Loading...

Proceedings of

International Conference on Advances in Computing, Control and Communication CCN 2012

Date
17-Jun-2012
Location
new delhi - NCR , India
Authors
43
ISBN
978-981-07-2579-2

18 Articles Published

1. HABE (HIERARCHICAL ATTRIBUTE BASED ENCRYPTION) MODEL FOR SUPPORTING DYNAMIC STRUCTURE OF ORGANIZATION

Authors: GAURAV BALVANT DAGADE , SHAILESH KISAN HULE , SHARAD ARJUN JADHAV , SHASHIKANT GOVIND VAIDYA

Abstract: Due to rapid development in cloud computing and integration of new tools that enhances the development in cloud computing application, but cloud computing is in child state so that cloud security is often required. Many organizations want to store their confidential sensitive data in cloud in order to reduce capital expanses. Traditional way is to store data in encrypted format against the un trusted cloud service provider (CSP). The key problem is to maintain different organization structure and establishing un access control policy (UCP) for those confidential encrypted data, when users are no longer employee of organization. This paper aims to solve problem for supporting different organization structure and maintain their hierarchy of various users in the organizations, maintain record of employees. Our system is having integrating key feature of Hierarchical attribute based encryption (HABE) and cipher text policy attribute based encryption (CP-ABE) system, so as not only achieved

Keywords: Cloud computing, Hierarchical attribute-based encryption, Encrypted Data in Cloud server, Fine-grained access control, high Performance, User revocation.

Pages: 1 - 5 | DOI: 10.15224/978-981-07-2579-2-127

2. AN OVERVIEW OF POINT TO POINT PROTOCOL ARCHITECTURES IN BROADBAND ACCESS NETWORKS

Authors: PRANESH KULKARNI , SHANTALA PATIL

Abstract: Access technology holds key to getting attached to Internet from customer premises equipment in a broadband network. The use of different physical media types such as ATM, Ethernet and SONET have further paved way for use of one or combination of such access protocols to each one of media types. However, fundamentally Point to Point Protocol (PPP) has emerged as predominant solution for accessing broadband networks, and has generated wider acceptability among service providers. This paper discusses broadband network architecture and how PPP fits in overall scheme of things in broadband access network. Further various PPP protocol extensions over Ethernet (PPPOE), ATM (PPPOA) and combination (PPPOEOA) have been individually discussed in the context of their use cases

Keywords: Protocol, Architectures, Broadband Access

Pages: 6 - 10 | DOI: 10.15224/978-981-07-2579-2-347

3. PERFORMANCE ANALYSIS OF OPTICAL CDMA USING FUZZY LOGIC GENERATOR

Authors: NATER BALI , PRAVEEN KUMAR , ROHANCHADHA , SIDDHANT MATHUR , VIBHOR MITTAL

Abstract: Multiple accesses which uses the spread spectrum technology for transmission has become very popular in cellular radio networks. In this thesis, a highly spectral-efficient transmission technique based on optical code division multiplexing (OCDM) is investigated. Optical transmission systems have to meet the rapid increase in the demand of data bandwidth and spectral efficiency. OCDM provides asynchronous transmission, secure communication, soft capacity on demand, and high degree of scalability. In this paper, we have applied OCDM technique along with fuzzy logic generator which gives us improvement. Fuzzy Logic generator accepts VΠ and Ron/Ro ff and generates I/I0 in a non linear fashion

Keywords: CDMA (Code Division Multiple Access), OCDM (Optical Code Division Multiplexing), MAI Multiple Access Interference, BER (Bite Error Rate)

Pages: 11 - 14 | DOI: 10.15224/978-981-07-2579-2-350

4. A NOVEL APPROACH TO EXTRACT REGION FROM FACIAL EXPRESSION BASED ON MUTATION

Authors: DEBABRATA SAMANTA , GOUTAM SANYAL , MD ALAMGIR HOSSAIN

Abstract: The Mutation plays a very important role in the process of object (image) detection and its extraction. It has been considered in the form of matrices so that it can identify a space which is like that of a Euclidean-space. The covariance features' performance is superior and quicker than most of the procedure usually followed. This paper presents a new method for human face recognition by utilizing Mutation. Here Mutation based on region covariance matrices is used to simulate the effects of errors that happen with low probability during duplication. Both pixels locations and Mutation coefficients are employed to form the covariance matrices. Experimental outcomes reveal the advantages of this proposed method.

Keywords: Mutation Matrix, Face Detection, covariance

Pages: 15 - 18 | DOI: 10.15224/978-981-07-2579-2-39

5. EVALUATION OF BACKFILLING STRATEGIES BASED ON WORKLOAD MODELS

Authors: ADITI SHARMA , RAJKUMARIBHATIA

Abstract: Grid computing was initially proposed to harness huge amounts computational resources. But the expected potential could not be fully exploited because the Grid applications are from a wide range of users each having own special requirements. In order to serve the needs, scheduling requirements of grid application first need to be understood. In this paper we will compare the performance aggressive, and conservative backfilling strategies based on average weighted response time(AWRT) and average slowdown of the jobs as the performance metrics.

Keywords: Grid computing, backfilling, task scheduling, average slowdown, AWRT.

Pages: 19 - 23 | DOI: 10.15224/978-981-07-2579-2-411

6. A NEW SELF-TUNING FUZZY PI CONTROLLER FOR INTEGRATING PROCESSES WITH DEAD-TIME

Authors: RAJANI K. MUDI , RITU RANI DE

Abstract: We propose a robust non-fuzzy self-tuning scheme for fuzzy PI controllers (FPIC) for a class of systems. The output scaling factor (SF) of the proposed non-fuzzy self-tuning FPIC, termed as NF-STFPIC, is modified on-line based on the normalized change of error of the controlled variable. Performance of the proposed controller is evaluated for a pure integrating plus dead-time (IPD) and first-order integrating plus dead-time (FOIPD) processes with a wide variation in dead-time under both set-point change and load disturbance. Detailed performance comparison with conventional PI (both fuzzy and non-fuzzy) controllers as well as a self-tuning fuzzy PI controller (STFPIC) reported in the leading literature is provided with respect to a number of performance indices. Unlike STFPIC, which uses 49 expert's defined self-tuning fuzzy rules our NF-STFPIC uses a single deterministic rule. Experimental results justify the effectiveness of the proposed NF-STFPIC

Keywords: Fuzzy logic controller, Self-tuning FLCs, Scaling factor, Integrating process.

Pages: 24 - 28 | DOI: 10.15224/978-981-07-2579-2-426

7. SMART PHONE BASED MONITORING SYSTEM FOR BIPOLAR DISORDER PATIENTS

Authors: ALESSANDRO PUIATTI , SILVIA GIORDANO , STEVEN MUDDA

Abstract: A large number of personal healthcare monitoring systems are being researched, designed and tested to improve the health of people suffering from various illness. Bipolar disorder is a severe form of mental illness that is found to effect around 1% of the EU population. It is characterized by alternated episodes of mania and depression, and is typically treated with a combination of pharmacotherapy and psychotherapy. Early detection of these two alternative episodes would be of great help to doctors in providing medical aid to patients before they become maniac or depressed. In this paper we present the MONARCA a smart phone based monitoring system, that facilitates the recognition of early warning signs and predict maniac or depressive episodes. The system is centered around the mobile phone and minimally invasive wearable sensors that is being developed in the framework of the MONARCA European project.

Keywords: Smart Phone, Health Monitoring, Bipolar Disorder

Pages: 29 - 33 | DOI: 10.15224/978-981-07-2579-2-438

8. A NEW APPROACH FOR SECURE BAGGAGE MANAGEMENT AT AIRPORT USING ENCRYPTED TWO-DIMENSIONAL BARCODE

Authors: ATUL KUMAR SRIVASTAVA , SUNEETA AGARWAL

Abstract: One-dimensional (1D) barcode stores data in only one direction (horizontally), whereas in two-dimensional (2D) barcode, data is stored in both the directions (horizontally and vertically). Also, the amount of data that can be stored in 2D barcode is significantly greater than that stored in a 1D barcode. Here, we propose an approach for Baggage Management at Airport using 2D barcode for the first time, so that the baggage(s) of two passengers looking alike will not be interchanged and also misplaced or lost baggage(s) can be handled properly. This approach is also beneficial for the authentication of ticket, boarding pass as well as baggage(s) with the minimum use of the database. For the authentication, we use a unique ID like passport number, PAN number, etc., which is encrypted with a master key (issued by the Airport Authority) in the ticket barcode (encrypted 2D barcode on the ticket), boarding pass barcode (encrypted 2D barcode on boarding pass) and baggage(s) barcode (encrypted

Keywords: 2D Barcode, QR Code, Authentication, AES, encrypted 2D barcode.

Pages: 34 - 38 | DOI: 10.15224/978-981-07-2579-2-444

9. PHRASE MATCHING IN (S,C) DENSE CODE COMPRESSED FILES

Authors: JAGADISH DHARANIKOTA , SUNEETA AGARWAL

Abstract: Due to increase in the data size and limited network bandwidths there is need of compressing the data files. This compression technique saves the memory and data can be transferred faster over the network. Pattern matching on compressed files is one of the requirements for Information retrieval applications. Files compressed using (s ,c) dense code compression helps significantly to reduce the time for searching as it avoids the decompression of the compressed file for finding the pattern. In this paper we propose an approach for phrase matching in the compressed files by modifying standard string matching algorithms like hors pool and Sunday algorithm. This phrase matching can be used by search engines in relevant document retrieval for the given query. Pattern matching on (s, c) dense code compressed files had lots of advantages along with better compression ratios when compared to other standard compression algorithms. Searching the text on the compressed files is up to 8 times fast

Keywords: Frequency based codeword searching; Phrase Matching; (s,c) Dense Code

Pages: 49 - 52 | DOI: 10.15224/978-981-07-2579-2-451

10. REPROGRAMMING IN HETEROGENEOUS SENSOR NETWORKS

Authors: GURDIP SINGH , VISHAL BHATIA

Abstract: With advances in sensor networking technology, new applications involving remote and real-time data collection are becoming popular and becoming increasingly deployed. For applications that are deployed in remote locations or deployed at a large scale, over-the-air remote programming may be needed to update the application code executing on the sensor nodes. Deluge is a protocol that provides the capability of remotely reprogramming nodes in a wireless sensor networks. This protocol accomplishes reprogramming by injecting messages containing the code image into the network, which are then installed by the sensor nodes. While this protocol is very useful, it is applicable only to homogeneous networks wherein all nodes in the network must be programmed with the same code. This paper proposes a protocol that allows remote reprogramming of only a specific node in the network with a new code image. This allows different nodes to be programmed with different images, which is required in hete

Keywords: Sensor networks, pervasive systems, Remote data collection, communication protocols

Pages: 53 - 57 | DOI: 10.15224/978-981-07-2579-2-456

11. A NEW SELF-TUNING FUZZY PI CONTROLLER FOR INTEGRATING PROCESSES WITH DEAD-TIME

Authors: RAJANI K. MUDI , RITU RANI DE

Abstract: We propose a robust non-fuzzy self-tuning scheme for fuzzy PI controllers (FPIC) for a class of systems. The output scaling factor (SF) of the proposed non-fuzzy self-tuning FPIC, termed as NF-STFPIC, is modified on-line based on the normalized change of error of the controlled variable. Performance of the proposed controller is evaluated for a pure integrating plus dead-time (IPD) and first-order integrating plus dead-time (FOIPD) processes with a wide variation in dead-time under both set-point change and load disturbance. Detailed performance comparison with conventional PI (both fuzzy and non-fuzzy) controllers as well as a self-tuning fuzzy PI controller (STFPIC) reported in the leading literature is provided with respect to a number of performance indices. Unlike STFPIC, which uses 49 expert's defined self-tuning fuzzy rules our NF-STFPIC uses a single deterministic rule. Experimental results justify the effectiveness of the proposed NF-STFPIC.

Keywords: Fuzzy logic controller, Self-tuning FLCs, Scaling

Pages: 24 - 28 | DOI: 10.15224/978-981-07-2579-2-426

12. UPGRADED TANGO TREE TO SOLVE THE DICTIONARY PROBLEM AND ITS APPLICATIONS

Authors: SUNEETA AGARWAL , V S ANIRUDHA KAKI

Abstract: In 1989 Wilber [2] conjecture a lower bound O (log n) for a query using any balanced existing binary search tree with static data. Later in 2004 Domain et al.., [1] Came up with new lower bound O (loglogn) called interleave lower bound and he also claimed that these two lower bound O (log n) and O (loglogn) acts as a good tight intervals for any binary search tree. Tango tree was recently introduced by Demaine et al., [1], having O (loglogn) - competitive ratio. Tango tree [1] supports only lookup (search) operations, where most of the online algorithms (like dictionary problem, a cache problem, adaptive data compression, etc.,) need additions and removals of collections (key, value) too, which are not supported by tango trees [1]. In this paper, we propose a new upgraded version of tango tree which supports addition and removal of collections (key, value) dynamically without knowing the sequence before hand in O (loglogn) time. We show run-time analysis with experimental results. We a

Keywords: Binary search tree; Red-black tree; Splay tree;

Pages: 39 - 43 | DOI: 10.15224/978-981-07-2579-2-445

13. ANALYSIS OF NON-LINEAR POWER SYSTEM FOR THE DESIGN OF STABILIZING CONTROLLERS

Authors: AMIT KUMAR

Abstract: The objective of this paper is to develop the mathematical model of the non-linear power system that can be utilized for implementing the different class of controller. The controller designed here fulfills the stability requirement of the system as well as makes the system transiently stable. The linearization of the power system is done using direct feedback linearization technique and the model thus obtained has parameters which can be used as controller input. The linear LQ optimal control theory is applied to the model to design an optimal feedback control law, νf (t).

Keywords: DFL(direct feedback linearization).

Pages: 44 - 48 | DOI: 10.15224/978-981-07-2579-2-449

14. PERFORMANCE ANALYSIS OF SELECTION COMBINING IN N DUAL-HOP RELAY BRANCHES WITH INDIVIDUAL LINKS EXPERIENCING NAKAGANMI-M FADING

Authors: BABU SENA PAUL

Abstract: In recent years relay based communication has gained attention researchers and the scientific community. In this paper the source-to-destination statistics of a two hop amplify-forward relay branch, with the channel fading statistics of each hop being Nakagami-m distributed has been evaluated. The expression for the statistics of the signal envelope at the output of a selection combiner in the destination node of a N-path dual-hop relay braches is derived and compared with the simulation results. The statistics are helpful in evaluating the system performance in terms of bit error rate.

Keywords: co-operative relaying, selection combining.

Pages: 58 - 61 | DOI: 10.15224/978-981-07-2579-2-457

15. USING ROTATION METHOD FOR REMOVAL OF MISALIGNMENT OF SCANNED BRAILLE PATTERN

Authors: ARJUN AGARWAL , PARDEEP GARG , AVINASH AGRAWAL

Abstract: This paper presents a new algorithm to remove misalignment of scanned Braille pattern using image processing. It is known that because of scanner imperfections, error occurs in scanned Braille pattern document. In this paper indexing method has been used for fixing the corner pixel value of tilted Braille pattern. The proposed work employs basic triangular property. Thereby we have calculated the angle by which the corner dots have been thrown out of alignment on a respective side. Since a variety of different Braille patterns are available, some being regular and exactly symmetrical, sorting method is used for symmetrical and unsymmetrical Braille pattern. This simulation has been carried out in MATLAB (R 2010a) and yields almost perfect results with acceptable errors and removes misalignment of Braille pattern.

Keywords: Braille, Indexing, Median Filtering, Sorting, Image

Pages: 71 - 75 | DOI: 978-981-07-2579-2-465

16. USE OF GEOSYNCHRONOUS SATELLITES FOR PRODUCTION AND WIRELESS TRANSFER OF SOLAR POWER

Authors: AKHIL NAIR

Abstract: This study examines the use of Geosynchronous satellites for collecting sunlight, harnessing it to produce solar power and transmitting the generated power back to Earth using Wireless power transmission(WPT), safely and reliably. The advantage of placing solar cells in space is the 24 hour availability of sunlight. Also the urgency of finding an alternative energy source due to the depleting energy resources on earth calls for Space Based Solar Power. Here we study the concept of Solar Power Satellites (SPS), investigate the feasibility of implementation, the overall architecture & the underlying components. The results highlight the effectiveness of this system as an environment friendly, low-loss and large-scale method of energy transfer.

Keywords: transmission (MPT), Tesla, Wireless PowerTransfer(WPT),

Pages: 81 - 84 | DOI: 10.15224/978-981-07-2579-2-470

17. DETECTION ALGORITHM USING ADAPTIVE THRESHOLDING FOR IDENTIFICATION OF NORMAL AND CHEYNE - STOKES BREATHING

Authors: A. LAKSHMI SOODI , A. R. ANUSHA , S. PRAVIN KUMAR

Abstract: Respiratory rate measurement is one of the preliminary diagnostic parameter in clinical practice. The ratio of respiratory rate to that of heart rate is indicative of the health condition of the subject. However in cases where the respiratory disorders occur due to impairment of the respiratory centre in the brain, the analysis of the pattern of breathing becomes a must. This proposed work focuses on detection of normal and Cheyne - Stokes respiration which is periodic and provide a complete report based on the parameter.

Keywords: Respiratory, mechanism, periodic, wavelet transform

Pages: 85 - 89 | DOI: 10.15224/978-981-07-2579-2-474

18. IMPROVED ZONE ROUTING PROTOCOL WITH RELIABILITY AND SECURITY USING QUALNET NETWORK SIMULATOR

Authors: CHINMOY GHORAI , SAURAV GHOSH , SUMAN GAIN

Abstract: Zone Routing Protocol is a hybrid routing protocol in MANET. In real life scenario some links in MANET are unreliable due to interfering signals from neighboring network, ambient noise in the system and jamming signal from malicious nodes. These types of links are not accounted for in ZRP resulting in lower throughput, higher end-to-end delay and jitter. Furthermore zone radius is fixed in ZRP resulting in frequent zone switching for highly mobile nodes thereby increasing the control and maintenance overhead. Furthermore in ZRP border casting is used which does not guarantees shortest routing path and as consequence MZRP was developed which uses broadcasting and guarantees shortest path but with no path reliability and fixed zonal radius. We propose modified secure and efficient version of the MZRP coined as M2ZRP which takes into account the link SNR value as a measure of its reliability and security and also introduces the concept of variable zone radius. Qual Net network simulator i

Keywords: ZRP, RWP, SNR, GPS, Group Mobility, Proactive

Pages: 90 - 95 | DOI: 10.15224/978-981-07-2579-2-499

Popular Proceedings

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering