Loading...

Proceedings of

International Conference on Recent Trends in Computing and Communication Engineering RTCCE 2013

Date
21-Apr-2013
Location
HAMIRPUR , India
Authors
179
ISBN
978-981-07-6184-4

67 Articles Published

1. A NOVEL METHOD FOR MEASUREMENT OF TERMINAL VELOCITY OF AERODYNAMIC DECELERATORS

Authors: ALOK JAIN, , DEEPAK KUMAR , MAHBOOB AHMED , SURENDRA M. JAIN

Abstract: Measurement of terminal velocity of aerodynamic decelerators is of paramount importance for their optimal design. In this paper, various methods being used for terminal velocity measurement and their pros and cons are discussed in brief. It also presents a novel instrumented plumb line method for terminal velocity measurement. The details of implementation of proposed scheme of terminal velocity measurement and test results are also discussed in this paper.

Keywords: Aerodynamic decelerator, Strain Gauge, load Link, Terminal Velocity, Rate of descent

Pages: 1 - 5 | DOI: 10.15224/978-981-07-6184-4-01

2. INTERACTIVE ANIMATION FOR USER VERIFICATION WITH THE HELP OF AUDIO-VISUAL PARAMETERS FOR ENHANCED HUMAN COMPUTER INTERACTION (HCI)

Authors: ABHISHEK TYAGI , ANURAG PUJARI

Abstract: Animation is a broadly explored research field. In spite of it, the field has not been quested much for enhancing the real time user interaction. Research on motion detection has been done for identifying an interacting user’s identity, though it holds certain limitations. Our research presents an expressive facial animation model which identifies the interacting user as well as authenticates. The model animates the face in such a way that it is realistically pronouncing the given text, which is based on the speech input. The input speech is the vocabulary words that have been chosen by us specifically for this model. This intelligent animated model can identify an interacting user and works for that particular user only

Keywords: SpeakerRecognition,Lipsynchronization, Performance driven facial animation(PDFA)

Pages: 6 - 10 | DOI: 10.15224/978-981-07-6184-4-02

3. INTER CARRIER INTERFERENCE MITIGATION IN OFDM SYSTEM USING KALMAN FILTER CHANNEL ESTIMATION

Authors: M.S.KUMBHAR , MANISHA B. SUTAR

Abstract: Orthogonal frequency division multiplexing (OFDM) is one of the modulation scheme, used for high speed mobile communication. However, fast time varying multipath channels leads to loss of orthogonality of subcarriers and introduces inter carrier interference (ICI). In this study, MMSE equalizer is implemented to remove ICI. The information of Channel Impulse Response (CIR) required for equalizer is estimated on every subcarrier using time domain Kalman Filter. In further study, decision feedback equalizer will be implemented of which performance will be compared on the basis of bit error rate (BER) with that of MMSE equalizer

Keywords: OFDM,Inter Carrier Interference,Channel Impulse Response,Kalman filter, MMSE equalizer, BER

Pages: 11 - 14 | DOI: 10.15224/978-981-07-6184-4-03

4. COMPARATIVE ANALYSIS OF POWERVM AND X86-BASED VIRTUALIZATION PERFORMANCE

Authors: ARCHANA MEWARA , MAHTAB SINGH , PRADIP KUMAR YADAV

Abstract: Virtualization has moved to the forefront of many organizations\' IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.And its show independent study can change IT sector

Keywords: Virtualization, it infrastructure, software partitioning, reduce costs, risk management, server virtualization to maintain the realtime applications

Pages: 15 - 21 | DOI: 10.15224/978-981-07-6184-4-04

5. AN EFFECTIVE STEMMER IN DEVANAGARI SCRIPT

Authors: ABHISHEK TYAGI , MONIKA DOGRA , UPENDRA MISHRA

Abstract: In today’s word of internet web search engines are developing the techniques to make the surfing faster. Stemming is a technique used by web search engines for prefix and suffix removal from the derived word. Stemming provides the way to store similar documents together. This research work aims at the development of Hindi stemmer based on Devanagari script for stripping both prefixes as well as suffixes from derived word to provide better stemming than previous stemmers. Proposed stemmer uses the hybrid approach which is the combination of lookup algorithm, suffix stripping algorithm and prefix removal algorithm.

Keywords: natural language processing, stemming, overstemming, under-stemming, inflected word, Information Retrieval –IR, conflation

Pages: 22 - 25 | DOI: 10.15224/978-981-07-6184-4-05

6. AWARENESS AND PENETRATION ON BUYING CELL PHONES ACCORDING TO CUSTOMER NEEDS AND STATISTICS USING NEURAL NETWORKS

Authors: ABHISHEK TYAGI , PRANHITA SHARMA

Abstract: One of the important techniques of data mining is Classification. Mobile selling and buying is one of the major businesses in the world. Here with the help of neural networks implementing data mining method will help to classify mobiles of different companies according to their attribute level which will be a great ease to an individual when it comes to buy a cellular phone which entirely depends upon their needs. Data mining technique will help in extracting data through neural network whereas neural network technique will make our classification and research efficient enough to develop a selection model.

Keywords: Case Base Reasoning, ANN, Selection and Classification, Mobile Phone, Data Mining

Pages: 26 - 28 | DOI: 10.15224/978-981-07-6184-4-06

7. DWT BASED SELF-EMBEDDING WATERMARKING

Authors: MANOJ KUMAR RAMAIYA , MONIKA SHARMA , NAVEEN HEMRAJANI , NIRUPMA TIWARI

Abstract: Digital watermarking is a technology that hides information in image to provide authentication. Information hiding is done by the tempering content of the image. The embedding process has to be such that the tempering of the media are invisible. The proposed work presents a novel DWT based self-embedding color image watermarking scheme by using cubic interpolation of mean difference matrices of the image and used it asa watermark. Cubic interpolation is used for up-sampling the image. Proposed scheme assure the self-embedding of original image and also assure extraction of watermark information with satisfied visual criteria. Two level DWT decomposition of original for embedding watermark information ensure Robustness of proposed scheme. Experimental results show that the proposed scheme is more efficient and robust.

Keywords: Color image: Digital watermark, Discrete Wavelet Transform (DWT) , Cubic interpolation

Pages: 29 - 32 | DOI: 10.15224/978-981-07-6184-4-07

8. EFFECT OF MUSIC ON AUTONOMIC NERVOUS SYSTEM THROUGH THE STUDY OF SYMBOLIC DYNAMICS OF HEART RATE VARIABILITY SIGNALS

Authors: D.N. TIBAREWALA , SANJAY KUMAR PALIT , ANILESH DEY , D. K. BHATTACHARYA

Abstract: Effect of music on autonomic nervous system (ANS) from Heart rate variability (HRV) signals of pre-music and on-music states is a very recent area of research. ‘n-bit’ rank, for some fixed n, of symbolic dynamics has already been applied in connection with HRV signals of Healthy and CHF subjects. But such a study is completely new in connection with effect of music on ANS through HRV signals. The present paper considers 4-bit rank of symbolic dynamics of HRV signals in both pre-music and on-music stages. It shows that the effect of Music is significant in the on-music state. Moreover it also proves that the significant effect of music is not same for all the subjects.

Keywords: Symbolic dynamics; rank; Q-Q plot; pre-music and onmusic HRV data

Pages: 33 - 37 | DOI: 10.15224/978-981-07-6184-4-08

9. SOFTWARE SECURITY TESTING PROCESS

Authors: RAEES AHMAD KHAN , SUHEL AHMAD KHAN

Abstract: Security testing is an integral part of risk management process and executives realize the benefits of an independent security test process. It is highly desirable to optimize the security test activities for a fast time-to-market while delivering a product that meets security expectation. Software security test process elaborates various testing activities and describes which activity is to be carried out when. Given the need and significance of phased approach of security testing, this article proposes a prescriptive framework elaborating security testing activities to be carried out while integrating it within the development life cycle.

