Loading...

Proceedings of

6th International Conference on Advances in Computing, Control and Networking ACCN 2017

Date
26-Feb-2017
Location
Bangkok , Thailand
Authors
105
ISBN
978-1-63248-117-7

36 Articles Published

1. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR OVERALL FAIRNESS RATIO ACHIEVABLE IN UBICOMP MANETS USING LOCATION-AWARE TRANSMISSION.

Authors: NAWAZ MOHAMUDALLY , M. KALEEM GALAMALI

Abstract: The fields of location-tracking, ubicomp functionalities and MANET transmission strategies are prone to quite a lot of productive research [37-73]. It still remains unrefutable that the engineering portion of modelling in ubicomp to scrutinise predictability properties is at its inception phases. The sub-portion of energy management is distinctively important since in present technology, battery power is still considered constrained. Formerly, an investigation was conducted to quantify and model the Overall Fairness Ratio (OFR) of energy consumption recordable for CBRs for node densities of 7 until 56. The corresponding model was observed to be a combination of exponentially and linearly increasing tendencies. In this paper, the next milestone of investigation is expressed as: “What are the trends of variation observable within each parameter of the equations of curves obtained for metric OFR [21] over varying node densities?”. Studying the demeanor of constituents of applicable models

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, OFR- Overall Fairness Rati

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-117-7-01

2. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR MAXIMUM ENERGY CONSUMPTION RATIO ACHIEVABLE IN UBICOMP MANETS USING LOCATION-AWARE TRANSMISSION.

Authors: NAWAZ MOHAMUDALLY

Abstract: Location-tracking, ubicomp functionalities and MANET transmission strategies are subject to quite promising research [36-72]. It still remains a fact that the area of modelling in ubicomp to assess predictability features is at its beginning stages. The sub-field of energy management is especially important since in present technology level, battery power is still considered constrained. Previously, a research was carried out to quantify and model the maximum ratio of energy consumption (Max_R) recordable for a CBR gauged against the energy consumed by the sender, for node densities of 7 until 56. The corresponding model was observed to be linear previous to the peak value and decreasing exponential as from the peak value onwards. In this paper, the next milestone of probing is put forward as: “What are the trends of variation observable within each parameter of the equations of curves obtained for metric Max_R [20] over varying node densities?”. Studying the behaviour of components of

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, ECR- Energy Consumption Ratio, Max_R- Maximum Ratio.

Pages: 6 - 10 | DOI: 10.15224/978-1-63248-117-7-02

3. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR MINIMUM ENERGY CONSUMPTION RATIO ACHIEVABLE IN UBICOMP MANETS USING LOCATION-AWARE TRANSMISSION.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Research concerning location-tracking, ubicomp functionalities and MANET transmission strategies [35-71] are yielding commendable output. Nevertheless, the area of modelling in ubicomp to assess predictability features, is still at starting points. One particular sub-area is energy considerations in ubicomp coupled by present hardware level of constrained battery power. A prior research was carried out to quantify and model the minimum ratio of energy consumption (Min_R) recordable for a CBR gauged against the energy consumed by the sender, for node densities of 7 until 56. The corresponding model was observed to be exponential.In this paper, the next level of investigation is laid as as: “What are the trends of variation observable within each parameter of the equations of curves obtained for metric Min_R [19] over varying node densities?” The need for studying the behaviour of components of an applicable model for metric Min_R and accordingly model the behaviour of each component mat

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, ECR- Energy Consumption Ratio, Min_R- Minimum Ratio.

Pages: 11 - 14 | DOI: 10.15224/978-1-63248-117-7-03

4. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR MINIMUM ENERGY CONSUMPTION RATIO ACHIEVABLE IN UBICOMP MANETS USING LOCATION-AWARE TRANSMISSION.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Research concerning location-tracking, ubicomp functionalities and MANET transmission strategies [35-71] are yielding commendable output. Nevertheless, the area of modelling in ubicomp to assess predictability features, is still at starting points. One particular sub-area is energy considerations in ubicomp coupled by present hardware level of constrained battery power. A prior research was carried out to quantify and model the minimum ratio of energy consumption (Min_R) recordable for a CBR gauged against the energy consumed by the sender, for node densities of 7 until 56. The corresponding model was observed to be exponential.In this paper, the next level of investigation is laid as as: “What are the trends of variation observable within each parameter of the equations of curves obtained for metric Min_R [19] over varying node densities?” The need for studying the behaviour of components of an applicable model for metric Min_R and accordingly model the behaviour of each component mat

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, ECR- Energy Consumption Ratio, Min_R- Minimum Ratio.

Pages: 11 - 14 | DOI: 10.15224/978-1-63248-117-7-03

5. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR ENERGY CONSUMPTION RATIO ACHIEVABLE IN UBICOMP MANET USING LOCATION-AWARE TRANSMISSION.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: A good future lies ahead as concerns research related to location-tracking, ubicomp functionalities and MANET transmission strategies [34-70]. Despite all present level progresses, the area of modelling in ubicomp to assess predictability features is being tackled by few researches and is hence still considered in its embryonic stages. One particular sub-area is energy considerations in ubicomp coupled by the fact that battery power is still considered constrained. A previous research was carried out to quantify and model the ratio of energy consumption for each node over the energy consumed by the sender, for node densities of 7 until 56. The corresponding model was observed to be linear previous to the peak value and asymptotically decreasing exponential as from the peak value onwards. In this paper, the next level of research investigation is put forward as: “What are the trends of variation observable within each parameter of the equations of curves obtained for metric ECR [18] ove

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, ECR- Energy Consumption Ratio

Pages: 15 - 20 | DOI: 10.15224/978-1-63248-117-7-04

6. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR OVERALL NODES EXTRA ENERGY SAVINGS ACHIEVABLE IN MANET AGAINST DIRECT NODE-TO-NODE LOCATION-AWARE TRANSMISSION.

Authors: NAWAZ MOHAMUDALLY , M. KALEEM GALAMALI

Abstract: Quite extensive research is well ongoing concerning enhancement of Location-Tracking, functionalities and MANET transmission strategies in ubicomp environment [33-69]. Despite all these progress, the area of modelling in ubicomp to assess predictability features, is still in its embryonic stages. One particular sub-area is energy considerations in ubicomp. This is especially important since battery power of present date devices is still considered constrained. A previous research [17] was carried out to quantify and model the extra energy achievable in MANETs against direct node-to-node transmission under different sets of node densities in a ubicomp environment. The corresponding model was also observed to be following a normal distribution just as in two previous research [31, 32] for metric OES and SLNTNES but with different parameter values. In this paper, the next level of question to be investigated is legitimately put forward as: “What are the trends of variation observable with

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, ES- Energy Savings, SES- Sender ES, OES-Overall ES, SLNTNES- Sender Less Node-to-Node ES, OLNTNES- Overall Less Node-to- Node ES, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate

Pages: 21 - 25 | DOI: 10.15224/978-1-63248-117-7-05

7. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR SENDER NODE EXTRA ENERGY SAVINGS ACHIEVABLE IN MANET AGAINST DIRECT NODE-TO-NODE LOCATION-AWARE TRANSMISSION.

Authors: M. KALEEM GALAMALI

Abstract: Quite extensive research is ongoing concerning enhancement of Location-Tracking, functionalities and MANET transmission strategies in ubicomp environment [32-68]. Nonetheless, the area of modelling in ubicomp for sustaining behaviour predictability is still in its embryonic stages. One particular sub-area is energy considerations in ubicomp since as of present date devices battery power is still considered constrained. A previous research [16] was carried out to quantify and model the extra energy savings achievable in MANETs against direct node-to-node transmission under different sets of node densities in a ubicomp environment. The corresponding model was put forward as following a normal distribution just as in a previous research [31] for metric OES but with different parameter values. In this paper, the next level of question to be investigated is legitimately put forward as: “What are the trends of variation observable within each parameter of the equation of normal curve obtaine

Keywords: Ubicomp- Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, ES- Energy Savings, SES- Sender ES, OES-Overall ES, SLNTNES- Sender Less Node-to-Node ES, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate.

Pages: 26 - 29 | DOI: 10.15224/978-1-63248-117-7-06

8. TREND ANALYSES OF PARAMETERS OF EQUATIONS FOR OVERALL NODE ENERGY SAVINGS ACHIEVABLE IN UBICOMP MANETS USING LOCATION-AWARE TRANSMISSION.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Location-Tracking and corresponding applications based on it together with modern functionalities are being developed in the field of ubicomp [31-67]. MANET transmission strategies also remain subject to research. The field of ubicomp, however, suffers from an underdeveloped area of metric development, analysis and modelling for predictability purposes compared to the current level of development in the field of software engineering. Such information in ubicomp will serve towards better gearing of future investments. An area of concern here is energy considerations in ubicomp since devices still suffer from constrained battery availability. A previous research [15] was carried out to assess how much energy savings can be achieved by overall nodes in location-aware MANET transmission and the corresponding trend was put forward as following a normal distribution model. In this paper, the next set of question to be investigated is legitimately put forward as: “What are the trends of vari

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, ES- Energy Savings, OES- Overall ES, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate.

Pages: 30 - 33 | DOI: 10.15224/978-1-63248-117-7-07

9. VNAWAZ MOHAMUDALLY

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Location-Tracking and correspondingly applications on it along with new functionalities are being developed in the field of ubicomp [30-66]. MANET transmission strategies are also subject to research. An area missing in the field of ubicomp is the software engineering approaches of metric development, analysis and modelling for predictability purposes and better gearing of future research investments. The particular area of concern here is energy considerations in ubicomp. A previous research [14] was carried out to assess how much energy savings can be achieved by a sender node in location-aware MANET transmission and the corresponding model was put forward as exponential. In this paper, the next set of question investigated is legitimately put forward as: “What are the trends of variation observable within each parameter of the exponential equation obtained for metric SES [14] over varying node densities?” The need for studying the behaviour of components of an applicable model and s

Keywords: Ubiquitous Computing, MAUC- Mobile and Ubiquitous Computing, ES- Energy Savings, SES- Sender ES, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate

Pages: 34 - 38 | DOI: 10.15224/978-1-63248-117-7-08

10. ROBUST DIGITAL WATERMARKING TECHNIQUES BASED ON DCT AND DWT ALGORITHMS.

Authors: MOHAMMED A. AL- JARRAH

Abstract: copyright protection of digital media has become a major concern for owners of digital media such as images, videos, and audios. Digital watermarking is a process of hiding an image or text on an image to provide evidence of its authenticity. In this paper, we developed five different methods. We considered the transform of an image using DCT, DWT and DCT with DWT formats could affect the hidden watermark in a way or another. In addition, we considered adding additional attacks like crop image, salt and pepper noise, Gaussian noise and filter. The schemes we are providing here are resilient to these types of attacks and is novel in this scenario.

Keywords: Digital image watermarking, image copyright protection, frequency domain watermarking, discrete wavelet transform (DWT), and discrete cosine transform (DCT).

Pages: 39 - 43 | DOI: 10.15224/978-1-63248-117-7-09

11. A REVIEW OF BLUETOOTH AND NFC FOR FINANCIAL APPLICATIONS

Authors: K. OUAHADA , A.R. NDJIONGUE , Z. MNGOMEZULU

Abstract: Bluetooth and near field communications (NFC) are two of the most recently emerging wireless technologies [1] [2], largely because of the integral role they play in the Internet of everything (IoE). In this paper, the security aspect is evaluated for these two wireless technologies for potential applications in financial systems. Their frame size is also analyzed. This is done by reviewing their characteristics based on the state of the art and on the standards governing their deployment. It is found that Bluetooth has good security mechanisms when compared to NFC, which requires developers to implement their own security features at application level; however, NFC’s short range and its requirement for intentional communication between devices makes it inherently secure. It is also found that NFC has a larger message size, however, the classic Bluetooth message size is not that far below that of NFC data exchange format (NDEF) short records (SR) message size.

Keywords: NFC; Bluetooth; Security; Message size; Internet of Everything

Pages: 48 - 51 | DOI: 10.15224/978-1-63248-117-7-11

12. DYNAMIC AND DECENTRALIZED LOAD BALANCING APPROACH IN SMALL-SCALE DISTRIBUTED SYSTEMS

Authors: R.C. DHARMIK , S.R. SATHE

Abstract: To improve the throughput of small-scale distributed systems, workloads have to be evenly distributed among all the computing nodes of distributed systems. As any distributed application, can undergo critical performance issues due to workload imbalances on small scale distributed system and heterogeneity of resources. The main goal to prevent, if possible, the condition where some processors are overloaded with set of jobs while other processors are lightly loaded, moderately loaded, heavily loaded and some may be idle processors. This is due to the characteristics of distributed systems and complex nature of the users job. In this paper we have proposed real-time prototype model for small-scale distributed systems. Dynamic and decentralized load balancing algorithm has been implemented to evenly distribution of jobs among all the computing nodes of small-scale distributed systems through which to minimize execution time, response time, communication latency and maximize throughput, C

Keywords: Small-scale distributed systems, Load Balancing, workload, execution time, response time, CPU utilization, Throughput, Communication latency.

Pages: 57 - 61 | DOI: 10.15224/978-1-63248-117-7-13

13. A STUDY ON SECURITY ISSUES CAUSED BY AD LIBRARIES IN SMARTPHONE APPS

Authors: MENG-YUAN CHANG , MING-YANG SU , YING-TANG HSU

Abstract: Many app developers would cooperate with ad networks by adding a procedural code (called ad library or ad lib) from ad providers into the app. The free apps will help them get into the market, and the ad will increase their income. To make ad more targeted at the needs of individual users, ad lib must collect personal information, including age, gender, income and something even more private, the habit of network use, and the location of users. It would automatically connect itself with the ad server to send out the personal information while receiving the ad reply from the ad server. Aside from pictures, it may include JavaScript for malicious acts and require the connection between the app and the third-party server to download malicious apps and automatically install and run them under the background. To make more profits from ads, many app developers embed more than one ad libs into an app, i.e., connecting to several ad providers, so as to make the security problem ever worse. Usi

Keywords: Smartphone, Ad SDK (ad lib), Ad Server, Ad Request, Ad Reply, Privacy, Permission, Sensitive Function

Pages: 62 - 65 | DOI: 10.15224/978-1-63248-117-7-14

14. WEBSITE FORGERY/FALSIFICATION DETECTION TECHNIQUE USING HYPERLINK INFORMATION

Authors: CHUNG-HYUN LIM , GEUK LEE , HYO-JUNG AHN , JI-HO CHO

Abstract: n this paper, we propose a forgery/falsification detection technique of an web site using hyperlink information in the web site. The system crawls all hyperlink information of the web site when a user accesses to the suspicious web site that has the financial information stealing purpose. The captured multiple hyperlink information is compared with those of normal web site hyperlinks information to detect forgery/falsification. The proposed system calculates distance of the normal site hyperlink strings with captured one using Levenshtein distance algorithm to detect whether the site is normal or not. If it is determined as normal, analysis procedure is finished. But if it is determined as abnormal, a warning message is sent to the user to prevent additional financial information spill and further accidents from the forgery/falsified web site.

Keywords: Website Forgery/Falsification Detection, Pharming, Hyperlink.

Pages: 66 - 70 | DOI: 10.15224/978-1-63248-117-7-15

15. 2RC ADC FOR MASSIVE ANALOG SIGNAL ACQUISITION

Authors: JOSE M. QUERO , PAULA ROLDAN

Abstract: There are applications that demand the simultaneous acquisition of a very large number of analog signals. This is the case when digital electronics circuits are connected to neural systems at very low level. In this paper, an ADC implemented with only two external resistors and one capacitor is presented. A description of this circuit is provided, including a detailed mathematical analysis of the behavior and its limitations. A circuit design procedure is applied to a real case using discrete components, and it is validated via simulation to demonstrate its performance.

Keywords: ADC, biological interfaces, FPGA, programmable devices.

Pages: 71 - 75 | DOI: 10.15224/978-1-63248-117-7-16

16. ANALYSIS OF POWER CONSUMPTION ON COMMUNICATION METHODS FOR THE EMERGENCY DEPLOYMENT SYSTEM

Authors: JAEMIN HONG , KYUJIN KIM , SHINHEON KIM , WENJUN ZHU

Abstract: Energy consumption phenomena of IOT based emergency deployment system which used in general hospitals and other institutions are analyzed. The system can treat real-time emergency messages between servers and mobile clients by using multiple communication methods. Especially in the hospital environment, in order to avoid patient anxiety caused by emergency situations, the system informs sends the emergency situation to the person who is to response the situation by using one-way broadcast communications. After that a two-way communications and indoor positioning methods are used to control and record the response processes.

Keywords: Bluetooth LE, Wi-Fi, Power consumption

Pages: 76 - 79 | DOI: 10.15224/978-1-63248-117-7-17

17. ANALYSIS OF LEVEL SHIFTED MODULATION STRATEGIES APPLIED TO CASCADED H-BRIDGE MULTI-LEVEL INVERTER FED INDUCTION MOTOR DRIVE

Authors: E. SREENU , P. SATISH KUMAR , RAVI KUMAR BHUKYA

Abstract: This paper presents various level shifted multi carrier PWM techniques such as PD,POD and APOD for a cascaded H-Bridge multi level inverter fed induction motor drives. The performance analysis of these modulation strategies are analyzed by apply for five level, seven level, nine level and eleven level inverter. The performance analysis of cascaded H-Bridge interms of line voltage, stator current, speed, torque and total harmonic distortion. The results are depicting that PD-PWM is more effective among the three proposed PWM techniques. The proposed technique has been simulated using MATLAB/SIMULINK software. These Level shifted PWM techniques can be applied to N-level cascaded Inverter also.

Keywords: Cascaded multi-level inverter, Level shifted multi carrier PWM, Variable speed control of induction motor, THD

Pages: 80 - 84 | DOI: 10.15224/978-1-63248-117-7-18

18. A NEW GENERALIZED ASYMMETRICAL CASCADE MULTILEVEL INVERTER TOPOLOGY WITH REDUCED POWER ELECTRONIC SWITCHES AND DC SOURCES

Authors: P. SATISH KUMAR , G. SRIDHAR , M. SUSHAMA

Abstract: In the past few years the demand for the achievements in development of multilevel inverter topologies has been increasing a lot. Recently presented topologies accomplish higher number output voltage levels with few number of switches, DC voltage sources, and reduced voltage stress across switches, with fewer losses as compared with conventional topologies. Minimization of switches and dc voltage sources reduces complexity, cost size and improves the overall performance. These benefits are proposed in this paper with a new topology of asymmetrical cascaded multilevel inverter. This developed structure provides reduced number of controlled switches, DC sources, as compared with conventional and presented topologies in the literature so far. The proposed asymmetrical topology generates seven voltage levels with eight switches only. Furthermore reduction in voltage stress across the switches can be attained. Phase Opposition Disposition (POD) is adopted for generating switching pulses. Th

Keywords: Asymmetrical multilevel inverter, reduction of Switches, dc voltage sources, POD.

Pages: 85 - 89 | DOI: 10.15224/978-1-63248-117-7-19

19. SMART IT CONVERGENCE FRAMEWORK IN IOT ENVIRONMENT

Authors: CHEONG GHIL KIM , HYEYOUNG KIM

Abstract: In this paper, we have presented a framework design method for content production using mobile terminals and sensors based on IoT environment. Also, this paper includes the prototype framework applying the proposed techniques.

Keywords: IoT, framework, convergence, smart IT, prototype

Pages: 90 - 91 | DOI: 10.15224/978-1-63248-117-7-20

20. COMPARATIVE STUDY OF WIRELESS NETWORK TECHNOLOGY FOR AVIONIC SENSOR-ACTUATOR NETWORKS INDUSTRIAL WIELESS COMMUNICATION TECHNOLOGY FOR AVIONIC SYSTEMS

Authors: DONG-SEONG KIM , DA-HYE KIM , JAE-MIN LEE , SEUNG-PYO AHN

Abstract: This paper compares the performance of wireless communication technologies to replace the wired networks by wireless networks on avionic sensor-actuator networks communication. Due to the drawbacks of the wired network, such as complexity, weight, maintenance cost and scalability, it leads to the high data rate and network traffic demands of avionics systems. Therefore, in WAIC(Wireless Avionics Intra-Communication) system suggested by ITU(International Telecommunication Union), based on environment of avionics system and requirements of a wired network, wireless network structures are defined to solve the problems of wired networks. In this paper, we consider features, advantages and disadvantages of wireless communication technologies which can be used for wireless avionics network, and we propose suitable wireless communication technology candidates for wireless avionics sensor-actuator networks in WAIC environments.

Keywords: Wireless networks, Avionic systems, High reliability, Real-time network, WAIC

Pages: 92 - 96 | DOI: 10.15224/978-1-63248-117-7-21

21. DESIGN AND IMPLEMENTATION OF MIL-STD-1553B RT SUBSYSTEM

Authors: CHANG-HOON CHOI , DONG-SEONG KIM , SEUNG-HAN KIM , JAE-MIN LEE

Abstract: In this paper, the MIL-STD-1553B RT(Remote Terminal) subsystem based on FPGA and IP Core was implemented. Proposed system integrate CPU, ASIC, and peripheral circuits of the MIL-STD-1553B system on one chip. Through this, scalability of the MIL-STD-1553B system can be enhanced. For verifying proposed FPGA based the MIL-STD-1553B system, simulation environment was constructed with the MIL-STD-1553B tester and test software for identifying electrical characteristics and data communication functions. Simulation results show that proposed system can be interfaced with the MIL-STD-1553B data bus and advantageous in manufacturing cost reduction because of its scalability.

Keywords: MIL-STD-1553B, FPGA, IP Core, Real-time System

Pages: 97 - 100 | DOI: 10.15224/978-1-63248-117-7-22

22. DESIGN AND IMPLEMENTATION OF NAVAL COMBAT SYSTEM USING VIRTUALIZATION TECHNOLOGY

Authors: DONG-SEONG KIM

Abstract: This paper proposes a virtualization environment for a naval combat system. Generally, the naval combat system is composed of numinous input/output sensors, high-performance engines and devices for electronic warfare, guidance/reconnaissance. The previous technique, which is used distributed naval combat system, has a weakness that has a lack of end-to-end delay time, packet delay time, and utilization. To solve these problems, this paper proposes virtualization environment on naval combat system. Simulation results show that an availability of increased performance in naval system in terms of end-to-end delay time, packet delay time, and utilization.

Keywords: Naval Combat System, Virtual Machine, Virtualization Technology, Performance Evaluation.

Pages: 101 - 104 | DOI: 10.15224/978-1-63248-117-7-39

23. MULTIAGENT-BASED AUTONOMIC SERVICE ORGANIZATION SCHEME FOR THE INTERNET OF THINGS

Authors: HIDEYUKI TAKAHASHI , TAKUMI KATO , TETSUO KINOSHITA

Abstract: As a massive number of devices are becoming part of the Internet, it is highly difficult to organize IoT devices as a system to provide desired services in our lives. It is difficult because the IoT devices are heterogeneous, and the situation often changes overtime which requires the complicated reconfigurations of IoT systems. In this paper, we propose multiagent-based autonomic service organization scheme for IoT systems, which provides IoT devices with the functionality of task-oriented and resilient service provisioning in IoT systems by its capability of agent-based IoT device organization/re-organization. As a proof of concept, we have implemented logistics application using simplified robots using the proposed scheme and conducted logistics experiments.

Keywords: Agent, Organization, Internet of Things (IoT), Autonomous Logistics.

Pages: 109 - 113 | DOI: 10.15224/978-1-63248-117-7-47

24. DESIGN AND PERFORMANCE COMPARISON OF 7-LEVEL DIODE CLAMPED MULTILEVEL INVERTER FOR MODIFIED SVPWM TECHNIQUES

Authors: P. SATISH KUMAR , M. SUSHAMA , CH. LOKESHWAR REDDY

Abstract: In this paper, a 7-level Diode Clamped Multilevel Inverter (DCMLI) is simulated with three different carrier PWM techniques. Here, Carrier based Sinusoidal Pulse Width Modulation (SPWM), Third Harmonic Injected Pulse Width Modulation (THIPWM) and Modified Carrier-Based Space Vector Pulse Width Modulation (SVPWM) are used as modulation strategies. These modulation strategies include Phase Disposition technique (PD), Phase Opposition Disposition technique (POD), and Alternate Phase Opposition Disposition technique (APOD). In all the modulation strategies triangular carrier and trapezoidal triangular carrier signals are compared with reference signal and control pulses are generated. The detailed analysis of the results has been presented and studied in terms of fundamental component of output voltage and THD.

Keywords: DCMLI, PDSVPWM, PODSVPWM, APODSVPWM.

Pages: 114 - 118 | DOI: 10.15224/978-1-63248-117-7-48

25. DETECTION TIME REDUCTION OF MULTIPLE TRANSMISSION ROUTES SATISFYING REQUIRED THROUGHPUT IN WIRELESS MULTIHOP NETWORKS

Authors: HIROAKI HIGAKI , YUKI KUBO

Abstract: In wireless multihop networks, transmission capacity of each wireless node is relatively low and wireless signal transmissions of neighbor wireless nodes might interfere each other. Thus, it is difficult for a wireless multihop transmission route to provide required throughput to a network application. The authors have proposed a method to provide required throughput by combination of multiple wireless multihop transmission routes with joins and branches based on Ford-Fulkerson algorithm for maximum flow calculation in wired networks. Here, by using capacities of wireless nodes and flows along wireless links in wireless multihop networks, flow increasing wireless multihop routes are searched and detected until the required throughput can be provided. However, there are no cut-off conditions of search for flow increasing wireless multihop transmission routes, longer calculation time cannot be avoided. This paper proposes the cut-off conditions based on the current assignment of flow in

Keywords: Wireless Multihop Networks, Throughput Requirement, Multiple Route Detection, Maximum Flow Problem

Pages: 119 - 122 | DOI: 10.15224/978-1-63248-117-7-49

26. ELGAMAL KEY EXCHANGE USING TRIPLE DECOMPOSITION PROBLEM

Authors: BHASKAR BISWAS , SAIBAL K. PAL , VAIBHAV GUPTA

Abstract: BHASKAR BISWASA new key agreement scheme based on elgamal and triple decomposition problem over non commutative platforms is presented. An understanding of the new scheme over braid groups is provided and the strengths of it over an earlier scheme that rely on a similar system based on other decomposition problems are discussed. The new scheme provides better security over earlier schemes on non-commutative platforms by countering the linear algebra and length based attacks.

Keywords: Key exchange, Elgamal, Triple decomposition, Braid, Non-commutative, Linear algebra, cryptography

Pages: 123 - 127 | DOI: 10.15224/978-1-63248-117-7-50

27. COMMUNITY DETECTION USING CENTRAL FORCE OPTIMIZATION (CFO)

Authors: BHASKAR BISWAS , ANUPAM BISWAS , GOVIND AGARWAL , SANTOSH KUMAR CHOURASIA , SIDDHARTHA K ARJARIA

Abstract: Community structure is believed to be one of the notable features of complex networks representing real complicated systems. Very often, uncovering community structures in networks can be regarded as an optimization problem, thus, many evolutionary algorithms based approaches have been put forward. . In this paper Central Force Optimization (CFO), physics based optimization, and its variants are used to detect communities. CFO is deterministic in nature, unlike the most widely used meta-heuristics. However, CFO is not free from the problem of premature convergence. Therefore the variants used Adaptive CFO (ACFO) and Multi-Start CFO (MCFO) are used in enhancing the convergence.

Keywords: Community Detection, Physics Inspired Optimization, CF, Social Network Analysis.

Pages: 128 - 132 | DOI: 10.15224/978-1-63248-117-7-51

28. QUANTUM ELGAMAL CRYPTOSYSTEM

Authors: K.K. SHUKLA , BHASKAR BISWAS , VAIBHAV GUPTA , ADITYA AGRAWAL

Abstract: Public key cryptography is extensively used for encryption, signing contracts and secure exchanges over the unreliable network. The findings of Shor in 1994, of a powerful algorithm which was based on quantum mechanics for computing discrete logarithms and factoring large integers sabotaged the security presumptions upon which the currently used public key cryptographic protocols are based, like ElGamal, RSA and ECC. However, few cryptosystems, known as post quantum cryptosystems, while not currently in wide use are considered to be resistant to such attacks. In this paper, a quantum version of ElGamal Cryptosystem is proposed whose security relies on the commutative rotation transformations and measurements in computational basis of qubits. An understanding of the new scheme over the quantum channels is provided. The proposed cryptosystem allows the party to send messages in the form of qubits over a quantum channel. Also the proposed protocol provides an opportunity for two parties t

Keywords: Quantum, elgamal, shor, post quantum, commutative rotation, qubits, cryptosystem.

Pages: 133 - 137 | DOI: 10.15224/978-1-63248-117-7-52

29. FEASIBILITY ANALYSIS OF VIRTUALIZATION SCHEME FOR DISTRIBUTED COMBAT SYSTEMS

Authors: DONG-SEONG KIM , JIN-YONG IM , SUNG-HUN KIM

Abstract: This paper investigates an overall performance of virtualization schemes for a distributed combat system. The analyzed results can be used to enhance design approach for a naval combat system virtualization environment. An integrated ship computing environment for distributed combat systems needs a seamless operation environment. In such a case, hardware resource is constructed considering over load when naval combat system is constituted. Virtualization environment construction is tried for solving problems such as assets overinvestments, etc. However, previous researches focus on virtualization structure research, without what is a suitable virtualization scheme for naval combat systems. Therefore, this paper evaluates available functions and performance through message transmission in a Data Distributed Service (DDS) environment. Experimental results show that performance of each virtualization scheme messages response time.

Keywords: Distributed Combat Systems, Naval Combat System, Integrated Ship Computing Environment, Virtualization, Data Distribution Ser

Pages: 138 - 141 | DOI: 10.15224/978-1-63248-117-7-53

30. RF AND NOISE PERFORMANCE EXPLORATION OF DOUBLE GATE FINFET

Authors: K. P. PRADHAN , P. K SAHU

Abstract: Double Gate FinFET devices are suitable for nano electronic circuits due to better scalability, higher on-current (Ion), improved Sub-threshold Slope (SS) and undoped body (no random dopant fluctuation). Body thickness (TSi) increases the gate control over the channel resulting in reduced short channel effects (SCEs). Thin Tsi increases the quantum confinement of charge, resulting increased threshold-voltage (Vth), and hence, reduced performance. In this work, we have varied the process parameters like channel length (Lg) in presence of noise and analyzed various parameters. Significant variation in the noise spectral density has been observed, which is related to the random occurrence of excess Lorentzian components (1/f2-like nature) associated with generation–recombination (GR) noise.

Keywords: Double Gate FinFET, Sub-threshold Slope (SS), short channel effects (SCEs), Quantum confinement, noise spectral density.

Pages: 142 - 144 | DOI: 10.15224/978-1-63248-117-7-54

31. DESIGN AND DEVELOPMENT OF TIME DONATION APPLICATION FUNATION APPLICATION

Authors: EUNJU PARK , HANKYU LIM , HYEONU KIM , JIAMIN MA , SEONGHUN JEONG , YERIN JEONG

Abstract: With the popularization of smart phones, various applications are being developed for information, social, psychological, functional, and entertainment purposes. Furthermore, mobile donation platforms are increasing and various donation applications are appearing. In line with this trend, we designed and developed a donation app that allows users to donate time without financial burden. With the donation application developed in this study, users can donate their time through the one-minute advertisement view and donate their accumulated money to the donation organizations and programs selected by the user. In addition, we have designed a comprehensive funation application by adding comprehensive information and selling functions for donation products sold by various organizations.

Keywords: Donation Application, Web Application, Funation, App Inventor, Web, Mobile Application

Pages: 145 - 149 | DOI: 10.15224/978-1-63248-117-7-55

32. LOAD BALANCING SCHEME FOR MIGRATION IN NAVAL COMBAT SYSTEM

Authors: DONG-SEONG KIM , HAK-HUI CHOI , HONG-KEU JO

Abstract: This paper proposes load balancing using live migration in a naval combat system on virtualization environment. When designing virtualization cluster for naval combat system, irregular load by the configuration node degrades performances. To solve this problem, this paper presents an algorithm for VM(Virtual Machine) which will be transferred in over loaded host, and improve stability and performance in the naval combat system through operate load balancing technology. Simulation results show that the proposed algorithm enhances the load distribution performance of the cluster.

Keywords: Naval combat system, Virtualzation, Virtual machine, Live migration, Load Balancing

Pages: 150 - 153 | DOI: 10.15224/978-1-63248-117-7-56

33. MOTION PREDICTION IN ROCK SCISSOR PAPER GAME BASED ON MACHINE LEARNING

Authors: DONG RYEOL SHIN , EARL KIM , JANG YEOL LEE , JUN HEON KIM , KEE HYUN CHOI

Abstract: The main aim of this system is to predict and analyze gesture pattern from a user based on machine learning. The system is adopted in the rock-paper-scissors game which is suggested as always win at the game by predicting user gesture. Quantization and processing of user gesture from EMG sensor are implemented to generate training data in order that disciplining machine. As suggested procedure, an enormous amount of user gesture data will be collected and training model will be implemented with machine learning. By adopting the implemented system into the game, the research will verify that it is feasible to predict user gesture during playing game. The manner of a game is that computer shows the result when the user starts the rock-paper-scissors game in front of the monitor and the system always shows winning result that is the main purpose of it.

Keywords: machine learning, apache spark, streaming, gesture, prediction

Pages: 154 - 156 | DOI: 10.15224/978-1-63248-117-7-57

34. USER-CENTRIC DRONE CONTROLLER FOR PREVENTING OPERATION MISTAKE

Authors: DONG RYEOL SHIN , EARL KIM , BUMSU LEE , CHOONSUNG NAM

Abstract: Recently, a variety of businesses have appeared not only in the drone's military market but also in the consumer market and the service market. The reason for the rapid growth of the market is that it is possible to produce cheap drones using open source. Although there are lots of system for controlling drones, people still experience accidents due to inexperienced user who purchased drones. These accidents occur from the difference between the viewpoint of the user and the drones. Therefore, in this paper, we propose a User Centric Drone Controller (UCDC) to reduce accidents caused by clumsy manipulation.

Keywords: Drone, Drone Controller, Viewpoint, flight controller

Pages: 157 - 160 | DOI: 10.15224/978-1-63248-117-7-58

35. AN AUTOMATIC VEHICLE IDENTIFICATION MECHANISM USING A DISTRIBUTED PROCESSING SYSTEM

Authors: DONG RYEOL SHIN , EARL KIM , JUN HEON KIM , BEOM SU LEE , KEE HYUN CHOI

Abstract: Currently, vehicle related studies are activated due to the increase of vehicle. Thus, the technology using computer vision is being studied to identify the vehicle's information. It enables automatically identify the vehicle number. The image processing rate, however, is limited to the speed of data processing, and its inefficiency of processing is increase gradually. Therefore, in this paper we propose a method to enhance the efficiency of the processing using HDFS and distributed processing system.

Keywords: computer vision, vehicle identifying, OpenCV, HDFS, distributed processing system

Pages: 161 - 163 | DOI: 10.15224/978-1-63248-117-7-59BEOM SU LEE

36. A NOBLE GESTURES CONTROL SYSTEM USING MACHINE LEARNING

Authors: DONG RYEOL SHIN , EARL KIM , JANG YEOL LEE , JUN HEON KIM , CHOONSUNG NAM

Abstract: In this paper, we propose a method to improve the recognition rate of gestures motion and scalability problem which can occur in gestures when operate drone using machine learning. For these purposes, the gestures data transmitted from the drone controller are used for machine learning on real time, and a new learning model is periodically created using the gestures data stored in the HDFS(Hadoop Distributed File System). The goal of our proposed system is to increase the recognition rate of the gestures motion when new learning model is created. In addition, it is possible to expect enhanced scalability through recognition of gestures motion, and that drone is able to recognize a new gestures motion which is not defined in the server.

Keywords: Big Data, Apache Flume, HDFS, Apache Spark

Pages: 164 - 166 | DOI: 10.15224/978-1-63248-117-7-60

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering