-
BER Analysis of Full Duplex Relay assisted BPSK-SIM based VLC System for Indoor Applications
Authors:
L Bhargava Kumar,
Ramavath Prasad Naik,
Datta Choudhari,
Prabu Krishnan,
Goutham Simha G D,
Jagadeesh V K
Abstract:
This paper contemplates a relay-assisted visible light communication (VLC) system, where the light source (Table lamp) acts as a relay node and cooperates with the main light source. Following the IEEE 802.15.7r1 VLC reference channel model, we assume that there are two different light sources present in an office room. The first one is the source terminal present on the ceiling and another one is…
▽ More
This paper contemplates a relay-assisted visible light communication (VLC) system, where the light source (Table lamp) acts as a relay node and cooperates with the main light source. Following the IEEE 802.15.7r1 VLC reference channel model, we assume that there are two different light sources present in an office room. The first one is the source terminal present on the ceiling and another one is the desk lamp that serves as the relay station which works in full-duplex method. Because of the loop interference channel, we model VLC relay terminal using ray tracing simulations. We have analyzed bit error rate (BER) performance of the relay-assisted VLC system using binary phase shift keying-subcarrier intensity modulation (BPSK-SIM) technique. The proposed method outperforms existing phase shift keying (PSK) and square M-quadrature amplitude modulation (M-QAM) techniques. The proposed VLC system using BPSK-SIM technique achieves a BER performance of for an SNR of 20 dB. The results of proposed full duplex and half duplex relayed VLC system are evaluated using equal power allocation (EPA) and optimum power allocations (OPA) techniques over three different modulation schemes which are 2-PSK, square M-QAM, BPSK-SIM.
△ Less
Submitted 8 July, 2023;
originally announced July 2023.
-
Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
Authors:
Dhinakaran D,
Joe Prathap P. M,
Selvaraj D,
Arul Kumar D,
Murugeshwari B
Abstract:
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori…
▽ More
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algorithms that can obtain maximum privacy, data utility, and time savings while doing so. This paper proposes a unique double encryption and Transaction Splitter approach to alter the database to optimize the data utility and confidentiality tradeoff in the preparation phase. This paper presents a customized apriori approach for the mining process, which does not examine the entire database to estimate the support for each attribute. Existing distributed data solutions have a high encryption complexity and an insufficient specification of many participants' properties. Proposed solutions provide increased privacy protection against a variety of attack models. Furthermore, in terms of communication cycles and processing complexity, it is much simpler and quicker. Proposed work tests on top of a realworld transaction database demonstrate that the aim of the proposed method is realistic.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Open RAN: Evolution of Architecture, Deployment Aspects, and Future Directions
Authors:
Prabhu Kaliyammal Thiruvasagam,
Chandrasekar T,
Vinay Venkataram,
Vivek Raja Ilangovan,
Maneesha Perapalla,
Rajisha Payyanur,
Senthilnathan M D,
Vishal Kumar,
Kokila J
Abstract:
The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this…
▽ More
The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this article, we first discuss the evolution of RAN and then the O-RAN Alliance standardization activities and objectives to provide a comprehensive overview of O-RAN from a standardization point of view. Then, we discuss the O-RAN security aspects, use cases, deployment aspects, and open source projects and related activities in other forums. Finally, we summarize the open issues, challenges, and future research directions to explore further for in-depth study and analysis.
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
Use of Electronic Resources by Law Academics in India
Authors:
Mane Sunita D,
Subaveerapandiyan A
Abstract:
This study investigated e-resources use, storage, the preferred format for reading, and difficulties faced while accessing e-resources. Electronic resources are playing a crucial role all over the world, and they are increasing widely in all age groups of the academic community. The main aim of the law academics' role is to know the effective use of electronic resources. For this study, we adopted…
▽ More
This study investigated e-resources use, storage, the preferred format for reading, and difficulties faced while accessing e-resources. Electronic resources are playing a crucial role all over the world, and they are increasing widely in all age groups of the academic community. The main aim of the law academics' role is to know the effective use of electronic resources. For this study, we adopted a descriptive survey research design that was used to collect feedback from the respondents through the survey and Google form. The study samples are Progressive Education Society's Modern Law College affiliated with Savitribai Phule Pune University. BA LLB students are samples of the study.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Adaptive-Gravity: A Defense Against Adversarial Samples
Authors:
Ali Mirzaeian,
Zhi Tian,
Sai Manoj P D,
Banafsheh S. Latibari,
Ioannis Savidis,
Houman Homayoun,
Avesta Sasan
Abstract:
This paper presents a novel model training solution, denoted as Adaptive-Gravity, for enhancing the robustness of deep neural network classifiers against adversarial examples. We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid. We use the centr…
▽ More
This paper presents a novel model training solution, denoted as Adaptive-Gravity, for enhancing the robustness of deep neural network classifiers against adversarial examples. We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid. We use the centroid associated with each cluster to derive an anti-gravity force that pushes the centroids of different classes away from one another during network training. Then we customized an objective function that aims to concentrate each class's features toward their corresponding new centroid, which has been obtained by anti-gravity force. This methodology results in a larger separation between different masses and reduces the spread of features around each centroid. As a result, the samples are pushed away from the space that adversarial examples could be mapped to, effectively increasing the degree of perturbation needed for making an adversarial example. We have implemented this training solution as an iterative method consisting of four steps at each iteration: 1) centroid extraction, 2) anti-gravity force calculation, 3) centroid relocation, and 4) gravity training. Gravity's efficiency is evaluated by measuring the corresponding fooling rates against various attack models, including FGSM, MIM, BIM, and PGD using LeNet and ResNet110 networks, benchmarked against MNIST and CIFAR10 classification problems. Test results show that Gravity not only functions as a powerful instrument to robustify a model against state-of-the-art adversarial attacks but also effectively improves the model training accuracy.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
DITTO: Data-efficient and Fair Targeted Subset Selection for ASR Accent Adaptation
Authors:
Suraj Kothawade,
Anmol Mekala,
Chandra Sekhara D,
Mayank Kothyari,
Rishabh Iyer,
Ganesh Ramakrishnan,
Preethi Jyothi
Abstract:
State-of-the-art Automatic Speech Recognition (ASR) systems are known to exhibit disparate performance on varying speech accents. To improve performance on a specific target accent, a commonly adopted solution is to finetune the ASR model using accent-specific labeled speech. However, acquiring large amounts of labeled speech for specific target accents is challenging. Choosing an informative subs…
▽ More
State-of-the-art Automatic Speech Recognition (ASR) systems are known to exhibit disparate performance on varying speech accents. To improve performance on a specific target accent, a commonly adopted solution is to finetune the ASR model using accent-specific labeled speech. However, acquiring large amounts of labeled speech for specific target accents is challenging. Choosing an informative subset of speech samples that are most representative of the target accents becomes important for effective ASR finetuning. To address this problem, we propose DITTO (Data-efficient and faIr Targeted subseT selectiOn) that uses Submodular Mutual Information (SMI) functions as acquisition functions to find the most informative set of utterances matching a target accent within a fixed budget. An important feature of DITTO is that it supports fair targeting for multiple accents, i.e. it can automatically select representative data points from multiple accents when the ASR model needs to perform well on more than one accent. We show that DITTO is 3-5 times more label-efficient than other speech selection methods on the IndicTTS and L2 datasets.
△ Less
Submitted 5 June, 2023; v1 submitted 10 October, 2021;
originally announced October 2021.
-
VisBuddy -- A Smart Wearable Assistant for the Visually Challenged
Authors:
Ishwarya Sivakumar,
Nishaali Meenakshisundaram,
Ishwarya Ramesh,
Shiloah Elizabeth D,
Sunil Retmin Raj C
Abstract:
Vision plays a crucial role in comprehending the world around us. More than 85% of the external information is obtained through the vision system. It influences our mobility, cognition, information access, and interaction with the environment and other people. Blindness prevents a person from gaining knowledge of the surrounding environment and makes unassisted navigation, object recognition, obst…
▽ More
Vision plays a crucial role in comprehending the world around us. More than 85% of the external information is obtained through the vision system. It influences our mobility, cognition, information access, and interaction with the environment and other people. Blindness prevents a person from gaining knowledge of the surrounding environment and makes unassisted navigation, object recognition, obstacle avoidance, and reading tasks significant challenges. Many existing systems are often limited by cost and complexity. To help the visually challenged overcome these difficulties faced in everyday life, we propose VisBuddy, a smart assistant to help the visually challenged with their day-to-day activities. VisBuddy is a voice-based assistant where the user can give voice commands to perform specific tasks. It uses the techniques of image captioning for describing the user's surroundings, optical character recognition (OCR) for reading the text in the user's view, object detection to search and find the objects in a room and web scra** to give the user the latest news. VisBuddy has been built by combining the concepts from Deep Learning and the Internet of Things. Thus, VisBuddy serves as a cost-efficient, powerful, all-in-one assistant for the visually challenged by hel** them with their day-to-day activities.
△ Less
Submitted 4 January, 2022; v1 submitted 17 August, 2021;
originally announced August 2021.
-
Tracking entities in technical procedures -- a new dataset and baselines
Authors:
Saransh Goyal,
Pratyush Pandey,
Garima Gaur,
Subhalingam D,
Srikanta Bedathur,
Maya Ramanath
Abstract:
We introduce TechTrack, a new dataset for tracking entities in technical procedures. The dataset, prepared by annotating open domain articles from WikiHow, consists of 1351 procedures, e.g., "How to connect a printer", identifies more than 1200 unique entities with an average of 4.7 entities per procedure. We evaluate the performance of state-of-the-art models on the entity-tracking task and find…
▽ More
We introduce TechTrack, a new dataset for tracking entities in technical procedures. The dataset, prepared by annotating open domain articles from WikiHow, consists of 1351 procedures, e.g., "How to connect a printer", identifies more than 1200 unique entities with an average of 4.7 entities per procedure. We evaluate the performance of state-of-the-art models on the entity-tracking task and find that they are well below the human annotation performance. We describe how TechTrack can be used to take forward the research on understanding procedures from temporal texts.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Human machine interaction systems encounters convergence
Authors:
Josephine Selvarani Ruth D,
Vishwas Navada B
Abstract:
Human machine interaction systems are those of much needed in the emerging technology to make the user aware of what is happening around. It is huge domain in which the smart material enables the factor of convergence. One such is the piezoelectric crystals, is a class of smart material and this has an incredible property of self-sensing actuation (SSA). This property of SSA has added an indescrib…
▽ More
Human machine interaction systems are those of much needed in the emerging technology to make the user aware of what is happening around. It is huge domain in which the smart material enables the factor of convergence. One such is the piezoelectric crystals, is a class of smart material and this has an incredible property of self-sensing actuation (SSA). This property of SSA has added an indescribable advantage to the robotic field by having the advantages of exhibiting both the functionality of sensing and actuating characteristics with reduced devices, space and power. This paper focuses on integrating the SSA to drive an unmanned ground vehicle with wireless radio control system which will be of great use in all the automation field. The piezo electric plate will be used as an input device to send the signal to move the UGV in certain direction and then, the same piezo-electric plate will be used as an actuator for haptic feedback with the help of drive circuit if obstacles or danger is experienced by UGV.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Design and Development of Robots End Effector Test Rig
Authors:
Josephine Selvarani Ruth D,
Saniya Zeba,
Vibha M R,
Rokesh Laishram,
Gauthama Anand
Abstract:
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism…
▽ More
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism of the system. Hence, it improves the ergonomics and accuracy of an operation with enhanced repeatability.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Predicting the risk of pancreatic cancer with a CT-based ensemble AI algorithm
Authors:
Chenjie Zhou MD,
Jianhua Ma Ph. D,
** Xu MD,
Lei Feng MD,
Adilijiang Yimamu MD,
Xianlong Wang MD,
Zhiming Li MD,
Jianhua Mo MS,
Chengyan Huang MS,
Dexia Kong MS,
Yi Gao MD,
Shulong Li Ph. D
Abstract:
Objectives: Pancreatic cancer is a lethal disease, hard to diagnose and usually results in poor prognosis and high mortality. Develo** an artificial intelligence (AI) algorithm to accurately and universally predict the early cancer risk of all kinds of pancreatic cancer is extremely important. We propose an ensemble AI algorithm to predict universally cancer risk of all kinds of pancreatic lesio…
▽ More
Objectives: Pancreatic cancer is a lethal disease, hard to diagnose and usually results in poor prognosis and high mortality. Develo** an artificial intelligence (AI) algorithm to accurately and universally predict the early cancer risk of all kinds of pancreatic cancer is extremely important. We propose an ensemble AI algorithm to predict universally cancer risk of all kinds of pancreatic lesions with noncontrast CT. Methods: Our algorithm combines the radiomics method and a support tensor machine (STM) by the evidence reasoning (ER) technique to construct a binary classifier, called RadSTM-ER. RadSTM-ER takes advantage of the handcrafted features used in radiomics and learning features learned automatically by the STM from the CTs for presenting better characteristics of lesions. The patient cohort consisted of 135 patients with pathological diagnosis results where 97 patients had malignant lesions. Twenty-seven patients were randomly selected as independent test samples, and the remaining patients were used in a 5-fold cross validation experiment to confirm the hyperparameters, select optimal handcrafted features and train the model. Results: RadSTM-ER achieved independent test results: an area under the receiver operating characteristic curve of 0.8951, an accuracy of 85.19%, a sensitivity of 88.89%, a specificity of 77.78%, a positive predictive value of 88.89% and a negative predictive value of 77.78%. Conclusions: These results are better than the diagnostic performance of the five experimental radiologists, four conventional AI algorithms, which initially demonstrate the potential of noncontrast CT-based RadSTM-ER in cancer risk prediction for all kinds of pancreatic lesions.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
Smart Summarizer for Blind People
Authors:
Mona teja K,
Mohan Sai. S,
H S S S Raviteja D,
Sai Kushagra P V
Abstract:
In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see.…
▽ More
In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see. The inability of these people to read text has a huge impact on their lives. There are a number of methods for blind people to read the text. Braille script, in particular, is one of the examples, but it is a highly inefficient method as it is really time taking and requires a lot of practice. So, we present a method for visually impaired people based on the sense of sound which is obviously better and more accurate than the sense of touch. This paper deals with an efficient method to summarize news into important keywords so as to save the efforts to go through the complete text every single time. This paper deals with many API's and modules like the tesseract, GTTS, and many algorithms that have been discussed and implemented in detail such as Luhn's Algorithm, Latent Semantic Analysis Algorithm, Text Ranking Algorithm. And the other functionality that this paper deals with is converting the summarized text to speech so that the system can aid even the blind people.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
Jo: The Smart Journal
Authors:
Vivian Li,
Alon Halevy,
Adi Zief-Balteriski Ph. D,
Wang-Chiew Tan,
George Mihaila,
John Morales,
Natalie Nuno,
Huining Liu,
Chen Chen,
Xiaojuan Ma,
Shani Robins Ph. D.,
Jessica Johnson
Abstract:
We introduce Jo, a mobile application that attempts to improve user's well-being. Jo is a journaling application--users log their important moments via short texts and optionally an attached photo. Unlike a static journal, Jo analyzes these moments and helps users take action towards increased well-being. For example, Jo annotates each moment with a set of values (e.g., family, socialization, mind…
▽ More
We introduce Jo, a mobile application that attempts to improve user's well-being. Jo is a journaling application--users log their important moments via short texts and optionally an attached photo. Unlike a static journal, Jo analyzes these moments and helps users take action towards increased well-being. For example, Jo annotates each moment with a set of values (e.g., family, socialization, mindfulness), thereby giving the user insights about the balance in their lives. In addition, Jo helps the user create reminders that enable them to create additional happy moments. We describe the results of fielding Jo in a study of 39 participants. The results illustrate the promise of a journaling application that provides personalized feedback, and points at further research.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Parametic Classification of Handvein Patterns Based on Texture Features
Authors:
Harbi AlMahafzah,
Mohammad Imranand,
Supreetha Gowda H. D.
Abstract:
In this paper, we have developed Biometric recognition system adopting hand based modality Handvein, which has the unique pattern for each individual and it is impossible to counterfeit and fabricate as it is an internal feature. We have opted in choosing feature extraction algorithms such as LBP-visual descriptor ,LPQ-blur insensitive texture operator, Log-Gabor-Texture descriptor. We have chosen…
▽ More
In this paper, we have developed Biometric recognition system adopting hand based modality Handvein, which has the unique pattern for each individual and it is impossible to counterfeit and fabricate as it is an internal feature. We have opted in choosing feature extraction algorithms such as LBP-visual descriptor ,LPQ-blur insensitive texture operator, Log-Gabor-Texture descriptor. We have chosen well known classifiers such as KNN and SVM for classification. We have experimented and tabulated results of single algorithm recognition rate for Handvein under different distance measures and kernel options. The feature level fusion is carried out which increased the performance level.
△ Less
Submitted 21 March, 2019;
originally announced March 2019.
-
Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning
Authors:
Zhiqian Chen,
Gaurav Kolhe,
Setareh Rafatirad,
Sai Manoj P. D.,
Houman Homayoun,
Liang Zhao,
Chang-Tien Lu
Abstract:
Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation…
▽ More
Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation. Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates. And hence accurately pre-estimating the deobfuscation runtime is highly crucial for the defenders to maximize it and optimize their defense. However, estimating the deobfuscation runtime is a challenging task due to 1) the complexity and heterogeneity of graph-structured circuit, 2) the unknown and sophisticated mechanisms of the attackers for deobfuscation. To address the above mentioned challenges, this work proposes the first machine-learning framework that predicts the deobfuscation runtime based on graph deep learning techniques. Specifically, we design a new model, ICNet with new input and convolution layers to characterize and extract graph frequencies from ICs, which are then integrated by heterogeneous deep fully-connected layers to obtain final output. ICNet is an end-to-end framework which can automatically extract the determinant features for deobfuscation runtime. Extensive experiments demonstrate its effectiveness and efficiency.
△ Less
Submitted 21 March, 2020; v1 submitted 14 February, 2019;
originally announced February 2019.
-
Measures of Cluster Informativeness for Medical Evidence Aggregation and Dissemination
Authors:
Michael Segundo Ortiz,
Sam Bubnovich,
Mengqian Wang,
Kazuhiro Seki Ph. D.,
Javed Mostafa Ph. D
Abstract:
The largest collection of medical evidence in the world is PubMed. However, the significant barrier in accessing and extracting information is information organization. A factor that contributes towards this barrier is managing medical controlled vocabularies that allow us to systematically and consistently organize, index, and search biomedical literature. Additionally, from users' perspective, t…
▽ More
The largest collection of medical evidence in the world is PubMed. However, the significant barrier in accessing and extracting information is information organization. A factor that contributes towards this barrier is managing medical controlled vocabularies that allow us to systematically and consistently organize, index, and search biomedical literature. Additionally, from users' perspective, to ultimately improve access, visualization is likely to play a powerful role. There is a strong link between information organization and information visualization, as many powerful visualizations depend on clustering methods. To improve visualization, therefore, one has to develop concrete and scalable measures for vocabularies used in indexing and their impact on document clustering. The focus of this study is on the development and evaluation of clustering methods. The paper concludes with demonstration of downstream network visualizations and their impact on discovering potentially valuable and latent genetic and molecular associations.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
XML Information Retrieval:An overview
Authors:
Suma D.,
U. Dinesh Acharya,
Geetha M.,
Raviraja Holla M
Abstract:
Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML I…
▽ More
Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML IR. Later novel IR strategies specific to XML IR are evolved. Meanwhile literatures reveal development of the rapid and intelligent IR systems. Despite their success in their specified constrained domains, they have additional limitations in the complex information space. The effectiveness of IR systems is thus unsolved in satisfying the most. This article attemptsan overview of earlier efforts and the gaps in XML IR.
△ Less
Submitted 27 October, 2014;
originally announced October 2014.
-
A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN
Authors:
Manojkumar. M. K,
Sathya. D
Abstract:
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network…
▽ More
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network. The reactive jammer stays quiet when the channel is idle. The jammer starts transmitting a radio signal as soon as it senses activity on the channel. The reactive jammer nodes will be deactivated by identifying all the trigger nodes, at the same time a jammer node is localized by exploiting the changes in the neighbor nodes. The affected node can be identified, by analyzing the changes in its communication range, compared to its neighbors. The paper proposes a survey on trigger node identification and a detailed survey on techniques to identify trigger nodes and highly concentrated on the reactive jammer.
△ Less
Submitted 6 February, 2014;
originally announced February 2014.
-
Power Efficient Resource Allocation for Clouds Using Ant Colony Framework
Authors:
Lskrao Chimakurthi,
Madhu Kumar S D
Abstract:
Cloud computing is one of the rapidly improving technologies. It provides scalable resources needed for the ap- plications hosted on it. As cloud-based services become more dynamic, resource provisioning becomes more challenging. The QoS constrained resource allocation problem is considered in this paper, in which customers are willing to host their applications on the provider's cloud with a give…
▽ More
Cloud computing is one of the rapidly improving technologies. It provides scalable resources needed for the ap- plications hosted on it. As cloud-based services become more dynamic, resource provisioning becomes more challenging. The QoS constrained resource allocation problem is considered in this paper, in which customers are willing to host their applications on the provider's cloud with a given SLA requirements for performance such as throughput and response time. Since, the data centers hosting the applications consume huge amounts of energy and cause huge operational costs, solutions that reduce energy consumption as well as operational costs are gaining importance. In this work, we propose an energy efficient mechanism that allocates the cloud resources to the applications without violating the given service level agreements(SLA) using Ant colony framework.
△ Less
Submitted 13 February, 2011;
originally announced February 2011.
-
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Authors:
Getsy S. Sara,
Kalaiarasi. R,
Neelavathy Pari. S,
Sridharan . D
Abstract:
A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of node…
▽ More
A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of nodes in the network. This paper proposes a novel hybrid multipath routing algorithm with an efficient clustering technique. A node is selected as cluster head if it has high surplus energy, better transmission range and least mobility. The Energy Aware (EA) selection mechanism and the Maximal Nodal Surplus Energy estimation technique incorporated in this algorithm improves the energy performance during routing. Simulation results can show that the proposed clustering and routing algorithm can scale well in dynamic and energy deficient mobile sensor network.
△ Less
Submitted 24 November, 2010;
originally announced November 2010.
-
Image Segmentation by Using Threshold Techniques
Authors:
Salem Saleh Al-amri,
N. V. Kalyankar,
Khamitkar S. D.
Abstract:
This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These techniques applied on three satellite images…
▽ More
This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These techniques applied on three satellite images to choose base guesses for threshold segmentation image.
△ Less
Submitted 21 May, 2010;
originally announced May 2010.
-
Deblured Gaussian Blurred Images
Authors:
Salem Saleh Al-amri,
N. V. Kalyankar,
Khamitkar S. D
Abstract:
This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter, Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and Alfa and then corrupted by Gaussian noise. T…
▽ More
This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter, Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and Alfa and then corrupted by Gaussian noise. The same is applied to the remote sensing image and they are compared with one another, So as to choose the base technique for restored or deblurring image.This paper also attempts to undertake the study of restored Gaussian blurred image with no any information about the Point Spread Function (PSF) by using same four techniques after execute the guess of the PSF, the number of iterations and the weight threshold of it. To choose the base guesses for restored or deblurring image of this techniques.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.