Keywords: Security Testing, Software Security Testing

Pages: 38 - 42 | DOI: 10.15224/978-981-07-6184-4-09

10. SEQUENCED QUEUE BASED ROUTING ALGORITHM (SQRA) FOR DETECTION AND CORRECTION OF GREY HOLE ATTACK BY IMPLEMENTING IDS

Authors: SHIVANI SHARMA , TANU PREET SINGH

Abstract: Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper we proposed sequenced Queue based Routing Algorithm (SQRA) for Detection and Correction of Grey Hole attack by Implementing Intrusion Detection System.

Keywords: MANETs, Grey hole attack, IDS

Pages: 43 - 47 | DOI: 10.15224/978-981-07-6184-4-10

11. COMPARISON OF VARIOUS SOFTWARE QUALITY MODELS

Authors: KAVITA SHARMA , KUMUD SHARMA

Abstract: Software metrics and quality models play a pivotal role in measurement of software quality. A number of well known qualities models are used to build quality software. Different researchers have proposed different software quality models to help measure the quality of software products. In our research, we are discussing the different software quality models and compare the software quality models with each other

Keywords: Software Quality Models, McCall model, FURPS model, ISO 9126 model

Pages: 48 - 51 | DOI: 10.15224/978-981-07-6184-4-11

12. SOME ANOMALIES IN THE ANALYSIS OF WHOLE GENOME SEQUENCE ON THE BASIS OF FUZZY SET THEORY

Authors: ANILESH DEY , D. K. BHATTACHARYA , DEBANJAN DE , SUBHRAM DAS

Abstract: The purpose of the paper is to create some counter examples in order to find out some of the anomalies and inadequacies in the analysis of polynucleotide and whole genomes on the basis of fuzzy set theory.

Keywords: Fuzzy Polynucleotide space, Different types of metric

Pages: 52 - 55 | DOI: 10.15224/978-981-07-6184-4-12

13. ENHANCED APPROACH OF CLUSTER HEAD SELECTION USING RANK AND WEIGHT ASSIGNMENT IN WIRELESS SENSOR NETWORK

Authors: GUNJAN JAIN , S.R BIRADAR

Abstract: With the evolution of wireless sensor network, the interest in their application have increased considerably. The architecture of the system differs with the application requirement and characteristics. Now days there are number of applications in which hierarchal based networks is highly in demand and key concept of such network is clustering. Some of the most well known hierarchical routing protocols are LEACH, TEEN, APTEEN and HEED. These different conventional protocols have diverse strategies to select their cluster head but still have some limitations. Based on the limitations of these conventional models, a new approach has been proposed on the basis of ranks and weights assignment. This approach will consider not only residual energy but also node’s degree and distance of nodes with base station. The node which will have higher weight will be chosen as a cluster head. The objective of this approach is to have balance distribution of clusters, enhance lifetime and better efficie

Keywords: Wireless sensor network, clustering, data aggregation, cluster head, weight.

Pages: 56 - 59 | DOI: 10.15224/978-981-07-6184-4-13

14. COMMON ENTRY ERADICATION AND CLUSTER ELIMINATION IN MANETS (CEECE)

Authors: SACHIN KHURANA , R.K. SINGH

Abstract: Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. Clustering is the process of building hierarchies among nodes in the network. In this approach an ad hoc network is partitioned into group of nodes called as clusters. In this paper, we proposed an algorithm CEECE to eradicate cluster formation by removing the common entries that will ultimately optimize the performance of network structure. The result analysis carried by me is done using NS-2 simulator.

Keywords: Manets, Clusters

Pages: 60 - 63 | DOI: 10.15224/978-981-07-6184-4-14

15. QUALITY OF SERVICE MODEL FOR LOAD BALANCING IN MOBILE ADHOC NETWORKS

Authors: JAYANT VATS , R.K SINGH , VISHAL SHARMA

Abstract: Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this Paper we proposed a model i.e. Normalized Weighted Queue Model that was compared with other models and results are shown using NS2 Simulator.

Keywords: QOS, MANETs

Pages: 64 - 67 | DOI: 10.15224/978-981-07-6184-4-15

16. A NOVEL METHOD OF HASBE WITH IMPROVED EFFICIENCY AND DELEGATION MECHANISM IN CLOUD

Authors: S. SATHYALAKSHMI , S.DHIVYA BHARATHI

Abstract: Cloud computing is one of the most influential paradigms in the IT industry in recent years. Since this technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, a hierarchical attribute-set-based encryption has been proposed (HASBE) with a hierarchical structure of users. The novel method of HASBE introduces in term of delegation mechanism and improved efficiency. It provides efficiently share confidential data on cloud servers and also involves in full delegation. The delegation defines that it involved for the transfer of authority under server permission.

Keywords: delegation, involved, transfer, authority, server, permission

Pages: 68 - 73 | DOI: 10.15224/978-981-07-6184-4-16

17. AN OVERVIEW ON DISCOVERY OF REALITY- BLUE BRAIN

Authors: DEVENDRA NAGAL , SWATI SHARMA

Abstract: Understanding the human brain is one of the greatest challenges facing 21st century science. In recent years, half a dozen major research groups have simulated or constructed sizeable networks of artificial neurons, with the ultimate goal to emulate the entire human brain. Some approaches are more scalable, some are more practical with current technologies, and some are more accurate in their emulation of biological neurons. This paper presented the overview of Blue Brain

Keywords: neuroscience, blue brain, virtual brain

Pages: 74 - 78 | DOI: 10.15224/978-981-07-6184-4-17

18. E-TEXTILES DESINGED FOR BIOMEDICAL APPLICATIONS- A SURVEY

Authors: DEVENDRA NAGAL

Abstract: Electronic textiles, also known as “e-textiles” is one such new field of textile, which is finding its unique applications in various fields such as civilian, medical, military and various other sectors. They are now utilized in numerous industries and applications that are greatly beneficial to the mankind. Special care is essential while dealing with electronic textiles employed in the field of medical sciences or health care applications because it involves direct contact with the human body. This paper presents a overview on e-textile.

Keywords: electronic-textiles; biomedical applications, fibers

Pages: 79 - 83 | DOI: 10.15224/978-981-07-6184-4-18

19. PERFORMANCE ANALYSIS AND IMPLEMENTATION OF DIFFERENT MODULATION TECHNIQUES IN ALMOUTI MIMO SCHEME WITH RAYLEIGH CHANNEL

Authors: JAYMIN BHALANI , RAHUL PATEL , SAGAR PATEL

Abstract: This paper presents performance comparison of various modulation techniques in almouti scheme with Rayleigh fading channel. In the comparison, the space time coding has been used. The performance comparison are made on the basis of symbol error rate(SER) performance matrices over Rayleigh fading channel with 16-PSK,QPSK,PAM,16-QAM,64-QAM modulation technique. The comparison results show that in Rayleigh fading the symbol error rate is least for QPSK modulation technique as compared to other three modulation techniques i.e. M- QAM ,PAM and 16-PSK.

Keywords: MIMO, Modulation Techniques, SER,MQAM,PAM,16-PSK,QPSK,64-QPSK

Pages: 84 - 87 | DOI: 10.15224/978-981-07-6184-4-19

20. LOW POWER SCHMITT TRIGGER IN SUB-THRESHOLD REGION

Authors: B.K. SINGH , SAPNA

Abstract: Sub-threshold operation holds promise for ultra low energy operation in emerging applications. Sub-threshold operation is attractive for mid to high performance applications where power has become a limiting constraint. This paper proposes a low power Schmitt-Trigger using CMOS standard cell logic. Experimental results reveal that proposed design has reduced power consumption and has temperature sustainability. The paper also presents the application of Schmitt Trigger in SRAM. The simulation work has been done on Tanner EDA tool at 45nm technology.

Keywords: threshold, CMOS Technology, Tanner EDA

Pages: 88 - 91 | DOI: 10.15224/978-981-07-6184-4-20

21. VALIDATION OF NEURAL NETWORK IN TRANSMISSION LOSS ALLOCATION USING ORTHOGONAL PROJECTION TECHNIQUE

Authors: M.K.RAI , PAWAN KUMAR

Abstract: A new transmission loss allocation tool based on artificial neural network has been developed and presented in this paper. The proposed artificial neural network computes loss allocation much faster than other methods. A relatively short execution time of the proposed method makes it a suitable candidate for being a part of a real time decision making process. Most independent system variables can be used as inputs to this neural network which in turn makes the loss allocation procedure responsive to practical situations. Moreover, transmission line status (available or failed) was included in neural network inputs to make the proposed network capable of allocating loss even during the failure of a transmission line. The proposed neural networks were utilized to allocate losses in two types of energy transactions: bilateral contracts and power pool operation. Circuit Theory and Orthogonal Projection loss allocation methods were utilized to develop training and testing patterns. The 6-b

Keywords: Transmission Loss, Loss Allocation, ANN, Orthogonal Projection concept, Loss function decomposityion

Pages: 92 - 98 | DOI: 10.15224/978-981-07-6184-4-21

22. IMAGE STEGANOGRAPHY : SELF EXTRACTION MECHANISM

Authors: ANIL KISHORE SAXENA , MANOJ KUMAR RAMAIYA , MONIKA SHARMA , NAVEEN HEMRAJANI

Abstract: The incredible evolution of Internet technologies and its applications requires high level of security for data over the unsecured communication channel. Digital image steganography is technique for hiding information into a cover image. Least Significant-Bit (LSB) based approach is popular steganographic technique in spatial domain due to its simplicity and robustness. All the existing methods of steganography focuson embedding mechanism with less consideration to the pre-processing, such as encryption of secrete image. The conventional steganographic model does not provide the preprocessing, needed in image basedsteganography for better security. The proposed work presents a unique technique for Image steganography based on the S- Box mapping. The preprocessing of secrete image is carried by shuffling of secrete image blocks using three 4×4 unique S-boxes. The preprocessing provide high level of security as extraction is not possible without the knowledge of mapping rules of Substitu

Keywords: Steganography, S-Box mapping , LSB Technique, Cryptography, Preprocessing of Secrete Image.

Pages: 99 - 102 | DOI: 10.15224/978-981-07-6184-4-22

23. BIOMETRICS : ECHELON OF SECURED AUTHENTICATION

Authors: VARUN SHARMA

Abstract: Biometrics is the utilization of biological characteristics or behavioral traits for an identification and verification of an individual. Biometric technology is fast gaining popularity as means of security measures to reduce cases of fraud and theft due to its use of physical characteristics and traits for the identification of individuals. Biometric system has now been deployed in various commercial, civilian and forensic applications as a means of establishing identity. We have outlined the usage of various Biometrics systems, working, comparison between different techniques and their advantages and disadvantages. Various probable attacks on biometric systems and their solutions are also discussed

Keywords: authentication, biometrics, cryptography, recognition, validation, verification

Pages: 103 - 107 | DOI: 10.15224/978-981-07-6184-4-23

24. CLOUD QUERY LANGUAGE FOR CLOUD DATABASES

Authors: BASHIR ALAM , MANSAF ALAM

Abstract: This paper deals with the cloud query language for manipulating the cloud data. The cloud definition and cloud data manipulation language are proposed as component of cloud query language. This paper is also focus on retrieval and manipulation cloud data dispersed on different data centre.

Keywords: Cloud Database, Engine, Retrieval, Manipulation, Cloud Query

Pages: 108 - 112 | DOI: 10.15224/978-981-07-6184-4-24

25. PRIVACY PRESERVING ACCESS CONTROL AND MULTI- AUTHORITY IN CLOUD WITH EFFICIENT AUTHENTICATION, ENCRYPTION AND REVOCATION

Authors: S. SATHYALAKSHMI

Abstract: Cloud computing is location-independent computing, whereby shared servers provide resources, software, and data to computers and other devices on demand. It describes a new supplement, consumption, and delivery model for IT services based on the Internet. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure \"in the cloud\" that supports them. Cloud computing is still considered in its infancy, there are many challenging issues waiting for tackling. The cloud suffers much from data loss, privacy, security and revocation problems. To overcome these problems an efficient Knowledge Based - Click Point Authentication (KB-CPA) and Multi-Authority Ciphertext-Policy Attribute Based Encryption (MA-CP-ABE) is proposed with some modifications.

Keywords: Fuzzy Identity Based Encryption (FIBE) ; Multi-Authority Attribute Based Encryption (MA-ABE); Key-Policy Attribute Based Encryption (KP-ABE); Click Point Authentication (CPA); Ciphertext-Policy Attribute Based Encryption (CP-ABE); Knowledge Based Authentication (KBA); Knowledge Based - Click Point Authentication (KB-CPA); Multi-Authority Ciphertext-Policy Attribute Based Encryption (MACP-ABE); Pseudo Random Key Generator (PRKG); Global Identifier (GID); Global Attribute List (GAL

Pages: 113 - 117 | DOI: 10.15224/978-981-07-6184-4-25

26. EFFICIENCY IMPROVEMENT OF INDUCTION MOTORS USING ADVANCED CONSTRUCTION TECHNIQUES- A REVIEW

Authors: J. G. YADAV , S. P. SRIVASTAVA

Abstract: In this paper various considerations for achieving near optimum efficiency including, advanced construction techniques material and design are considered. This paper also presents an accurate method for measuring rotational losses. Following these methods IEEE841 and even NEMA premium efficiency levels are easily achieved.

Keywords: Premium efficiency, advanced construction techniques, machine lamination, quality, induction motor, Rotational losses.

Pages: 118 - 121 | DOI: 10.15224/978-981-07-6184-4-26

27. SUPPORT VECTOR MACHINE SCHEDULER FOR UNCERTAIN COMMUNICATION DEMAND IN COMPUTATIONAL GRID

Authors: LAKSHMIPRIYA.C , S. SATHYALAKSHMI

Abstract: Grid has evolved as heterogeneous resource sharing environment. The resources are from different management domain. Finding a suitable resource for a given job is called scheduling. The highly dynamic and heterogeneous nature of grid makes scheduling a big challenge. To achieve maximum resource utilization and minimum makespan grid needs effective and efficient scheduling algorithm. Grid scheduling normally considers the availability of the grid resources and application demands. These demands are not known in advance for the highly dependent application and require more data transfer during execution. Without proper consideration of these demands at the time of scheduling leads to poor system performance and increase in makespan of the application. This unpredictable data transfer is called Uncertainty in communication. IPDT-FUZZY uses some parameters to find the uncertainty in given applications. When the degree of uncertainty is less, the IPDT-FUZZY scheduler behaviour is similar to

Keywords: Uncertainty, Communication demand, IPDTFUZZY, SVM, QOI, IP-FULL-FUZZY,ILP-FUZZY, Makespan, DAG, GIS, RMS

Pages: 122 - 126 | DOI: 10.15224/978-981-07-6184-4-27

28. SIMULATION BASED EVALUATION OF PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN REALISTIC VEHICULAR NETWORK

Authors: RAJINDER SANWAL , VISHAL KUMAR

Abstract: Vehicular Mobile Communication has emerged as a new area of attraction in the field of Wireless communication. VANETs have emerged as a boon towards saving human live by its safety and non-safety potential applications. This paper tests routing protocols namely Ad hoc On Demand Distance Vector (AODV), Ad hoc On Demand Multipath Distance Vector (AOMDV), Dynamic Source Routing (DSR) and Destination Sequence Distance Vector Routing (DSDV) on a Topologically Integrated Geographic Encoding and Referencing (TIGER) Map of the area of Afton Oaks, Houston, USA. The mobility pattern was created using MOVE (Mobility model generator for Vehicular networks) and SUMO (Simulation of Urban Mobility) capable of intelligent driver model with intersection management (IDM-IM) and intelligent model with changing lane (IDM-LC). Our simulation performances are evaluated using various performance metrics such as average throughput, normalized routing load, end to end delay and packet delivery ratio. The simul

Keywords: TIGER, MOVE, SUMO, VANET, ITS, routing protocols.

Pages: 127 - 131 | DOI: 10.15224/978-981-07-6184-4-28

29. BANDWIDTH MONITORING TOOLS

Authors: ABHISHEK SINHA , NISHANT KUMAR

Abstract: The word bandwidth is often used as a synonym for data transfer rate within computer network and it refers to the amount of data communication resources available or consumed. It is usually expressed in bits per second or multiples of it. In case of internet, the actual bandwidth provided for the data transfer is much less as compared to its theoretical value that is being claimed, hence making the data transfer much slower and of poor quality. To overcome this problem there is a need of continuous monitoring of the ISP’s connectivity so that poor performance can be immediately reported. This can only be achieved by an automatic bandwidth monitoring tool with the ability to log the bandwidth usage all the time and generate the report as desired. The paper presents the details of the various available tools for the purpose as well as an in-house developed Bandwidth Monitoring Tool that performs the similar tasks with a user friendly interface.

Keywords: ISP, ADSL, GUI, Bit-rate, SSL, NMS

Pages: 132 - 136 | DOI: 10.15224/978-981-07-6184-4-2

30. REVIEW OF GAS SENSORS USED IN ELECTRONIC NOSE AND ODOR SENSING TECHNOLOGY

Authors: AATHREYA S. BHAT , AMITH V. S , DIVYA DAYANANDA PAI , NAMRATA S. PRASAD

Abstract: Over the last decade, there have been major advances in the area of “e-sensing”, in both, technical and commercial aspects. An e-nose is a device that mimics human olfactory system. It perceives odor/flavor and characterizes each odor with a unique signal pattern. E-nose comprises of sensor block followed by an analysis block which performs feature extraction and pattern recognition. This paper reviews different types of gas sensors employed in electronic noses till date. It describes the operating principles of major sensor types and their applications. It lists the various advantages and disadvantages of all the mentioned types that are used in e-nose

Keywords: Electronic nose (e-nose), Quartz crystal microbalance (QCM), conducting polymers, Surface acoustic waves (SAW), metal oxide semiconductor field effect transistor (MOSFET), optical sensors

Pages: 137 - 142 | DOI: 10.15224/978-981-07-6184-4-30

31. A PROPOSAL OF A NOVEL MODEL FOR ARTIFICIAL INTELLIGENCE PLANNING

Authors: NAVEENVERMA , SHAILENDRA MISHRA , SOUVIK SAMANTA

Abstract: Artificial Intelligence (AI) is the intelligence of machines and robots and the branch of computer science that aims to create it. And for making these machines intelligent planning is required.AI planning provides good solutions for solving real world problems like planning in NLP, Robotics, Computer-Vision, Cognitive analysis etc. This paper provides an overview of various AI application areas with a major focus on AI Planning, and proposes a model for AI Planning which includes better interface capabilities in conjunction with the available AI Planners.

Keywords: Artificial Intelligence, AI Planning, machine intelligent.

Pages: 143 - 147 | DOI: 10.15224/978-981-07-6184-4-31

32. GLOBAL PROSPECT OF DISTRIBUTED AGILE SOFTWARE DEVELOPMENT: A REVIEW

Authors: ANURAG TIWARI , MANUJ DARBARI , PRAVEEN KUMAR PATEL

Abstract: The entangled and rival market situation has resulted the distributed software development maximise their reach with new emerging technologies that most of companies vastly applying with their processes is global software development. Companies need to utilise their existing resource as much as possible. Thus the ability to collaborate thoroughly has become a critical factor. Considerable geographical distance, dissimilar time zone, mismatch process between the team and cultural adverseness in distributed software development leads to collaboration and communication which contrariwise effect the project. Using the agile practices provide fast, light and efficient than any other vigorous method without being chaotic of distributed development .This paper examine the intersection of these two momentous trends for software product development i.e. agile practices and distributed software development. we discussed DSD challenges based on their root cause, which helps structuring a efficaci

Keywords: Agile practices, Distributed software development, Global software development, distributed agile software development.

Pages: 148 - 152 | DOI: 10.15224/978-981-07-6184-4-32

33. A SURVEY OF BLUETOOTH SECURITY IN SMART PHONE

Authors: VIJENDRA SINGH BHAMU

Abstract: Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security Issue/problem are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues/problem of Bluetooth has been an active area of research for the last few years. This paper presents the unprotected in the security Issue/problem of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information.

Keywords: : Bluetooth Version & Range, Specification, Security Threats, Security Procedures, Problem Formulation

Pages: 153 - 157 | DOI: 10.15224/978-981-07-6184-4-33

34. AN EVOLUTION OF STATIC PRIORITY SCHEDULING IN REAL TIME SYSTEM

Authors: JAYA GUPTA , SAROJ HIRANWAL

Abstract: This paper reviews scheduling algorithm available in RTOS to schedule the tasks during execution in the Real Time System considering the static priority and evolution in the static priority scheduling in last decade. Real Time Operating System (RTOS) success depends on completion of task in given deadline. Real Time Operating System (RTOS) used, where we require specific application that meet there deadline with keeping logically correct results as an important constraint. Scheduling can be done in static or dynamic manner. According to priority, scheduling can also be classified as static priority and dynamic priority in dynamic scheduling. This paper concentrates on the static priority scheduling algorithm and the changes made or suggested by researchers and the proposed way to overcome from this problem

Keywords: RTOS, Scheduling Algorithm, Deadline, Dynamic, Static Priority

Pages: 158 - 163 | DOI: 10.15224/978-981-07-6184-4-34

35. HCFD-BASED FACIAL RECOGNITION SYSTEM FOR USER IDENTIFICATION

Authors: CHANDRA MOULI P.V.S.S.R , CHIRANJI LAL CHOWDHARY

Abstract: Faсial reсognition systems have their aссuraсy based on the intra-сlass variations between two stages in partiсular, enrollment and identifiсation. Тhese intra-сlass variations are affeсted by the lighting сonditions with other reasons suсh as, faсial expressions, pose, oссlusion, poor sensor quality, and illumination quality. Тo identify a faсe or an objeсt with aссuraсy, all suсh errors need to overсome. Іn this paper we are proposing a new approaсh about the effeсts of varying light сonditions and henсe, in order to сurb these effeсts, faсe images are pre-proсessed to normalize intra-сlass variations. Тraditional prinсipal сomponent analysis with Haar Сasсade Faсe Deteсtor is used for the faсial reсognition proсess for user identifiсation.

Keywords: eigenfaces, neural networks, OpenCV library, facial recognition, Haar cascade face detector (HCFD)

Pages: 164 - 167 | DOI: 10.15224/978-981-07-6184-4-35

36. INTERCARRIER INTERFERENCE OF VARIOUS PULSE SHAPING FUNCTIONS USED IN OFDM SYSTEMS WITH CARRIER FREQUENCY OFFSET

Authors: ANJANA KUMARI , HARISHMITTAL , SRINIVAS K , YASH PAL

Abstract: For orthogonal frequency-division multiplexing (OFDM) communication systems, the frequency offsets in mobile radio channels distort the orthogonality between subcarriers resulting in intercarrier interference (ICI). This paper is focused on the problem of reducing the intercarrier-interference (ICI), signal to noise ratio and improved performance in the transmission over OFDM using various pulse shaping methods. Here we have performed a detailed performance comparison of various pulse shaping functions used in OFDM Communication Systems with Carrier Frequency Offset. They appear to be suitable for transmission in OFDM systems with carrier frequency offset. The results obtained by analysis show that the performance improvement over conventional pulse shapes, are significant for reducing average intercarrier-interference (ICI) power and increased ratio of average signal power to average ICI power (SIR). BER performance comparison of all pulse shapes in OFDM system showing better performa

Keywords: OFDM; ICI; SIR; ISI;BER;SNR; Pulse shaping; Carrier frequency offset

Pages: 168 - 172 | DOI: 10.15224/978-981-07-6184-4-36

37. VHDL IMPLEMENTATION OF AES-128

Authors: PURNIMA GEHLOT , RICHA SHARMA , S.R BIRADAR

Abstract: Security has become an increasingly important feature with the growth of electronic communication. The Symmetric in which the same key value is used in both the encryption and decryption calculations are becoming more popular. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard is based on the Rijndael algorithm. In this project our main concern is to implement all modules of this algorithm on hardware.This methodology uses VHDL implementation of all the modules in terms of Delay and Frequency.

Keywords: Cryptography , Secret key AES, Rijndael, FPGA, VHDL

Pages: 173 - 176 | DOI: 10.15224/978-981-07-6184-4-37

38. TWOFISH ALGORITHM AND ITS IMPLEMENTATION ON FPGA

Authors: PURNIMA GEHLOT , RICHA SHARMA , S.R BIRADAR

Abstract: Now-a-days internet is one of the most important source of communication and thousands of people interact electronically. For sending sensitive messages over the internet, we need security. In this paper a security algorithm, Twofish has been explained with all of its modules with both 128 and 192-bit key size. Implementation on Xilinx – 6.1 xst software has been done taking delay as main constraint.

Keywords: twofish, MDS, PHT, symmetric key, Function F and g.

Pages: 177 - 180 | DOI: 10.15224/978-981-07-6184-4-38

39. ENERGY BASED TECHNIQUES FOR ALGORITHMS IN MANETS: A STUDY

Authors: INDERDEEP KAUR AULAKH , NAVDEEP KAUR

Abstract: Environment created by mobile ad hoc networks (MANETs) emerges as miscellany of wireless nodes which forms a network for a short span without any assistance of centralized infrastructure. As the scenario is not fixed, nodes rely upon battery, which depletes with time. This arise the dilemma of energy as a constraint in MANETs. This paper confers on the approaches configured for minimizing the use of energy in such condition. Various techniques taken into account are transmission power control, load distribution, power management, sleep mode. The ultimate application of natural engineering to combat energy consumption is an addition to such schemes. Further, each area is described by corresponding recent algorithms which tend to portray a clear picture of their usage.

Keywords: energy efficiency, energy aware algorithms, mobile ad hoc networks, power saving technique

Pages: 181 - 184 | DOI: 10.15224/978-981-07-6184-4-39

40. CONGESTION MANAGEMENT IN AN ELECTRICITY MARKET USING CATFISH PSO

Authors: KSHITIJ GAUR , SHASHANK SHEKHAR SINGH , Y. R. SOOD

Abstract: In a deregulated electricity marketcongestion management of the transmission network is an essential task of an Independent System Operator (ISO).A congested transmission network threatens the safe and secure operation of a power system and reduces the competitiveness and efficiency of the electricity market. In this paper, an OPF based congestion management procedure has been discussed and Catfish Particle Swarm Optimization (C-PSO) has been utilized to manage the congestion. The proposed C-PSO based algorithm has been implemented on an IEEE 30-bus system and compared with the basic PSO based algorithm. The results have shown that the C-PSO based congestion management gives better results as compared to PSO based congestion management.

Keywords: Congestion management, Optimal Power Flow, Particle Swarm Optimization,Catfish PSO

Pages: 185 - 188 | DOI: 10.15224/978-981-07-6184-4-40

41. SECURITY MECHANISM FOR COMMUNICATION IN WIRELESS SENSOR NETWORKS

Authors: KRITI JAIN , NEETI BISHT , SOHAN LAL , UPASANA BAHUGUNA

Abstract: The wireless sensor network is an emerging field that combines sensing, computation, and communication into a single tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much work has focused on making sensor networks realistic and useful, but still security in data communication is big issue for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor network to save energy of the sensor nodes and to save time for data communication between the sensor nodes.

Keywords: Wireless Communication Network, Wireless sensor network, data dissemination, Kerberos authentication

Pages: 189 - 192 | DOI: 10.15224/978-981-07-6184-4-41

42. LOCALIZATION OF REGION-BASED ACTIVE CONTOURS

Authors: HIREN MEWADA , PARTHESH MANKODI

Abstract: In this paper, we propose a natural framework that al- lows any region-based segmentation energy to be re-formulated in a local way. We consider local rather than global image statistics and evolve a contour based on local information. Localized con- tours are capable of segmenting objects with heterogeneous feature profiles that would be difficult to capture correctly using a standard global method. The presented technique is versatile enough to be used with any global region-based active contour energy and instill in it the benefits of localization. We describe this framework and demonstrate the localization of three well-known energies in order to illustrate how our framework can be applied to any energy. We then compare each localized energy to its global counterpart to show the improvements that can be achieved. Next, an in-depth study of the behaviors of these energies in response to the degree of localization is given. Finally, we show results on challenging im- ages to illustra

Keywords: Active contours, level set methods, curve evolution, image segmentation, partial differential equationsn.

Pages: 193 - 197 | DOI: 10.15224/978-981-07-6184-4-42

43. PRIVACY ISSUES IN CLOUD COMPUTING FOR PERSONAL AREA NETWORK

Authors: ANKUR CHAUDHARY , LOKESH KUMAR , NEETI BISHT , SACHIN CHOUDHARY

Abstract: Data security means ensuring that data is kept safe from corruption and that access to it is suitably controlled. It helps in protecting the individual data. This paper focused on cloud data security. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services are fully trustworthy. The security objectives of an organization are a key factor for decisions about outsourcing information technology services and, in particular, for decisions about transitioning data, applications, and other resources to a public cloud computing environment. The information technology governance practices of the organizations that pertain to the policies, procedures, and standards used for application development and service provisioning, as well as the design, implementation, testing services, should be extended to cloud computing environments. Security and privacy issues are presented in this paper when cloud computing is implemente

Keywords: Cloud computing, Virtualization, Distributed Computing, management System.

Pages: 198 - 202 | DOI: 10.15224/978-981-07-6184-4-43

44. A NOVEL APPROACH FOR INTRODUCING ADVANCED SECURITY IN MOBILE AGENTS

Authors: ANKUR CHAUHAN , PRIYA SUNEJA , RAJAN SAHOTA

Abstract: Mobile agents can travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. With the concept of mobile agent, the execution process will go to the place where the data are available, data will not send to the place of execution process. However, it has not become popular due to some problems such as security, fault tolerance etc. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. So, the issue of protecting a mobile agent from a malicious host is a more difficult problem than protect a host from a malicious agent. This paper proposes advanced security model for the mobile agent security against malicious hosts by combining few techniques so that it can provide a better solution.

Keywords: security, mobile agents, mobile code, malicious host

Pages: 203 - 207 | DOI: 10.15224/978-981-07-6184-4-44

45. VEHICLE KINEMATIC PARAMETERS ESTIMATION USING MODIFIED LINEAR KALMAN FILTER

Authors: DNYANESHWAR V AVATIRAK , N.S.JADHAV , S.L. NALBALWAR

Abstract: This paper proposes a system that can estimate kinematic parameters of the target vehicle like location, velocity, and acceleration to avoid possible vehicle collision. Kinematic parameters are extracted from radar signal with appropriate waveform modulation. Hybridlinearfrequencymodulation (LFM) and frequency- shiftkeying(FSK) is used in radar so that more than one target is detected with high range resolution and high time update. Extracted kinematic parameters are than process using Modified Linear Kalman Filter (MLKF) along with trilateration process. Extended Kalman Filter (EKF) is also use to compare response of the two systems. Sensor network is useful for 360 degree protection of individual car. Sensors used in sensor network are 77GHz wide range radar and 24GHz ultra-wide band (UWB) short range radar (SRR).

Keywords: Automotive Safety, Collision Avoidance (CA), kalman filter, Radar

Pages: 208 - 212 | DOI: 10.15224/978-981-07-6184-4-45

46. A NUMERICAL SOLUTION OF BURGERS\' EQUATION BASED ON MULTIGRID METHOD

Authors: DEBASISH PRADHAN , MURARI SHARAN

Abstract: In this article we discussed the numerical solution of Burgers’ equation using multigrid method. We used implicit method for time discritization and Crank-Nicolson scheme for space discritization for fully discrete scheme. For improvement we used Multigrid method in fully discrete solution. And also Multigrid method accelerates convergence of a basics iterative method by global correction. Numerical results confirm our theoretical results

Keywords: multigrid method, V cycle, Burgers’ equation, numerical scheme, Taylor series.

Pages: 213 - 217 | DOI: 10.15224/978-981-07-6184-4-46

47. SIMULATION OF WIRELESS COMMUNICATION BASED ADAPTIVE SYSTEM

Authors: ABHINAV DOGRA , ANSHUL PANWAR , KAMAL SINGH , RAJESH RANA

Abstract: In wireless communications, fading is deviation of the attenuation affecting a signal over certain propagation media. The fading may vary with time, geographical position or radio frequency, and is often modeled as a random process. A fading channel is a communication channel comprising fading. Fading mitigation techniques are used to avoid the attenuation presented in a wireless communication system. Adaptive systems are the examples of the fading mitigation techniques. In this paper an adaptive system is simulated using MATLAB, which can switch its transmission and reception characteristics according the bit error rate (BER) between the sent and received data. The system will commute in a certain value that will be established by the user. The characteristics of the system based on the standard wireless communication system. So, an adaptive system was created with two modes: one with only modulation (64QAM) and the other with modulation (64QAM) and coding (Reed Solomon (64,48). The B

Keywords: adaptive system, QAM, fading mitigation techniques, adaptive modes

Pages: 218 - 221 | DOI: 10.15224/978-981-07-6184-4-47

48. AN ECOLOGICAL MODEL OF GENETIC ALGORITHM FOR INTERPRETATION OF THE DATA

Authors: MANJIT KAUR

Abstract: Ecological modeling covers a wide collection of methods and ideas of study. The variety of the suitable model is a part of any interpretation of ecological data. That variety is most often made randomly and the selection is frequently closely weighted by the knowledge of the programmer with the special model. Genetic Algorithm, which symbolizes a group of algorithms, intended to search the best alternative solution to a specified problem by using thoughts from natural science, biology, mainly genetics, offer another approach to model selection [3]. This paper presents a review of BEAGLE which is used for interpreting the ecological data behind the application of genetic algorithm.

Keywords: Evolutionary computation, GA: Genetic Algorithms, BEAGLE: Biological Evolutionary Algorithm Generating Logical Expressions.

Pages: 222 - 224 | DOI: 10.15224/978-981-07-6184-4-48

49. AN FPGA IMPLEMENTATION OF DS-SS COMMUNICATION SYSTEM USING PSEUDO CHAOTIC SEQUENCE GENERATOR

Authors: AMIT TRIPATHI , RAHUL NAWKHARE

Abstract: Chaotic system are unstable and a-periodic ,making them naturally difficult to identify and to predict .This nonlinear , unstable and a-periodic characteristics of chaotic signals has numerous features that make it attractive for communication use. This field of communication is termed as chaotic communication. Chaotic communication signals have large bandwidth and have low power spectrum density. In chaotic communication, the digital information to be transmitted is placed directly onto a wide band chaotic signal. Spread spectrum is a means of transmission, in which signal occupies bandwidth much more than the one necessary to send the information, the band spread is accomplished by utilizing a code which is independent of data. In this paper an attempt has been made to proposed and analysed the spread spectrum along with the performance analysed of pseudo chaotic code generator implemented in spread spectrum communication system. The sequence generator and the DS-SS for single user a

Keywords: digital communication, spread spectrum communication, chaotic spreading sequence, chaos

Pages: 225 - 229 | DOI: 10.15224/978-981-07-6184-4-49

50. FISH STOCK PREDICTION USING DATA MINING AND IMAGE PROCESSING TECHNIQUES BASED ON SALINITY, TEMPERATURE AND CHLOROPHYLL DISTRIBUTION

Authors: MADANA MOHANA R , PRUDHVI KUMAR REDDY K , RAMA MOHANA REDDY A

Abstract: Agriculture is the main occupation of the people who are living in most of the developing and under developed countries. And People also depending on fish production for their livelihood. Fish stock estimation has been put forth by Marine societies, using the images sent by the satellites. But, this estimation sometimes fails due to the sudden changes in climatic conditions. The present paper has addressed the above problem. The main object of this paper is to predict the stock concentration with high accuracy rate. This paper mainly uses the concepts of image processing, data mining and strives for the development of a high accurate model. As the number of parameters has been increased, the accuracy of the model will be increased. The aim is to predict the correct geographical position of the fish stock concentration and will extended for several additional inclusions such as prediction of accurate fish number and type of fish etc.

Keywords: Fish Stock, Image Processing, Data Mining, Prediction, Salinity, Ocean, Temperature, Satellite Images, Clustering.

Pages: 230 - 234 | DOI: 10.15224/978-981-07-6184-4-50

51. AGEING EFFECT ON STATOR WINDING OF A HYDRO POWER PLANT AND ITS UPGRADING

Authors: VINOD THAKUR

Abstract: Age has an effect on the working and efficiency of generators in a Hydro Power plant. While we discuss about refurbishment of a Hydro Power Plant, we can plan to refurbish, uprate and modernization of generators. Stator and rotor are the main component which can be refurbished and upgraded in order to increase efficiency. In the case of “Bassi” Hydro Power Plant, we planned to refurbish the all four generators. In this paper we are focusing on rewinding of stator and results thereof.

Keywords: component, formatting, style, styling, insert

Pages: 235 - 236 | DOI: 10.15224/978-981-07-6184-4-51

52. SECURE ZONE IN CLOUD

Authors: ANDE PRASAD , R.S.M.LAKSHMI PATIBANDLA , Y.R.P.SHANKAR

Abstract: In a fast-moving and volatile market, the ability to remain competitive is more important than ever in IT. Today Cloud computing was playing a most prominent role in improving the value of IT. Adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. While cloud computing models are attractive because of their flexibility and cost effectiveness, certain challenges must be addressed in order to provide a viable option to traditional data services. First and foremost is the issue of security. Each type of cloud computing model public, private or hybrid faces different levels of IT risk. In the private cloud delivery model, the cloud owner does not share resources with any other company. Private clouds are owned and operated by a single organization, delivering IT services within the constraints of their own network perimeter .In the public cloud computing model, IT activities and functions are provided as a service that

Keywords: Adopting, cloud technology, dynamically scalable

Pages: 237 - 241 | DOI: 10.15224/978-981-07-6184-4-52

53. KALMAN FILTER BASED CHANNEL ESTIMATION METHOD FOR MIMO-OFDM SYSTEM WITH LOW COMPLEXITY

Authors: PRAVEEN KUMAR , G RAVINDAR REDDY , GANESH MIRIYALA , VINDHYA KANIGIRI

Abstract: In multi input multi output orthogonal frequency division multiplexing (MIMO-OFDM) systems, a low complexity subspace based time domain channel estimation method is studied. This method works based on parametric channel model, where the response of the time varying channel is considered as a collection of sparse propagation paths. Translate the estimation of channel parameters into an unconstrained minimized problem by considering the channel correlation matrix. To solve this problem, Kalman filter based method which tracks the subspace is proposed, which provides the constant subspace to construct state equation and measurement equation. This method represents a low complexity subspace schemes. The approach can be extended to MC-CDMA systems. The simulation results prove that the Kalman filter method can track faster fading channel, and is more accurate with low complexity

Keywords: Channel estimation, Kalman filter, low rank adaptive filter, subspace tracking and time varying channel.

Pages: 242 - 246 | DOI: 10.15224/978-981-07-6184-4-5

54. HYBRID STRUCTURE OF LORENZ AND CHEN’S ATTRACTOR

Authors: CHILAKA RANGA , GANESH MIRIYALA , NEELAM SRINIVASULU

Abstract: n this paper, the results finding out the hybrid structure of a new chaotic attractor. This new chaotic attractor is combination of Lorenz chaotic attractor and Chen’s attractor. This new chaotic attractor obtained by merging Lorenz and Chen’s attractors. This will give the applications of both Lorenz chaotic attractor and Chen’s attractor.

Keywords: chaos, bifurcations, chatic systems, limit cycle

Pages: 247 - 249 | DOI: 10.15224/978-981-07-6184-4-54

55. USE OF MOBILE AGENT IN E-COMMERCE

Authors: MRIDULA , POOJA SHARMA

Abstract: In today’s world, more and more stress in given to information and its access. And with this more emphasis is given to the mobility of information. This trend has led to evolution of electronic commerce which is acting as a promising way the business is conducted. Computer systems have evolved from centralized system to client server paradigm then to mobile agent paradigm. Mobile agent systems consist of agent and hosts which provide working environment to the agents. Mobile agent consists of program code and execution state and when agent is dispatched to some other host both are transferred. They travel to different trading sites and locate the most befitting deal, negotiate the deal and even finalize them on behalf of their owners. This paper reviews the working of mobile agents in field of ecommerce

Keywords: Mobile agents , electronic commerce, B2B, B2C, C2C, C2B.

Pages: 250 - 253 | DOI: 10.15224/978-981-07-6184-4-55

56. REVIEW PAPER ON WIRELESS SENSOR NETWORKS

Authors: NISHA THAKUR , RITIKA SHARMA , SACHIN KUMAR

Abstract: Advances in sensor technology and computer networks have enabled distributed sensor networks (DSNs) to evolve from small clusters of large sensors to large swarms of micro sensors, from fixed sensor nodes to mobile nodes, from wired communications to wireless communications, from static network topology to dynamically changing topology. To design these networks, the factors needed to be considered are the coverage area, mobility, power consumption, communication capabilities etc. In this paper a survey is given regarding the analysis of AC structure and DHC structure, flat tree and DG Network, sensor architecture design, Ad-hoc sensor networks, sensor applications and also an overview on the client/server model and Mobile-Agent Based network.

Keywords: Sensor network structure, Sensor architecture design, Ad hoc wireless sensor networks, and Data processing paradigm

Pages: 254 - 258 | DOI: 10.15224/978-981-07-6184-4-56

57. CURRENT-MODE ACTIVE-C BIQUAD FILTER USING SINGLE MO-CCCFTA

Authors: C. CHAUHAN , D. S. CHAUHAN , R. S. TOMAR

Abstract: This paper presents a new current-mode active-C biquad filter employing single multi-output current controlled current follower trans-conductance amplifier (MO-CCCFTA). The proposed filter employs only two grounded capacitors. The proposed filter can simultaneously realize low pass (LP), band pass (BP) and high pass (HP) responses in current form by choosing appropriate current output branches. In addition, the pole frequency of proposed current-mode filter circuit can be tuned electronically and independent of quality factor, by simultaneous adjusting the external bias currents. The circuit possesses low sensitivity performance and low power consumptions. The validity of proposed filter is verified through PSPICE simulations.

Keywords: CCCFTA, current-mode, biquad, active-C

Pages: 259 - 262 | DOI: 10.15224/978-981-07-6184-4-57

58. A MULTI-ROUND ALGORITHM FOR MINIMUM PROCESSOR IN REAL-TIME DIVISIBLE LOAD SCHEDULING

Authors: IZA IN NURFATEHA RUZAN , MIMI LIZA ABDUL MAJID , PEGAH RAZMARA , SURIAYATI CHUPRAT

Abstract: Using of parallel and distributed system has become more common. Dividing data is one of the big challenges in this type of systems. Divisible Load Theory (DLT) is one of the proposed methods for scheduling data in parallel and distributed systems. Recent research has applied divisible load theory in real-time scheduling and has been introduced as an alternative for multiprocessor scheduling.There are two type of scheduling algorithm in real-time divisible load theory(RT-DLT) which is known as single-round and multi-round algorithm. Most studies in this field are about distributing data in single-round algorithm. Unfortunately, multi-round algorithms are difficult to analyze and have received only limited attention in real-time concept. In this paper, we will determine the minimum number of processors needed to complete the job by its deadline in multi-round algorithm. The two algorithms are compared on linear programming based formulation and result show that multi-round algorithm can

Keywords: Real-time Scheduling, Divisible Load Theory, Linear Programming, Single-round algorithm, Multi-round Algorithm

Pages: 263 - 266 | DOI: 10.15224/978-981-07-6184-4-58

59. EXPERIMENTAL INVESTIGATION REGARDING PREDICTION OF RESIDUAL LIFE OF TRANSFORMER USING FUZZY METHOD

Authors: PANKAJ SHUKLA , R.K JARIAL , SONU KUMAR , Y. R. SOOD

Abstract: An efficient intelligent system (FUZZY LOGIC) for the power transformer residual life assessment is presented in this paper. In the fuzzy method, different inputs and one output is used, that strictly depends on the number of membership function and their rule base and the type of the defuzzification method. The residual life of the transformers greatly influenced by the condition of the transformer insulation system. The insulation of winding de-teriorates during the normal ageing of the transformers. Paper insulation that contains cellulose molecules degrades due to heating or electrical breakdown dissolved in the transformer oil. Hence, the analysis of the Transformer oil gives correct evidence of variation in the property of the winding insulation during operation. Deterioration in transformer oil-paper insulation decreases both its electrical and mechanical strength that influence the age of the transformer. This paper presents a fuzzy logic method that has been implemented on thr

Keywords: Transformer oil, Condition Monitoring, Ageing, Parameters of transformer oil, and fuzzy logic controller.

Pages: 262 - 267 | DOI: 10.15224/978-981-07-6184-4-59

60. A COMPARATIVE STUDY OF WIRELESS TECHNOLOGIES:ZIGBEE, BLUETOOTH LE, ENOCEAN, WAVENIS,INSTEON AND UWB

Authors: HARNEET KAUR , SUKESHA SHARMA

Abstract: The major design challenge of home automation is to choose best standard for controlling devices in existing home environments without any changes in infrastructure. In recent years Zigbee was the promising technology for home automation. But, nowadays there are some other standards which give their best for controlling home devices. This paper presents an overview of different wireless communication standards by comparing their main features in terms of various metrics such as range, frequency band, maximum node count, security, and cost

Keywords: Wireless technologies, Bluetooth LE, Zigbee, Enocean, Insteon, Wavenis, UWB

Pages: 273 - 276 | DOI: 10.15224/978-981-07-6184-4-60

61. VIRTUAL IP GENERATION AND ALLOCATION TECHNIQUES IN MANETS

Authors: BIKRAMJIT SINGH , R.K SINGH , TANU PREET SINGH

Abstract: Mobile ad-hoc networks (MANET) are growing in popularity due to the abundance of mobile devices, the speed and convenience of deployment, and the independence of network infrastructure. In such an IP-based network, IP address assignment to mobile devices is one of the most important network configuration parameters. A mobile device cannot participate in unicast communications until it is assigned a free IP address and the corresponding subnet mask. One of the most important resources is the set of IP addresses that are assigned to the network. When a new node wants to join a network, it has to be assigned an IP address as part of its initialization. For assigning an IP address to nodes one should meet the following requirements: There should be no conflict in IP address assignment, i.e., at any given instant of time there should not be two or more nodes with the same IP address. An IP address is assigned only for the duration the node stays in the network. When the node departs the net

Keywords: unicast, communications, assigned, IP address

Pages: 277 - 280 | DOI: 10.15224/978-981-07-6184-4-61

62. EMBEDDED COST ALLOCATION METHOD: COMPARISON AND DISCUSSION OF USED METHODS

Authors: KSHITIJ GAUR , SHASHANK SHEKHAR SINGH , YOG RAJ SOOD , NIHARIKA YADAV

Abstract: This paper presents and analyses several methods for embedded cost allocation in deregulated electricity market environment. In this paper six embedded cost methods (postage stamp method, contract path method, MW-Mile, MW-cost, MVA-Mile, MVA-cost) are evaluated and tested on 6-Bus test system subjected to two bilateral wheeling transaction. The charges obtained from the different embedded cost methods are then compared.

Keywords: Embedded cost methods, postage stamp method, contract path method, MW methods, MVA methods.

Pages: 281 - 284 | DOI: 10.15224/978-981-07-6184-4-62

63. PREVENTING BLACK HOLE ATTACKS IN MOBILE ADHOC NETWORKS: A REVIEW

Authors: PREETI KAMRA , R.K SINGH , TANU PREET SINGH

Abstract: Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In this paper, a brief overview is given about the black hole attack on MANETs and various kind of routing protocols which get affected by the Black Hole attack along with an overview about the countermeasures to avoid it.

Keywords: MANETs, AODV, Routing protocol, black hole attack.

Pages: 285 - 287 | DOI: 10.15224/978-981-07-6184-4-63

64. OPTIMAL DELAY ANALYSIS IN MOBILE ADHOC NETWORKS USING TOPOLOGICAL MANAGEMENT OF NODES

Authors: HARWANT SINGH , BIKRAMJIT SINGH , R.K SINGH , TANU PREET SINGH

Abstract: Mobile ad-hoc network (MANET) is a multi-hop temporary autonomous system of mobile nodes with wireless transmitters and receivers without the aid of Pre-established network infrastructure. These networks provide dynamically changing network connectivity owing to mobility. The mobility model represents the moving behaviour of each mobile node in the MANET that should be realistic. It acts as a crucial part in the performance evaluation of MANET. The purpose of this paper is to study the impact of mobility on the performance of Ad-Hoc On-Demand Distance Vector Routing (AODV) protocol and propose a method to analyze the optimal delay in mobile ad-hoc networks and exploit the results in NS-2 simulator.

Keywords: Ad-hoc on Demand Distance Vector (AODV), MANET, Mobility Models, Network Simulator (NS-2).

Pages: 288 - 293 | DOI: 10.15224/978-981-07-6184-4-64

65. DECOMPOSITION OF TIME SERIES DATA, IN DISCRETE NON-LINEAR TIME SERIES DATA SYSTEMS

Authors: R.K.SINGH , SUNIL BHASKARAN

Abstract: Towards the end of the 20th century, we have seen an improved interest among Statisticians and Computer engineers to explore data from any data source with respect to the change in time. However, most of the techniques used remains the same as that used in conventional data mining. Capturing, indexing, representing and storing the data remains the key issue in time series data mining. Indexing is a very critical under job under noise conditions. The indexing system exploded the database volume. In time series data ming a statistical models which provides descriptions for the sampling of data, (data collected on global warming, flood and flood forecasting pattern etc) are deviced. In order to provide a statistical arrangement for describing the nature of a continues stream of data that fluctuate in a random fashion with respect to the time, we assume a time series can be defined as a collection of random variables indexed according to the order they are obtained. Here we are assuming a

Keywords: Time Series Data ming - TSDM, regression, segmentation, Time series decomposition, discrete time series, sampled series

Pages: 310 - 313 | DOI: 10.15224/978-981-07-6184-4-68

66. EVALUATION OF PENALTY USING AVAILABILITY BASED TARIFF (ABT) IN DEREGULATED POWER SECTOR

Authors: KSHITIJ GAUR , SHASHANK SHEKHAR SINGH , Y. R. SOOD , NIHARIKA YADAV

Abstract: The main objective of this paper is to evaluate the penalty or profit using Availability Based Tariff mechanism for real time imbalances between supply and demand during trading period. For existing markets, the market clearing price is based on bids received from the generators and consumers. Here, calculations are done for the generation side quadratic bid function.

Keywords: Availability Based Tariff, Capacity charge, Energy charge, Unscheduled Interchange Charge

Pages: 306 - 309 | DOI: 10.15224/978-981-07-6184-4-67

67. A REVIEW OF ADHOC ROUTING PROTOCOLS IN DIFFERENT MOBILITY MODELS

Authors: TANU PREET SINGH , R.K.SINGH , REEMA SHARMA .

Abstract: Adhoc Networks are multi hop wireless networks with dynamically changing network connectivity because of mobility. The protocol suite having many routing protocols designed for adhoc routing. The widely used adhoc routing protocol are Adhoc On Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Temporally - Ordered Routing Algorithm (TORA) and Destination Sequenced Distance Vector (DSDV). In this paper, the three random based mobility models such as Random walk, Random waypoint, and Random Directions were implemented. The two differ parametric conditions like End-to- end packet delivery delay and packet-delivery fraction are compared with respect to mobility speed, network size and traffic. The AODV protocols in Random Waypoint mobility model performs better than DSR, DSDV and TORA in Random walk and random Direction mobility model shows in simulation result. Depend on the observations, it is to suggest that AODV routing protocol can be used under high mobility since i

Keywords: AODV, DSDV, TORA, Mobility models, Ad hoc Networks

Pages: 294 - 298 | DOI: 10.15224/978-981-07-6184-4-65

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering