Refine your search
Collections
Co-Authors
- S. Dharanya
- V. Divya
- S. Shaheen
- K. Sruthi
- P. Padmakumari
- Kodali Lohita
- Adusumilli Amitha Sree
- Doreti Poojitha
- T. Renuga Devi
- V. Vishnu
- D. Manivannan
- S. Ambika
- R. Ezhilarasie
- M. Eyalarasi
- P. Shanthi
- P. Balakrishnan
- R. Kaviya
- D. Narmadha
- P. Shivaranjani
- M. Sujatha
- V. Gokul
- Kataru Venkata Kavya
- K. S. Suresh
- G. Nandhini
- S. Preethika
- R. Sharmila
- R. Thanuja
- Shweta Raj
- T. Renugadevi
- S. Amrutha
- T. Mohanraj
- N. Chakrapani Ramapriya
- K. Sasireka
- C. Aishwarya
- S. A. Bragadeesh
- M. Akshaya
- S. Kavitha
- T. Shobana
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Umamakeswari, A.
- Embedded Based 3G Security System for Prison
Abstract Views :473 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4492-4495Abstract
Safety measures and uninterrupted surveillance are essential in areas like bank safety locker room, defense systems, VIP's homes and Luxury hotels. Prison is also the place where there is a need for high security and severe surveillance system. There are several techniques used in these particular environments which include the traditional VHS (Video Home System) and DVR (Digital Video Recorder) system.VHS surveillance system usually has the video quality problem of displaying because the analog signal is directly sent to monitor without processing, which results in poor monitoring system. Instead the DVR demonstrates a better competence in the prison. The main objective of this work is to introduce the application of CCMS (Central Control and Monitoring System) with 3G technologies for prison management by using the low cost and low power sensors through the web or wireless network which reduces the manual work involved. It also reduces the money invested and power usage in providing electrical fencing in the prison. The use of motion detection sensors and additional digital I/O devices helps to prevent escapes of prisoners.Keywords
Pic Controller, CCMS, Prison Security, DVR System, Vibration Sensor, Ultrasonic Sensor, Smoke SensorReferences
- Arulogun O T, Omidiora E O et al. (2008). Development of security system using facial recognition, Pacific Journal of Science and Technology, vol 9(2), 377-386.
- Hamed B (2011). Real-time application surveillance security system based on LabVIEW, International Journal of Computer Theory and Engineering, vol 3(3), 398-407.
- Michael B, Andreas D et al. (2006). Distributed embedded smart cameras for surveillance applications, IEEE Computer Society, vol 39(2), 68-75 .
- Computerized Central Control Monitoring System for Queen Elizabeth Hospital, Available From: http://www.emsd.gov.hk/emsd/e_download/wnew/conf_papers/central_control.pdf.
- Held C, Krumm J et al. (2012). Intelligent video surveillance, Computer Journal, IEEE Computer Society, vol 45(3), 83-84.
- Guidelines on Application of Central Control and Monitoring Systems (2002). Available from: http://www.emsd.gov.hk/emsd/e_download/pee/Guidelines_CCMS.pdf.
- Coffin J S, Prokoski F J et al. (1992). Virtual custody systems for improved house arrest and prison security, Proceedings. Institute of Electrical and Electronics Engineers, International Carnahan Conference on Security Technology, 1992 Crime Countermeasures, 81-85.
- Manual for mikroC Pro. Online, Available from: http://www.mikroe.com/downloads/get/30/mikroc_pic_pro_manual_v101.pdf.
- Hassan M S, Arshad N W et al. (2012). Data Acquisition Process for Intelligent traffic light using vision sensor. Fourth International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 54-59.
- Oke A O, Olaniyi O M et al. (2009). Development of a microcontroller-controlled security door system, The Pacific Journal of Science and Technology, vol 10(2), 398-403.
- Allard T, Wortley R et al. (2006). The Purposes of CCTV in Prison, Security Journal, vol 19, 58-70.
- Wahyudi W A, and Syazilawati M (2007). Intelligent voice-based door access control system using adaptive-network-based fuzzy inference systems for building security, Journal of Computer Science, vol 3(5), 274-280.
- Zupan L L, and Menke B A (1991). The new generation jail: an overview, American Jails: Public Policy Issues, Chiacgo, 180-194.
- Amphibious Surveillance Robot with Smart Sensor Nodes
Abstract Views :612 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4496-4499Abstract
Robots have been widely used to perform variety of tasks which reduces the manual work specifically in remote areas where human accessibility is unimaginable. The main applications where the robots have exhibited their excellence include surveillance, tracking targets for military purposes and also for disaster management like searching and rescuing victims. This paper deals about an evolutionary Non-humanoid robot for surveillance with intruder protection capability. The unique feature of this surveillance robot is that it can travel both on land and water and is equipped with robotic arm to handle the work safely. It is armed with a low power high performance NXP processor which is able to manage power more efficiently. Besides being able to work in Semi-autonomous mode, the CCD (Charge Coupled Devices) along with camera aids the operator to control it in manual modeKeywords
Amphibious, CCD, NXP processor, Robots, Self-defending, SurveillanceReferences
- Mohebbi A, Safaee S et al. (2010). Design, simulation and manufacturing of a tracked surveillance unmanned ground vehicle, Proceedings of the IEEE International Conference on Robotics and Biomimetics, 1268-1275.
- Boult T E, Gaob X et al. (2004). Omni-directional visual surveillance, Image and Vision Computing, vol 22, 515-534.
- Hu C, Ma X et al. (2010). Reliable people tracking approach for mobile robot in indoor environments, Robotics and Computer-Integrated Manufacturing, vol 26, 174-179.
- Cougar 20H Sees through walls. Available from: http://www.darkgovernment.com/news/cougar-20h-sees-through-walls.
- Fire Ant, Available from: http://robotics.sandia.gov/fireant.html.
- Introduction to robots. Available from: http://www.galileo.org/robotics/intro.html.
- Zhang J, Song G et al. (2011). An indoor security system with a jumping robot as the surveillance terminal, IEEE Transactions on Consumer Electronics, vol 57( 4), 1774-1781.
- Doitsidis L, Weiss S et al. (2012). Optimal surveillance coverage for teams of micro aerial vehicles in GPS-denied environments using onboard vision, Autonomous Robot Journal, vol 33(1-2), 173-188.
- BenTzvi P, Ito S (2009). A mobile robot with autonomous climbing and descending of stairs, Robotica Journal, vol 27(2), 171-188.
- Buschmann T, Lohmeier S (2009). Humanoid robot Lola: Design and walking control, Journal of Physiology, vol 103(3-5), 141-148.
- Tang Y, and Zhang H (2008). An interactive mobile amphibious probing and surveillance system, Proceedings of the IEEE International Conference on Information and Automation (ICIA), 441-445.
- Kim Y, Kwak J et al. ( 2012). An autonomous terrain adaptation and user-friendly tele-operation of wheel-track hybrid mobile robot, International Journal of Precision Engineering and Manufacturing, vol 13(10), 1781-1788.
- Mohamed Z, and Capi G (2012). Development of a new mobile humanoid robot for assisting elderly people, International Symposium on Robotics and Intelligent Sensors (IRIS), Procedia Engineering, vol 41, 345-351.
- Link Aware Data Aggregation Mechanism Based on Passive Clustering in Wireless Sensor Network
Abstract Views :148 |
PDF Views:0
Authors
K. Sruthi
1,
A. Umamakeswari
2
Affiliations
1 Advanced Computing, SASTRA University, Tamil Nadu, IN
2 Department of Computer Science and Engineering, SASTRA University, Tamil Nadu, IN
1 Advanced Computing, SASTRA University, Tamil Nadu, IN
2 Department of Computer Science and Engineering, SASTRA University, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No 8 (2014), Pagination: 1236-1242Abstract
In Wireless Sensor Network (WSN) each node must report to the Base Station (BS) with the frequency that the BS demands (Nre). The paper proposes Enhanced Link aware Data Aggregation Mechanism (LDAM), an energy efficient data gathering algorithm that elects the Cluster Head (CH) and Gateway (GW) nodes based on the Predicted Transmission Count (PTC) that depends on the residual energy, forward and reverse delivery ratio. Once the clusters are formed, nodes calculate their distance(d) from CH based on which the nodes take-in varied transmission power. Based on the nodes weight, CH and GW are re-elected periodically and this enhances the nodes lifetime. Algorithm is simulated with varied number of nodes in the network, results prove to be efficient than LCM algorithm with respect to delivery ratio, energy consumed and average delay.Keywords
Forward And Reverse Delivery Ratio, Link Aware, Varied Transmission Power- Methodical Review on Various Fault Tolerant and Monitoring Mechanisms to improve Reliability on Cloud Environment
Abstract Views :232 |
PDF Views:0
Authors
Affiliations
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
1 CSE, School of Computing, SASTRA University,Thanjavur - 613401,Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Background/Objectives: Cloud computing is an emerging area that is currently pulling towards many of us. Cloud deployment is a difficult task in this layered structure. Handling the cloud environment itself an optimally a challenging job. This can be made feasible by using fault tolerance and monitoring services. Methods/Statistical Analysis: Fault Tolerance (FT) facilitates the process or the component to work smoothly even though in the occurrence of failure. Monitoring is a technique collects the information and to predict the fault before it occurs. Proactive and reactive measures can take place to run the cloud environment with tolerance in failure occurrence. Reviewing the potential of FT and monitoring services is to make out the technique that serves in certain purpose. Fault tolerance systems are important for both cloud provider and cloud customer. Findings: Based on this idea, this paper provides the different or diverse fault tolerance and monitoring mechanism to improve the reliability in a cloud environment. Applications/Improvements: It presents the information about the various techniques and methods used in the FT and also a future research direction in cloud FT.Keywords
Cloud Computing, Fault Tolerance, Reactive and Proactive, Reliability- Performance Analysis of Various Data Mining Techniques in the Prediction of Heart Disease
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Objective: The main objective of the work is to compare the heart disease prediction accuracy of different data mining classification technique and to find the best technique with minimum incorrectly classified instances. Different classification techniques are used to predict heart disease based on the factors that cause these diseases which include family history, age, obesity and some other factors. Method: This work is carried out in three phases. The First Phase is preprocessing of data set. The attributes like trestbps, cholesterol, tpeakbps and age are normalized and missing values are handled appropriately. The second phase is feature selection. The greedy hill climbing best first attribute evaluator is used to identify the subset of attributes based on its individual prediction ability. The third phase is comparison of prediction accuracy of different techniques in literature. Findings: The work has been evaluated using the performance metrics like accuracy, specificity, sensitivity, confusion matrix to prove the efficiency of different techniques. It was concluded that the Bagging algorithm achieved highest accuracy compared with other algorithms.Keywords
Classification, Data Mining, Heart Disease Prediction- Optimal Lane Finder using Sensor Fusion Techniques to Prevent Road Accidents
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Most of the accidents could be avoided or prevented through simple measures like speed limit, precautions for the driver’s safety and discipline among road users. Most of the accidents occur on highways, especially when changing lanes. This paper focuses on reducing such accidents by using Lane Keeping Assist System (LKAS). Methods: This LKAS is based on the concept of neural network model, which has a high complexity and high cost design for functional implementation. Findings: Though this system has more advantages, it cannot be implemented in all range of cars. In order to overcome this, a cost affordable, safety alert system suitable for all range of cars is proposed using low cost and low power consumption open source device, in which vehicles are incorporated with sensors which helps in notifying when the vehicle is overtake and makes it easier for people to control the movements of vehicle. Application/Improvement: It helps to indicate the unconditional changes of vehicle between the lanes and also reduce the accidents. Apart from this, fading and blinking of front head lights automated whenever approaching in opposite direction.Keywords
Kalman Filtering, Sensor Fusion.- A Survey on Live Migration Techniques of Virtual Machines
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing plays an imperative role in development of technology and makes the data available to the worldwide extent. Virtualization and virtual machines helps in enhancing the utility of the cloud computing to its maximum limit. Method: The method of replication of virtual machine in source physical machine to destination physical machine is known as migration of virtual machines. Live migration is a type of migration that deploys pre-copy, post copy, hybrid approach for transferring load. Finding: Load balancing is the foremost problems in data centres which can be handled by migration. This paper focuses on pre-copy approach and makes an investigation of the various pre-copy methods and its implementation. Applications: It helps in improving the utilization of data centres and load management with minimum downtime and no page faults.Keywords
Cloud Computing, Live Migration, Load Balancing, Pre-copy Approach, Virtual Machines.- Multilevel Threshold Secret Sharing Scheme to Secure MapReduce Computations in Cloud Computing Environment
Abstract Views :170 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing has evolved in recent days and is applied in various fields for effective resources and infrastructure in a distributed environment. Data analysis is the core functionality in cloud computing where large amount of data called Big Data is processed over clusters. Methods: MapReduce is one of the solutions for handling big data in the cloud environment because of its scalability and fault tolerance in a phased manner. Multiple data sets are joined to do complex data analysis for computation on certain aggregates. A common problem is whether MapReduce could be customized to get a scalable system, when the jobs are split and reduced. Also most of the systems do not consider the issue of security in MapReduce phases. Findings: The proposed solution uses multilevel threshold secret sharing to perform MapReduce operations providing secure processing. The solution extends MapReduce framework to improve security and also results in higher efficiency. The mechanism presents lower overhead costs when compared to the existing ones and has essential application in Big Data cloud environment. Applications: These approaches are lower cost and higher efficiency in cloud environment.Keywords
Big Data, Cloud Computing, MapReduce, Security.- An Energy Efficient Code Offloading Approach for Mobile Cloud Computing
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: This research work proposes a methodology for estimating the energy consumption of tasks by considering processor and memory usage. Methods: To facilitate energy efficiency in CPU, the mobile devices may be operated at different frequencies during the execution of tasks. This research work applies CPU frequency scaling as its base to achieve energy efficiency. Besides, it also considers energy consumption during memory access while making the offloading decision. Findings: The proposed approach uses energy consumption during computation as well as memory access as its metric to conceive the offloading decision. Additionally, the proposed energy model is simulated and the results are concluded that there is a considerable amount of energy saving in mobile devices due to computation offloading to nearby mobile devices or cloud resources. Applications: To save energy decide which application in mobile as energy consume considered as model. The models work as code offloading in MATLAB and determine by two level genetic algorithms. The efficiency of proposed model is evaluated by a simulation and average energy result can be concluded for a mobile device.Keywords
Frequency Scaling, Mobile Cloud Computing, Offloading, Task Interaction Graph.- Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing
Abstract Views :153 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Background/Objectives: Cloud computing supports many enterprise and government organizations in business perspective due to its advantage such as high scalability and high flexibility. However, despite potential gains that can be achieved, security is fundamental issue. Denial of service attack attempted by attacker to exhausts the resources available to a network, application or service. The orchestrated flow of attack patterns by attacker affect the customers in terms of financial cost cause service inability to legitimate users, attacker overloads target system with massive amount of request, which results in loss of equipment resources affecting network bandwidth. Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users. Findings: The proposed technique helps in differentiating legitimate and illegitimate users. The attack can be controlled by locking out malicious user access. Thereby the financial cost can be controlled by preventing the resource consumption by malicious node. Applications The proposed methodology can be applied in signature based analysis and strong user identification. There by providing security by building Anti-spam devices at customer site such as E-commerce application. Applications: The proposed methodology can be applied in the signature based analysis and strong user identification. Thus providing security by building Anti-spam devices at customer site, such as in an e-commerce application.Keywords
Access Control List, Attack Pattern, DDoS, DoS, Lockout Policy, Service Inability.- Healthcare Tracking using Data Mining Approaches: a Review
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objecet: state the objectives of your study Methods: This review investigates the value of more than a few Data Mining systems similar to classification such as K-Nearest Neighbor (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Neural Network (NN), Bayesian Methods in fitness area. Mention the data source accessed; keywords used; inclusion and exclusion criteria Findings: State the outcome of your study Applications: Some of the major applications of data mining in healthcare are evaluation of treatment effectiveness, management of healthcare, customer relationship management, and the detection of fraud and abuse.Keywords
Bayesian, Classification, Data Mining, Healthcare.- A Review of Wireless Sensor Networks in Automated Irrigation
Abstract Views :126 |
PDF Views:0
Authors
Affiliations
1 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: The objective of making the irrigation system automated is not only to decrease the human intervention but also to irrigate optimal water to the crop without affecting its growth. The aim of this paper is to focus on existing technologies for making the irrigation process autonomous and effective use of wireless sensor networks. Method: Many existing methodologies use threshold based algorithm and fuzzy logic which lead to imprecise output. Findings: For the effective automated irrigation, the factors such as the algorithm for finding reference evapo-transpiration and the sensor node capabilities in terms of processing and communication unit and possible exceptions during the irrigation process all have to be considered to have a precise agriculture. Applications: Agriculture is an important area where sensors are deployed for providing abundant benefits like determining the water requirement of the crop, fertility of the soil, index of the leaf area, temperature of the leaf, data about local climate, water quality, water overflow, water continuity etc.Keywords
Automated Irrigation, Fertility, Optimal Water, Wireless Sensor Networks.- A Telepresence Mobile Robot Controlling and Real Time Detection using Internet of Things
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 Embedded Systems, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Embedded Systems, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objective: Today, the field of versatile mechanical tele presence is in fast development, with an expanding measure of business frameworks and quick extensions. Methods: There are two techniques to control the robot in which one is a wired and the other is wireless. Customarily, they are called as LAN and IOT. An advanced mobile phone individual hotspot is used to control and screen the robot. Consequently, the Raspberry Pi board and PC are associated with advanced mobile phone. Findings: With a specific end goal to upgrade the client's capacity to remotely convey, control and feel present in a remote domain, the emphasis is more on 1. Semi-independent robot control 2. Situation mindfulness by ongoing face identification 3. People following or individual’s collaboration along these lines utilizing Raspberry Pi model B as a part of which a robot is controlled through wired innovation and web of things which has boundless scope territory and the robot can be controlled more than a few million kilometers furthermore offloads some calculation on the cloud. Applications: The clients may be able to influence remote regions such that the robot position, activities, developments and so forth are detected, and transmitted.Keywords
A Semiautonomous Telepresence Mobile Robot, Controlling and Real Time Detection, Internet of Things, Security Surveillance.- Connecting End Clients Using the Lightweight Protocol CoAP over the Internet of Things
Abstract Views :148 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Communication between the clients over the internet poses the main challenge i.e., to build a secured network that keeps up with the demand, by simultaneously reducing the energy consumption. This communication can be achieved by installing certain add-ons in the client and server sides. Methods: In the existing methods, the communication between the end clients using CoAP protocol is a difficult task. In the proposed architecture, the main task is to achieve the communication between the end clients without gateways or intermediate proxies. In this method, the ports used for the HTTP (8000) and CoAP (5683) protocols are to be opened simultaneously for achieving communication. With the help of this protocol, the end clients can be connected over the internet. Findings: CoAP uses Universal Datagram Packets (UDP) since it uses its own DTLS security for the embedded devices. The system makes use of the Web IOPi and the txThings, a framework to communicate with the CoAP. Applications: In this work, txThings and WebIOPi are used in the Raspberry Pi and add-ons are installed along with the txThings and WebIOPi in the Web Browser using the command line interface. Since the Raspberry Pi used which is embedded device, the energy is saved. The implemented system can be used in diverse real time applications. The implementation is done in the frontend so that it can be controlled over the internet with the help of the CoAP protocol.Keywords
CoAP, IoT, txThings, WoT, WebIOPi.- Image Compression and Wireless Multimedia Sensor Networks – A Survey
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Wireless Multimedia Sensor Network (WMSN) is a fast emerging technology, which can deal with audio, image and video along with scalar data. WMSN is widely used for many applications like wildlife monitoring, medical imaging and surveillance. The survey is to investigate the several image compression methods that are intended for WMSN. Methods: Compression techniques are used to minimize the volume of data transmitted, which in turn reduces the sum of communication power and processing power. Any operation performed on multimedia data should be lightweight and so traditional image compression techniques are not suitable. This mandates the growth of new techniques or modification of existing methods to make them suitable for WMSN. Findings: Suitability of the methods is analyzed by the metrics like compression efficiency, processing speed, memory requirement, power consumption, computational load and system complexity. It is found that SPIHT is the most suitable with limitations of moderate memory usage. Distributed Source Coding and Compressive sensing are in the developmental stage and will influence the future vision of image compression in WMSN. Applications: Every method has its own merits and demerits. The one to be chosen is entirely dependent on the application or user needs, the hardware/software platforms used for implementation and the cost constraints. The most desirable algorithm can be chosen and enhancements can be done as per the demands.Keywords
Image Compression Algorithms, Memory Requirement, Power Consumption, Wireless Multimedia Sensor Network.- Data Aware Aggregation Technique for Environmental Monitoring in Wireless Sensor Networks
Abstract Views :143 |
PDF Views:0
Authors
Affiliations
1 Embedded System, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Embedded System, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: In WSN, several sensor nodes are used which having sensing and communication capabilities. It considers energy awareness as essential. Methods: In this method, using average data aggregation can be effectively reduced the energy consuming. Each device node used to sense the information about environmental conditions and finally data will be sent to the destination. In this proposed work, it generates the similar data by recognizing sensors which are in the similar location using Average Data Aggregation and send it to the destination. Finding: In this result, other than showing average aggregated value for similar data in case of any abnormal environmental condition it directly shows such abnormal reading in the base station. Improvements/Applications: Therefore, it eliminates redundant data and minimizes the data transmission and performs load balancing.Keywords
Data aggregation, Nodes, Sensors, Wireless Sensor Network.- Zigbee-Based Collision Avoidance System in Blind Spot and Heavy Traffic using Ultrasonic Sensor
Abstract Views :207 |
PDF Views:0
Authors
Affiliations
1 Embedded System, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Embedded System, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: In India, the frequency of traffic collisions is among the highest in the world. Most of the accidents are due to blind spots which cannot be directly observed by the driver at control. The paper proposes a collision avoidance system due to blind spots and in the case of heavy traffic scenarios. Methods: The proposed system avoids collision in blind spot and in heavy traffic and does not follow the path of preceding vehicle if the space between detector (Our Vehicle) and host vehicle is in proximity. For implementation of the system, Arduino boards and other drivers along with ultrasonic sensor are used and ZigBee is used for data communication between two nodes. Findings: The Blind Spot Detection (BSD) procedure based on wireless detecting technique ZigBee is proposed to monitor the blind spot region for the presence of interferences, automobiles, or other objects with the aid of ultrasonic sensor. For detecting the vehicles in blind spot, Neural Fuzzy Logic is used for the proposed system. The connection models for the developed system is identified and proposed. The paper also discusses about the advantages of ZigBee over other wireless technologies. The Wireless Technology identified is ZigBee which will lower the wiring connection in the vehicles. Applications: This method is useful to avoid collision in blind spot and also lowered the wiring connection in the vehicles by using ZigBee. Hence, the proposed system discovers its application in real time and gives collision free environment. The system is evaluated for different driving scenarios and results are discussed.Keywords
Blind Spot Detection, Collision-Avoidance System, ZigBee Pair.- Integrated Search System using Semantic Analysis
Abstract Views :139 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: With the rapid growth of technology drastically there is an increase in users of computer system. Search system plays a vibrant role in optimizing the search time. Methods/Statistical Analysis: The integrated search system has the need of improving search accuracy and expanding their coverage of search. This can be done using concepts of semantic analysis. Findings: In this paper an integrated system is formulated by accumulating multiple sources such as local storage, secondary storage and online repositories. The keyword is contextually interpreted by making use of ontologies, using this interpretation of the keyword the required multimedia or/and textual data is searched as intended by the user. Applications: This integrated search system analyzes the meaning of the query and provides the search result according to the intention of the user through is proper expansion of keyword.Keywords
Integrated Search, Ontology, Semantic Analysis.- A power analysis tool for an embedded application to support decision based Offloading
Abstract Views :141 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objective: The power factor parameter plays an imperative role in design specification of embedded systems as large number of applications that runs on these systems is power critical. To develop a power efficient system, it is essential to know how power is consumed throughout the system. Methods: A proper power analysis tool is designed by partitioned the application and measures the power consumption in each partitioned block. Findings: This tool can be very helpful in the verification process of any embedded systems applications to meet the power constraints. Applications: This tool can be applied in mobile cloud computing environment to determine the power consumed task to get offloaded onto the cloud.Keywords
Control Flow Graph, Embedded System, Power Optimization, Power Profiling.- Data Dissemination Framework for IoT based Applications
Abstract Views :136 |
PDF Views:0
Authors
S. Amrutha
1,
T. Mohanraj
1,
N. Chakrapani Ramapriya
1,
M. Sujatha
1,
R. Ezhilarasie
1,
A. Umamakeswari
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objective: There is a need for a distributed data storage mechanism to reduce the probability of data loss and cope with node failure as well. The increase in amount of data generated in the wireless sensor network necessitates an innetwork data aggregation protocol that creates summaries of data as information is disseminated in the network. Methods: An effervescent aggregation technique has been formulated that makes use of the existing data redundancy in the dissemination-based network and combines it with consistency checks to filter false aggregate information. A greedy approach is formulated to keep the copies of the data in the nearby neighbour who has greater capacity. Findings: Architecture designed for in-network aggregation helps in dealing with a large amount of data by eliminating redundant information and at the same time distributes the aggregate information in the nearby node since dissemination deals with memory shortage and node failure. Applications: The benefits of the system include that the redundant copies are maintained in some other nodes which has higher memory and power this may, in turn, increase the reliability of the data in nodes of sensor networks and the availability is ensured during the communication with sinks.Keywords
Data Dissemination, Data Replication, Wireless Sensor Networks.- Securing Data in Cloud Storage by using Steganography and Merkle Hash Tree Algorithm
Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamilnadu, IN
1 School of Computing, SASTRA University, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Cloud computing is incomprehensible creating innovation, the testing issue is the way to successfully share encoded information in cloud computing. Cloud server randomly produces primary, secondary and access keys, after record is made in the server for specific information proprietor. Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud. Cloud server creates shared key utilizing the primary and secondary keys of data user and data owner in order to avoid unauthorized sharing of data. Data proprietor can share the information to different users by sending mutual key to users by means of e-mail safely. Mutual key is likewise covered into a picture for securing that key. Original information is downloaded strictly to check the mutual key. Findings: The exchange of secret data to the authorized user effectively promotes data confidentiality and integrity. By giving mutual key to the cloud server, the user can see the document. Applications: The method can be applied to share confidential data stored in cloud with small cipher text expansion.Keywords
Cloud Computing, Data Security, Image Splitting, Key Generation, Steganography.- Energy Aware Fault Tolerant Clustering and Routing Mechanism for Wireless Sensor Networks
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 CSE, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: The key constructions of Wireless Sensor Networks (WSN) are energy conservation and battery depletion of the sensor nodes which are restricted and irreplaceable. Designing an economical clustering and routing mechanism ought to incorporate these problems for large scale WSN. Methods: “Energy Aware Fault Tolerant Clustering and Routing Mechanism” is proposed in this work for efficient clustering and fault-tolerant routing. The main idea behind this mechanism is to spot a node which lies in next position to cluster head in terms of energy and configuring it to sleep mode. Findings: This is chiefly done to realize fault tolerance by activating the node in sleep mode during the failure of the cluster head. Intensive experiments were performed on this technique and the results are compared with the previous algorithms. Applications/Improvements: Energy-Aware Fault Tolerant techniques are effectively used in applications of WSN like army reconnaissance, environmental monitoring etc.Keywords
Base Station (BS), Cluster Head (CH), Fault Tolerance, Wireless Sensor Networks (WSN).- Secure Data Aggregation for Wireless Sensor Network using Lightweight Cryptography
Abstract Views :139 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: A reliable and effective data communication is required without imposing overheads in terms of energy, communication costs, processing and the network latency. Data aggregation is the process which provides capabilities like In-Network processing, reducing the communication overhead, eliminating redundant packet transmissions and increases the lifetime of the network. Methods: A method for implementing secure data aggregation using Lightweight Cryptographic primitives is proposed which is suitable for resource constrained networks. Security services provided include authentication, integrity and confidentiality. A Lightweight Cryptography algorithm SPECK is used for encryption and decryption of the aggregated data. Instead of using the same key repeatedly an unique key is generated for every session. Findings: By implementing security primitives it is possible to provide basic services that are required to make the established network immune to attacks. The proposed method is analysed in terms of execution time, memory usage and throughput and provides better results in comparison to existing standard encryption algorithms. Application/Improvement: It is very well suited for application in which the data needs to be processed periodically and continuously. The future scope of work includes analyzing the scalability and communication overhead for large network of nodes and Homomorphic evaluation of the algorithm to deliver end-to-end security services.Keywords
Lightweight cryptography, SPECK, Secure Data Aggregation, Wireless Sensor Network.- Hybrid Fault Tolerant Scheme to Manage VM Failure in the Cloud
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: To managing the Virtual Machine and improve the reliability and availability of the resources using Hybrid fault tolerance method. Methods/Statistical Analysis: Basically two main fault tolerant policies namely reactive fault tolerance and proactive fault tolerance. Reactive fault tolerant techniques attempts to reduce the effort required for recovery after a failure, whereas a proactive fault tolerant technique attempts to prevent the occurrence of a fault. The existing method aims to prevent the occurrence of VM failure using a proactive fault tolerant technique which is a static method. But it provides no solution for VM failure, which might occur while the application is still running. The proposed paper ensures reliability of VM by considering both the reactive and proactive techniques in hybrid ways of tolerating the VM failure. In the proposed system, two types of VM failure, insufficient storage and variable capacity change are detected. These failures are tolerated using a self healing mechanism implemented at the host level. Result: The proposed scheme is implemented using Cloudsim simulator, in order to highlight the performance of how VM can be managed. Applications: Virtual Machine failure can be managed and improve the reliability and availability of resources using hybrid fault tolerance scheme.Keywords
Cloud Computing, Fault Tolerant, Proactive and Reactive Techniques, Self-Healing, VM Failure.- Stock Market Prediction using Hierarchical Agglomerative and K-Means Clustering Algorithm
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: The stock market performance has more impact on national economy. The purpose of this work is to generate a portfolio to reduce the uncertainty of stock in short term basis. Methods: Hierarchical clustering is more efficient while non-determinism is of concern when compared with flat clustering. Hierarchical agglomerative Clustering is used, which results in more informative structure than flat clustering on unstructured data. Single-link clustering is taken into account as it does not pays more attention to outliers and amalgamation criterion is local than complete-link clustering and results in intuitive cluster structure. Dendrogram is used to represent the progressive formation of clusters in HAC. Findings: Flat clustering K-means algorithm is used to combine the clusters generated by Hierarchical agglomerative clustering (HAC). As the number of samples has been reduced, iterative use of k-means will choose better centroid. Applications: The final list of the recommended stocks is then showcased to the investor on short term basis. The baseline data is downloaded from National Stock Exchange (NSE).Keywords
Dendrogram, Hierarchical Agglomerative Clustering (HAC), Single-Link Clustering.- Updating Distributed Cache Mechanism using Bloom Filter for Asymmetric Cryptography in Large Wireless Networks
Abstract Views :139 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Public key cryptography helps in achieving information security in wireless networks. Public key will be issued by CA (Certificate Authority). But having CA in wireless network makes it vulnerable to various attacks. Hence distributed cache was proposed where each node in network caches public key of some nodes existing in network in its cache and request to obtain keys not cached will be made via trusted nodes. Due to limited memory only few keys can be cached. There exists an optimal threshold value for caching keys so that equal number of both local nodes and remote nodes public keys can be cached. Methods: Random replacement policy was used for updating cache contents, where if a node’s local/ remote key cached ratio exceeds optimal ratio then a key will be randomly chosen from the cache and will be removed. Here we propose implementation of bloom filter in cache to cache public key of nodes existing in network. Findings: By using bloom filter of large size, more number of public keys can be cached thereby providing space and time advantage and reduces query cost with increased usage of memory. MAC (Media Access Control) id and PSN (Processor Serial Number) are used for uniquely identifying each node in network and are stored in encrypted format. When mismatch is found in encrypted MAC id and PSN, then that node is determined to be malicious node and its id will be notified to all nodes in network thus excluding the node from making any communication to other nodes in the network. Applications: Used for checking an element’s presence in the set thus reducing I/O lookup when large data set is used. Used as an alternative to cache as it uses limited memory more efficiently than cache does.Keywords
Bloom Filter, Certificate Authority, Distributed Cache, PSN (Processor Serial Number), Public Key Cryptography.- A Review on Prediction of Stock Market using Various Methods in the Field of Data Mining
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: In the current emerging competitive market, predicting the stock returns as well as the company’s financial status in advance will provide more benefits for the investors in order to invest confidently. Stock prediction can be done by using the current and previous data available on the market. Methods: The performance metrics that need to be attained in case of stock prediction are accuracy, scalability and less time consumption. There are many researches done so far in order to predict the stock market to achieve the defined metrics. Many models have been available in the field of data mining for predicting the stock market such as if-then-else rules, Artificial Neural Network (ANN), Fuzzy systems, Bayesian algorithm and so on. Findings: In this paper, the various methods available and used for predicting the stock market are discussed. This survey helps to know which technique is the best to use in the field of predicting stock market in the area of mining. Applications: Forecasting and predicting the trends of market is the most important applications of stock market. It also uncovers the future market behavior which always helps the investors to understand when and what stocks can be purchased for the growth of their investment. For this reasons, many of the researches have been done so far in the area of analyzing the stock market using data mining.Keywords
Data Mining, Methodologies, Prediction, Review, Stock Market.- Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction
Abstract Views :145 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN