Loading...

Proceedings of

2nd International Conference on Advances In Computing, Control And Networking ACCN 2015

Date
29-Aug-2015
Location
Bangkok , Thailand
Authors
82
ISBN
978-1-63248-073-6

29 Articles Published

1. A HOLISTIC APPROACH TO ACHIEVE ENERGY EFFICIENCY IN DELAY TOLERANT MOBILE AD-HOC NETWORK MINIMIZING SUPERFLUOUS ENERGY CONSUMPTION IN THE OPPORTUNISTIC NETWORK

Authors: C.D.SURIYAKALA , D.JYOTHI PRESHIYA

Abstract: Green networking is an important concern that currently acquires the attention in research. This paper explains an Energy aware cross layer optimization technique for Delay Tolerant Mobile Ad hoc Networks. Information sharing between Network Layer and Medium Access Control Layer has been utilized as an element to achieve the goal. Appropriate node selection strategy for data forwarding in Network Layer and minimizing idle listening by scanning the vicinity and discovering the knowledge of number of neighboring nodes in MAC Layer are the major factors considered for energy minimization. Energy Sensitive Routing Protocol (ESRP) minimizes ineffective energy utilization and Neighbor Table Responsive Asynchronous (NTRA) Energy Management MAC Protocol minimizes number of wake up slots based on the network status without losing network connectivity. Performance of the suggested cross layer approach is studied using NS-3 Simulator and observed that it outperforms the existing energy efficient

Keywords: Cross Layer Optimization, Delay Tolerant Network, Mobile Ad Hoc Network, Data Delivery Predictability, Energy Efficiency, Idle Listening, Network Layer, Network Lifetime, MAC Layer.

Pages: 1 - 7 | DOI: 10.15224/978-1-63248-073-6-01

2. NEUROLOGICAL DISORDER IDENTIFICATION BY EYE MOVEMENT BIOMETRIC USING MACHINE LEARNING SCHEMES

Authors: ANAND TIWARI , B K TRIPATHI , V K PATHAK , VIVEK SRIVASTAVA

Abstract: n recent past [1]-[2], many neurological disorders diagnosed with the help of eye movement signals. Such type of disorders is reflected through the abnormalities of eye movements. This is why eye movement signals are being utilized for identification of such brain level abnormalities [6]-[11]. The key factor that is associated with such identification is the combined nature of human eye movement plant and brain stem control. For defense personnel, timely identification of neurological disorders plays crucial role in order to prevent the degree of such disorders from mild to severe as they have higher chance for repeated trauma. Further, eye movement biometric features extracted from eye movement signals are being used for such diagnosis due to its intrinsic discrimination properties and associated brain level activity [2]. In this paper, we investigated the mild traumatic brain injury (m-TBI) neurological disorder identification by eye movement biometric through intelligent machine lea

Keywords: Eye movements, biometrics, machine learning, neurological disorders

Pages: 8 - 11 | DOI: 10.15224/978-1-63248-073-6-02

3. WATERMARKING BASED ON DIFFERENCE EXPANSION AND GENETIC ALGORITHMS

Authors: LAURA M. VARGAS

Abstract: Security problems that recently appeared in transmission and storing of digital content can be solved by using watermarking. Reversible watermarking is the election in medical and defense imagery because these security systems are able to restore the original image after extracting the hidden information. In this document an intelligent reversible watermarking scheme is proposed. It is based on the difference expansion method developed by Tian and it is helped by genetic algorithms to improve the imperceptibility of the mark for a fixed payload. Furthermore, it is shown that the image can be divided in blocks watermarking each one, so if an adulteration takes place, it can be determined the block where this happened.

Keywords: reversible watermarking, Haar transform, difference expansion, genetic algorithms, information security.

Pages: 12 - 16 | DOI: 10.15224/978-1-63248-073-6-03

4. IMPLEMENTATION OF GF (216) MULTIPLIER USING COMBINATIONAL GATES

Authors: AADITI BHOITE , MOHINI SAWANE , SHWETA GARTHE

Abstract: This paper proposes the design and implementation of GF (216) multiplier using composite field arithmetic. We have introduced an irreducible polynomial X2+X+ξ. This irreducible polynomial is required for transforming Galois field of GF (216) to composite field of GF (((22)2)2)2. Our estimation of the value of ξ and subsequently the composite field arithmetic hence forth derived achieved high speed GF (216) multiplier. The design being purely combinational is a clock free design. We achieved critical path delay of 11.5ns between inputs to output data path. We have used combination of ᴪ and λ as {10}2 and {1100}2 respectively. Due to this value of ᴪ, λ, ξ we achieved fastest implementation, at the cost of few extra gates. The design methodology includes implementation and verification on FPGA using Xilinx ISE and finally the physical layout was designed on ASIC using 90nm CMOS standard cell libraries. Our implementation result shows that without pipelining the hardware core can achieve t

Keywords: Galois field, composite field arithmetic, isomorphic mapping.

Pages: 17 - 22 | DOI: 10.15224/978-1-63248-073-6-04

5. PRELIMINARIES ON A HARDWARE-BASED APPROACH TO SUPPORT MIXED-CRITICAL WORKLOAD EXECUTION IN MULTICORE PROCESSORS

Authors: BRUNO GREEN , FABIAN VARGAS

Abstract: The use of multicore processors in general-purpose real-time embedded systems has experienced a huge increase in the recent years. Unfortunately, critical applications are not benefiting from this type of processors as one could expect. The major obstacle is that we may not predict and provide any guarantee on real-time properties of software running on such platforms. The shared memory bus is among the most critical resources, which severely degrades the timing predictability of multicore software due to the access contention between cores. To counteract this problem, we present in this paper a new approach that supports mixed-criticality workload execution in a multicore processor-based embedded system. It allows any number of cores to run less-critical tasks concurrently with the critical core, which is running the critical task. The approach is based on the use of a dedicated Deadline Enforcement Checker (DEC) implemented in hardware, which allows the execution of any number of cor

Keywords: Multicore Processor, Critical Application, HighPerformance Embedded System, Critical Task Schedulability, Deadline Enforcement Checker (DEC).

Pages: 23 - 27 | DOI: 10.15224/978-1-63248-073-6-05

6. HYBRID ALGORITHMIC APPROACH FOR MEDICAL IMAGE COMPRESSION BASED ON DISCRETE WAVELET TRANSFORM (DWT) AND HUFFMAN TECHNIQUES FOR CLOUD COMPUTING

Authors: ASHWIN DHIVAKAR M R , D. RAVICHANDRAN , VIJAY DAKHA

Abstract: As medical imaging facilities move towards complete filmless imaging and also generate a large volume of image data through various advance medical modalities, the ability to store, share and transfer images on a cloud-based system is essential for maximizing efficiencies. The major issue that arises in teleradiology is the difficulty of transmitting large volume of medical data with relatively low bandwidth. Image compression techniques have increased the viability by reducing the bandwidth requirement and cost-effective delivery of medical images for primary diagnosis.Wavelet transformation is widely used in the fields of image compression because they allow analysis of images at various levels of resolution and good characteristics. The algorithm what is discussed in this paper employs wavelet toolbox of MATLAB. Multilevel decomposition of the original image is performed by using Haar wavelet transform and then image is quantified and coded based on Huffman technique. The wavelet pa

Keywords: Wavelet Packet, Discrete Wavelet Transform (DWT), Lossless image compression, Medical image, Huffman coding, Cloud computing

Pages: 32 - 36 | DOI: 10.15224/978-1-63248-073-6-07

7. APPLICATIONS OF VISUAL CRYPTOGRAPHIC SCHEME

Authors: JYOTI RAO , VIKRAM PATIL

Abstract: Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secrets is then divided into different parts based on the pixel of the digital secret. These parts are called shares. The shares are then overlapped correctly to visualize the secret. Visual Cryptography is a very creative technique of sharing secrets. It is generally used either for sharing any secret among individuals or is used for authentication purpose. It can be used in different fields and different area to ensure security. This paper is a compilation some of the major applicable areas of Visual Cryptography. There are still many areas which have not been coupled with Visual Cryptography which otherwise would prove beneficial.

Keywords: Visual Cryptography, Shares, Authentication, Privacy

Pages: 37 - 41 | DOI: 10.15224/978-1-63248-073-6-08

8. ENERGY EFFICIENT ROUTING ALGORITHM FOR MANETS

Authors: K. KISHAN RAO , M. ASHA RANI , RAMA DEVI BODDU

Abstract: To meet the day to day challenges of wide usage of Mobile Ad hoc Networks (MANETs), energy efficient routing techniques is required to save battery power for a long network lifetime. In this paper, energy efficient Modified Bellman Ford Algorithm (MBFA) is proposed. The performance of a network depends on the node deployment. The network using two node deployment techniques, Grid topology (GT) and Random topology (RT) is implemented using QualNet Simulator. The proposed MBFA finds the shortest path using residual energy (RE) as a metric along with hop count and distance. Nodes in the network operate in Power Save Mode (PSM) using IEEE 802.11a/g Orthogonal Frequency Division Multiplexing (OFDM) standards of the Power Save Mechanism. PSM is energy efficient and improve network lifetime. Generic Radio Energy Model in QualNet Simulator is considered in route energy calculation. The performance of MBFA using fixed network traffic is investigated for both GT and RT. Simulation results show t

Keywords: Grid topology, MANETs, Modified Bellman Ford Algorithm, OFDM, Power Save Mode, Random topology

Pages: 42 - 46 | DOI: 10.15224/978-1-63248-073-6-09

9. AN AUTOMATIC APPROACH TO MEASURING QUALITY OF USB CAMERA

Authors: CHI HAN KAO , JONG YIH KUO , TAI YU LAI

Abstract: To measure the quality of USB camera needs a lot of time with current operations. Moreover, it might cause some mistakes because of the carelessness from tester. This research proposed an approach to reduce the test time. First, user can set the test chart of customization. Next, the proposed algorithm is applied to identify the test chart and to find the position of pattern. Finally, both the operation actions of tester and measurement time can be reduced

Keywords: USB camera, automatic measure, autoinspection, intelligence video analysis

Pages: 47 - 51 | DOI: 10.15224/978-1-63248-073-6-10

10. KINECT-BASED GESTURE COMMAND RECOGNITION FOR VENDING MACHINE OPERATIONS USING AN ANDROID PLATFORM AS THE MACHINE SIMULATOR

Authors: ING-JR DING , RUI-ZHI LIN , ZONG-GUI WU

Abstract: In this paper, a Kinect-based gesture recognition scheme for the application of operating a vending machine is presented where the popular smart phone device with the android platform is used as a simulator of the vending machine. Compared to the conventional human-computer interface (HCI) of vending machines by push-button operations, the developed gesture recognition scheme that employs the gesture action made by a personal operator as the operational command is a new type of HCI to control the vending machine. Presented Kinect-based gesture recognition for vending machine control sufficiently takes use of the released Kinect software development kit (Kinect SDK) to develop the system where the human skeleton information to represent the corresponding operator’s gesture action is extracted and then recognized. For further increasing the recognition accuracy of gesture command recognition, a time interval between the current recognition decision and the next recognition decision is in

Keywords: Kinect, gesture recognition, decision timeinterval, vending machine, Android I. Introduction

Pages: 52 - 56 | DOI: 10.15224/978-1-63248-073-6-11

11. ENGINEERING ABSTRACT QUALITY INDEX USING SANTOS’ MOVE

Authors: AIN NADZIMAH ABDULLAH , CHAN SWEE HENG , HELEN TAN , SYAMSIAH MASHOHOR , TUNKU HAIFAA TUNKU OSMAN

Abstract: Writing informative abstract is challenging especially for novice student writers due to word limit. Until today, there is no tool in helping writers write good abstract. In this paper, a framework was proposed to check the quality of engineering abstract with two important criteria, which are unique keyword and principal move. The execution of the proposed framework on engineering corpus shows the capability of the proposed work in detecting essential moves according to Santos’ Move. The obtained Abstract Quality Index (AQI) values show that the quality of abstract could be evaluated in a more detailed manner. The findings from the engineering abstract corpus yield that shorter length of abstract with right keywords produced higher value of AQI

Keywords: Engineering abstract checker, abstract quality index, Santos’ Move.

Pages: 57 - 61 | DOI: 10.15224/978-1-63248-073-6-12

12. OVERCOMING MALICIOUS READ/WRITE REQUESTS IN INTERNET FILE SYSTEMS

Authors: GABRIEL MIZRAHI , GADI HABER , YOSI BEN ASHER

Abstract: Hashing of data blocks is a common approach in peer-to-peer and Internet based distributed file systems as a way to simulate a virtual hard disk over a set of servers. We consider the case where a malicious adversary attempts to overload a server assuming that this adversary ―knows‖ how the underlying hashing scheme works. We overcome this problem by using Universal hashing a known theoretical solution. In this work we how to port such a complex hashing scheme in real implementations of Internet based file systems. In this respect our work also contributes to the well known problem of VOD (video on demand) over the Internet. The implemented system (IFS) supports cooperative caching and for concurrent read/write operations it supports Weak-Consistency. Our results suggest that Universal hashing based distributed file systems can be extremely efficient for driving Internet file systems and file systems for large clusters.

Keywords: Overcoming, Malicious Read, Write , Requests

Pages: 62 - 66 | DOI: 10.15224/978-1-63248-073-6-13

13. A COMPARATIVE ANALYSIS OF PERFORMANCE GAIN OF 7- NM FINFET OVER PLANER CMOS

Authors: JAMAL UDDIN AHMED , ASIF KHAN , SADMAN SHOUMIK KHAN , SARAH NAHAR CHOWDHURY

Abstract: FinFET has been contemplated as a seemly substitute for the conventional CMOS at the nano-scale regime owing to the projection for application in the integrated circuits fabrication due to its extraordinary properties like improved channel controllability, high ON/OFF current ratio and reduced short-channel effect. In this paper, circuit simulations of 7-nm FinFET and planer CMOS are comprehensively investigated showing a 34.92% and 28.79% increased drain current in 7-nm Fin-FET compared to the existing 22-nm and equivalent 7-nm planer CMOS respectively. A detailed simulation study evaluating the performance of the proposed design is presented exhibiting a 2X increase in drive strength with the increment of fins. Fin thickness of 2.725 nm along with a height of 10.9 nm has been used resulting in an 8X reduction in gate area which is the smallest 7-nm Fin-FET structure yet developed. The indiscriminate variations of the characteristics obtained in various simulations lead to a culminati

Keywords: FinFET, multi-gate FETs, 7-nm, nanoscale, HSpice

Pages: 67 - 71 | DOI: 10.15224/978-1-63248-073-6-14

14. ADAPTIVE CONTROL OF SHELL AND TUBE HEAT EXCHANGER

Authors: I.THIRUNAVUKKARASU , SATHEESH BABU.R , SHREESHA.C, V.I.GEORGE

Abstract: This paper deals with the temperature control of a shell and tube heat exchanger(STHE) using adaptive control. The parameters of the process are identified using Recursive least square algorithm. The control algorithm is based on the Linear Quadratic control method and the parameters of the controller are computed based on the pole placement method. 2DoF control structure is used for the controlling of process.

Keywords: Adaptive control, Shell and tube heat exchanger, Servo response

Pages: 72 - 76 | DOI: 10.15224/978-1-63248-073-6-15

15. ONTOLOGY MODEL DEVELOPMENT COMBINED WITH BAYESIAN NETWORK

Authors: IONIA VERITAWATI , ITO WASITO , T. BASARUDDIN

Abstract: Recently, development of methods in extracting knowledge from a text collection is still explored. In this work, the proposed approach utilize important words or key words that represent a domain of text. The key words may have relations among them and the relational keywords in the text domain can be organized become an ontology model as a domain knowledge. The proposed method for forming knowledge represented the text consists of three stages process. First, Vector Space Model (VSM) of key words from text is clustered using bottom-up approach and each clustered data is categorized to be an input of structure learning in a Bayesian network concept. The next stage, structure development of each clustered data using Markov Chain Monte Carlo (MCMC) method such that key words as nodes are related each other as in DAG (directed acyclic graph) form. The result of structure learning process of each cluster produces a clustered DAG. The same learning process is also applied to the original da

Keywords: bottom-up clustering, MCMC, Connector Node, Ontology

Pages: 77 - 81 | DOI: 10.15224/978-1-63248-073-6-16

16. EXPLORATION OF COVERT SCHEMES AND THEIR EMBODIMENTS IN HYBRID COVERT CHANNEL -DEEP INSIGHT INTO COVERT CHANNEL

Authors: ANJANK , JIBI ABRAHAM , SRINATH N K , VINAY V HEGDE

Abstract: Covert channels is a vital setup in the analyzing the strength of security in a network. Covert Channel is illegitimate channeling over the secured channel and establishes a malicious conversation. The trapdoor set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert schemes that enable to build robust covert channel over the network. From an attacker's perspective this will ameliorate by placingmultiple such trapdoors in different protocols in the rudimentary protocol stack. This leads to a unique scenario of “Hybrid Covert Channel", where different covert channel trapdoors exist at the same instance of time in same layer of protocol stack. For detection agents to detect suchevent is complicated due to lack of knowledge over the different covert schemes. Exploring all the clandestine schemes used in formation of Hybrid Covert Channel would assist in understanding the complete search space of

Keywords: Covert Channel, Subliminal Channel, Network Forensics, Kleptography, Trapdoors, Covert Schemes

Pages: 82 - 86 | DOI: 10.15224/978-1-63248-073-6-17

17. RTAEB: RELIABLE TRAFFIC AWARE ENERGY BALANCE ROUTING IN WIRELESS SENSOR NETWORKS

Authors: FATMA H. EL-FOULY , MOAWAD I. DESSOUKY , MOHAMED I. MAHMOUD , RABIE A. RAMADAN

Abstract: This paper proposes a Reliable Traffic Aware Energy Balance greedy Algorithm (RTAEB) to achieve both minimum energy consumption and balanced energy consumption among sensor nodes for Wireless Sensor Network (WSN) lifetime extension. In addition, data reliability is considered in our model where, the sensed data can reach the sink node in a more reliable way. Finally, buffer space is considered to reduce the packet loss and energy consumption due to the retransmission of the same packets. Through simulation, the performance of proposed algorithm is compared with the previous work such as EBRP, ACO, TADR, SEB, and CLR-Routing.

Keywords: WSNs, routing, energy balancing, reliability.

Pages: 87 - 91 | DOI: 10.15224/978-1-63248-073-6-18

18. AUTONOMOUS NAVIGATION OF NON-HOLONOMIC VEHICLES USING INTERVAL TYPE-2 FUZZY LOGIC SYSTEM AND NEURAL NETWORK IN SIMULATED ENVIRONMENT

Authors: N.SAMANVITA

Abstract: Orientation is required in the navigation applications in the outdoorslike horticulture, forestry, agriculture, civil or social works, industrial works, geo-studies, space works and other applications of unloading or loading of vehicles.The main aim of the research is to develop algorithm for autonomous navigation of non-holonomic vehicles using interval type-2 fuzzy logic system and neural networks in simulated environment using MATLAB. It was noticed that network configuration and training of neural network indicates that good training results could be achieved. From the findings of the analysis, it was observed that by adopting the fuzzy control improved by neural network, it can able to identify the nearest way of vehicle efficiently.For future work it can be extended for autonomous navigation of non-holonomic vehicles using artificial intelligence techniques in simulated environment using LABVIEW platform which can be applied to environmental applications.

Keywords: non-holonomic vehicles, interval type-2 fuzzy logic system, simulated environment, neural network, autonomous navigation, Foot print of uncertainty (FOU)

Pages: 92 - 97 | DOI: 10.15224/978-1-63248-073-6-19

19. TDOA/AOA HYBRID POSITION ESTIMATE SOLUTION USING NEWTON METHOD

Authors: JUNGKEUN OH , KYUNGHYUN LEE , KWANHO YOU

Abstract: The position determination method has been used widely in location based industry. Precise determination of a mobile position is one of the significant problems in geolocation. Among geolocation techniques, both time difference of arrival (TDOA) and angle of arrival (AOA) are the most widely used methods for estimation of mobile position. In this paper, TDOA/AOA hybrid position estimation formula is proposed to express a mobile position. This hybrid scheme improves the estimation performance by increasing reliable measurement data set. Also, we suggest Newton method based optimization algorithm to obtain a solution that minimizes determination error. Some simulations confirm that the proposed Newton method based optimization algorithm improves the accuracy for acquiring a mobile position estimate.

Keywords: position estimation, time difference of arrival, angle of arrival, Newton method, optimization, measurement error compensation

Pages: 98 - 101 | DOI: 10.15224/978-1-63248-073-6-20

20. CLASSIFICATION OF LASER INTERFEROMETER SEISMIC SIGNAL DATA BASED ON K-MEANS CLUSTERING

Authors: DONGSUN CHOI , EUNHWAN OH , KWANHO YOU , WOORAM LEE

Abstract: The mainly used devices to detect earthquakes are velocimeters and accelerometers. However, it is necessary to detect seismic waves accurately in micro-seismic wave measurement. A heterodyne laser interferometer is a high resolution detection device. Therefore, the laser interferometer is used as a seismometer. In micro-seismic signal analysis, it is required to discriminate earthquakes from explosions since micro-seismic waves have small magnitudes. To classify seismic waves, the body-wave amplitude ( p A ) and the surface-wave amplitude ( s A ) data are used. K-means clustering is implemented and then earthquake and explosion events are discriminated by using these data.

Keywords: Body-wave amplitude, K-means clustering, Laser Interferometer, Seismic signal, Surface-wave amplitude

Pages: 102 - 105 | DOI: 10.15224/978-1-63248-073-6-21

21. A COPYRIGHT MANAGEMENT SERVICE MODEL FOR NATIOANL RESEARCH REPORTS IN KOREA

Authors: JIHONG MIN , KWANGHO SONG , YOO-SUNG KIM

Abstract: A service model that manages the copyrights of national research reports in Korea is designed. When a new research document is submitted to the copyright management server, it is checked whether the document has similar expressions to the already published documents or not. If it has the plagiarized expressions, the service helps authors to prepare the reference list and also to attach the citation mark in proper locations of the new document. Only when the new document is free from the plagiarism suspicion, it can be registered as a copyright holding report. To download and view the registered reports, customers should register and sign on as member users. Only the registered users can download and see the encrypted documents through the dedicated document viewer. When the viewer opens a registered document, a log record is generated and transmitted to the server. After collecting all log records at the server, the copyright management service can analyze them also to mine usage patte

Keywords: copyright management, plagiarism detection, automatic citation-marking, log records, big-data analytics

Pages: 106 - 110 | DOI: 10.15224/978-1-63248-073-6-22

22. RECOMMENDING COMBINATIONS OF APPOINTMENT PLACES FROM HIVE BASED BIG DATA

Authors: YOO-SUNG KIM , BOHYUN KIM , MINSOO LEE

Abstract: Since the development of web, we can use various type data such as movie, music, and social network data. These data is very useful to make recommendation system. For this reason, several recommendation system studies used the web data to construct outstanding system. In this paper, we proposed a method to recommend combinations of appointment places based on web data. Our system generates ranking to extract best store, and use location data to recommend suitable store. By considering these two main features, the proposed system recommend best and suitable store to user to recommend combinations of appointment places. Our system provides a chance to design combinations of appointment places with highquality easily

Keywords: Combinations of appointment places, Hive, Recommendation system, Yelp

Pages: 111 - 115 | DOI: 10.15224/978-1-63248-073-6-23

23. SOLVING THE TRAVELING SALESMAN PROBLEM USING GENETIC ALGORITHMS WITH THE NEW EVALUATION FUNCTION

Authors: HAMID TABATABAEE , HOSIAN SALAMI , NAFISEH SEDAGHAT , NAGHMEH SHARIF

Abstract: Traveling salesman problem is of the known and classical problems at Research in Operations. Many scientific activities can be solved as traveling salesman problem. Existing methods for solving hard problems (such as the traveling salesman problem) consists of a large number of variables and constraints which reduces their practical efficiency in solving problems with the original size. In recent decades, the use of heuristic and meta-heuristic algorithms such as genetic algorithms is considered. Due to the simple structure of metaheuristic algorithms that have shown greater ability is more used by researchers in operational research. In this study, the improved genetic algorithm is used to solve TSP that the difference of it with the standard genetic algorithm is in the evaluation function. The new evaluation function is from a common evaluation function and a new idea.

Keywords: Travelling Salesman problem, genetic algorithms , problems of NP-Hard, NP-Complete, Hamiltonian cycle

Pages: 116 - 121 | DOI: 10.15224/978-1-63248-073-6-24

24. TO MEASURE THE IMPACTS ON FAULT INJECTION MODEL IN COMPONENT BASED SOFTWARE DEVELOPMENT

Authors: JYOTI SHARMA

Abstract: Component based software engineering (CBSE) is gaining substantial interest in the software engineering community. A lot of research efforts have been devoted to the reliability, fault tolerance and complexity of components in CBSE. Testing the software component is an important approach which guarantees and enhances the reliability of components and as the reliability factor is directly related to the complexity of the components in CBSE. So automatically the complexity of the software will get improved. Merely selection of less complex and reliable components is not sufficient but we have to select the optimal components for the software system including the factor of fault tolerance. This paper proposes a testing strategy for finding the complexity of components and also a modified approach of fault injection model is proposed.

Keywords: component testing;fault injection model;testing strategy

Pages: 122 - 125 | DOI: 10.15224/978-1-63248-073-6-25

25. ESTIMATING INTRINSIC PARAMETER OF CAMERA FROM A SINGLE IMAGE

Authors: MURALI SASTRY , GEETHA KIRAN A

Abstract: In this paper, an intrinsic parameter of camera from a single image is formulated. Compared to other techniques which use two or three orthogonal planes, parallelograms, rectangles, conic circles and balls, the proposed technique is easy to use and flexible. Calculation of the focal length using a single image is the main objective of this research work. A stick is employed as the calibration object to formulate the equations in order to compute the focal length. The arrangement of the calibration object to acquire the images adds more accuracy in computing the focal length of the camera. The length of the calibration object is the major cue in computing the focal length. A novel approach using polynomial regression is attempted in formulating the cubic polynomials based on the length of the calibration object. The results are tabulated and further used in formulating equation to compute the focal length of the camera. Experimental results are tabulated to show the accuracy of the prop

Keywords: Polynomial Regression, Focal length, Calibration Object, Cubic polynomials

Pages: 126 - 130 | DOI: 10.15224/978-1-63248-073-6-76

26. CRYPTIC MINING IN LIGHT OF ARTIFICIAL INTELLIGENC

Authors: ADITI THAKUR , KAJOL MAHESHWARI , SHALIGRAM PRAJAPAT

Abstract: Analysis of cipher text is intractable problem”, for which there is no fixed algorithm. For intelligent cryptic analysis there would be a need of cooperative effort of cryptanalyst and inference engine .The information of knowledge base will be useful for mining tasks such as information about the classification of cipher text based on encrypting algorithms, clustering of cipher text based on similarity, extracting association rules for identifying weaknesses of cryptic algorithms. This categorization will be useful for placing given cipher text into a specific category of difficulty level of cipher text-plain text conversion. This paper attempts to create a framework for AIenabled- Cryptanalysis system. The process depicted in the paper generalizes the idea for development of from scratch. The paper also presents useful system design diagrams for development of extended AI based Cryptic cipher analysis tool

Keywords: cipher text, cryptic analysis, encryption algorithm, Artificial Intelligence (AI)

Pages: 131 - 135 | DOI: 10.15224/978-1-63248-073-6-77

27. MGA APPROACH FOR OPTIMIZATION OF DISTRIBUTED GENERATION PARAMETERS IN A POWER SYSTEM NETWORK

Authors: C.NAYANATARA , D.SIVAKUMAR , J.BASKARAN

Abstract: deploying a well modelled computer network will guaranty effective management. Planning, designing, scalability, administration and management of a computer network on different scales to proffer effectiveness of data flow, bandwidth management and network security is dependent on a designer’s choice of model. Different network models exist and application of a particular model or combination of these models depend on different factors

Keywords: Customer Benefit, Distributed Generation, Micro Genetic Algorithm, Location, Size

Pages: 144 - 148 | DOI: 10.15224/978-1-63248-073-6-79

28. TERAHERTZ IMAGING AND BROADBAND WIRELESS COMMUNICATION USING PLASMA OSCILLATIONS IN NANOMETER FIELD EFFECT TRANSISTORS

Authors: W.KNAP

Abstract: An overview of recent results concerning THz detection related to plasma nonlinearities in nanometer field effect transistors is presented. In particular nonlinearity and dynamic range of these detectors are discussed. We present also results on THz detection by Graphene field effect transistors. As a conclusion, we will show one of the first real world application of the FET THz detectors: a demonstrator of the imager developed for fast postal security imaging and wireless communication at carrier frequency above 300GHz.

Keywords: Terahertz, Imaging, Broadband , Wireless Communication

Pages: 149 - 152 | DOI: 10.15224/978-1-63248-073-6-82

29. PERFORMANCE EVALUATION AT DIFFERENT BIT RATES OF STAR, TREE AND MESH TOPOLOGY USING RAMAN-EDFA HYBRID OPTICAL AMPLIFIER

Authors: RAJPREET SINGH , SANJEEV DEWRA

Abstract: Performance at different bit rates of phase modulated signals for star, tree and mesh optical network topologies is evaluated using Raman-EDFA hybrid optical amplifier. Consideration of BER is made to investigate the number of users supported. Evaluation of the number of users supported is carried out at -40dBm input signal power. Hybrid Raman-EDFA amplifier is placed as a post amplifier. In all these three topologies, the signals are generated at 90o phase deviation. The channel spacing is taken as 0.1 THz with 1MHz line width. Mesh topology supports more number of users than other topologies at 10Gbps and 20 Gbps. At the bit rate of 10 Gbps within acceptable BER range, Mesh topology supports 8 number of users whereas star topology supports 5 users and tree topology supports 4 users. At 20Gbps within acceptable BER range, Mesh topology supports 6 users whereas tree topology supports 4 users and star topology supports 2 users. No topology is able to support any user at 30 Gbps.

Keywords: hybrid optical amplifier, mesh topology, star topology, tree topology.

Pages: 28 - 31 | DOI: 10.15224/978-1-63248-073-6-06

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering