 93.88% when compared to SVM with a classification accuracy of 84%.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"157 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device-to-Device Communication Aided by Two-Way Relay Underlaying Cellular Network","authors":"Pratap Khuntia, Ranjay Hazra","doi":"10.1109/WISPNET.2018.8538501","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538501","url":null,"abstract":"In this paper, we investigate the performance of device-to-device (D2D) communication assisted by two-way detect and forward (DF) relaying. Here, we derive an accurate approximate expression for sum-rate of two-way relaying D2D link under varying interference from cellular users and base station (BS). The analytical results reveal that D2D communication using relaying strategy provides a better and reliable communication in terms of maximum achievable sum-rate as compared to cellular communication mode. The two-way relaying technique improves bit error probability (BEP) by mitigating interference in the first phase of two-way transmission. On the basis of instantaneous signal to noise ratio (SNR), the combiner at the destination node follows an adaptive weight update process to improve the BEP performance in the second phase. We also analyze heuristic mode selection and resource allocation strategies in cellular network in association with multi-node two-way relay scheme, which not only boosts the energy efficiency of the system but also extends the coverage of cellular network.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"129 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79507952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}