Skip to main content
Top

2016 | Book

Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

ICRCWIP-2014

Editors: Nitin Afzalpulkar, Vishnu Srivastava, Ghanshyam Singh, Deepak Bhatnagar

Publisher: Springer India

insite
SEARCH

About this book

This volume comprises the proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. It brings together content from academicians, researchers, and industry experts in areas of Wireless Communication and Image Processing. The volume provides a snapshot of current progress in computational creativity and a glimpse of future possibilities. The proceedings include two kinds of paper submissions: (i) regular papers addressing foundation issues, describing original research on creative systems development and modeling; and (ii) position papers describing work-in-progress or research directions for computational creativity. This work will be useful to professionals and researchers working in the core areas of wireless communications and image processing.

Table of Contents

Frontmatter
A Novel Image Zooming Technique Using Wavelet Coefficients

The objective of getting a good quality of image plays an important role in applications related to image processing. To achieve this, the quality of image should be monitored dynamically and by applying optimized algorithms. Thus, the zoomed image got using algorithms is sharper compared to other methods. Hence keeping all this in mind on this source of information, discrete wavelet transform (DWT) with various interpolation techniques had been applied upon variances to obtain their values. The proposed method gives better PSNR compared to other methods. Thus in this paper, an algorithmic approach is used to zoom a given image in wavelet domain and to get a sharper image using various interpolation techniques.

Himanshu Jindal, Singara Singh Kasana, Sharad Saxena
Analysis of Operational Transformation Algorithms

In multiuser groupware systems, consistency maintenance and concurrency control are the most significant challenges. In groupware systems, user groups are permitted to update the shared data simultaneously. Operational transformation (OT) is a successful method for consistency maintenance in multiuser shared applications. OT, in general, supports two basic operations: insert/delete for character operations. We have done the literature review of the evolution of OT algorithms over the last 25 years since 1989. OT is discussed based on existing main OT algorithms such as dOPT, adOPT, GOT, GOTO, SDT, SOCT2, SOCT3/4, and ABT which are analyzed on the basis of the main properties as criteria of correctness, remote operation property, storage, etc. Then, categorization is done for all existing OT algorithms on the basis of major existing algorithms such as dOPT, adOPTed, GOT, GOTO, SDT, SOCT2, SOCT3/4, and ABT and then further classified on the basis of area of operation like undo, char, string, web, graph, etc. OT algorithms supporting string handling are also analyzed.

Santosh Kumawat, Ajay Khunteta
A Digital Image Watermarking Technique Using Cascading of DCT and Biorthogonal Wavelet Transform

Modern communication technology facilitates easy transmission of multimedia content. But if copyright protection of multimedia data, prevention of illegal access, and rights of intellectual property are considered, so this field needs more attention of researchers. It is a very simple process to make a copy of the multimedia data, alter it, and then put it back for business profits. Digital watermarking techniques provide a solution for this issue, by embedding some information, which can be further used to claim the ownership of multimedia data. In this paper, a new algorithm for the watermarking of digital images is proposed by cascading of two frequency domain transform techniques, i.e., biorthogonal wavelet transforms (BWT) and discrete cosine transform (DCT). Proposed technique takes the approximation component of the biorthogonal transform of cover image and then applies DCT to embed watermark. Embedding of watermark data is done in middle frequency component by comparison-based correlation technique. Also, this technique has been analyzed and compared with the existing ones by applying various image attacks and subsequently measuring the results and proved to be fairly robust.

Arvind Kumar, Pragya Agarwal, Ankur Choudhary
Multi-domain Image Enhancement of Foggy Images Using Contrast Limited Adaptive Histogram Equalization Method

Enhancement process is used in image processing for improving quality and contrast of noise images or video. In digital signal processing, enhancement process is applied in spatial domain and frequency domain. In these two domains, process is applied over a pixel value but in frequency domain enhancement process is applied over frequency. In image processing for improving the quality of image-used image filtering, morphological operation, deblurring, ROI-based processing, neighborhood, and block processing. Contrast adjustment, morphological operation, ROI-based processing and deblurring enhancement processes are used in spatial domain. Digital filter is used in frequency domain. In this article, the author used top-hat filter for enhancement process and CLAHE methods are used in spatial and frequency domains. Contrast limited adaptive histogram equalization method is used in spatial domain and finite impulse response filter is used in frequency domain. At the end of this paper is shown the comparative results which prove frequency domain enhancement method with spatial domain, which is better than the spatial domain enhancement method.

Garima Yadav, Saurabh Maheshwari, Anjali Agarwal
Comparison of Various Reliability Measures of a Computer System with the Provision of Priority

In this study the comparative analysis of various reliability measures of a computer system is carried out under the concepts of maximum repair time, maximum operation time, and priority. An immediate repair facility is provided to the system. The system consists of two identical unit one in operative mode and other in cold standby mode. For the derivation of various reliability measures, two stochastic models are developed hereby using the concept of priority. Priority to preventive maintenance over h/w repair in Model II whereas no priority is given in Model I. The failure time distribution of the s/w and h/w follows exponential while other random variables are taken as arbitrary. Graphs are drawn with respect to preventive maintenance to analyze the mean time to system failure and profit function of both models comparatively.

Ashish Kumar, Monika Saini
Dual-Band Filter Using DGS for X-Band Applications

A novel dual-band planar bandpass filter for X-band applications is proposed in this paper. The proposed filter operates at two bands where the first band is from 7.7 to 8.5 GHz and the second from 9.4 to 10.3 GHz with resonant frequencies 8.2 and 10.0 GHz, respectively. The filter is compact in size with dimension 24 × 15 × 1.34 mm3 with ground plane. For designing this structure heraeus substrate of thickness 1.27 mm and with dielectric constant as 9 is used. The EMS software, CST microwave studio is used for simulation and optimization of the proposed filter structure. The results obtained after simulation of filter are too good and the return loss and insertion loss of bands are −23.5 and −1.2 dB, respectively for the first band and −19 and −2.3 dB, respectively for the second band. Also, group delay for both the bands is less than 0.5 ns. As both the bands are from X-band, the first band is used for satellite uplink and the second band is used for radiolocation applications and hence this filter is suitable for X-band applications.

Suman Kumari, Amit Singh Bhadouria, Mithilesh Kumar
A Review on Performance Evaluation of Routing Protocols in MANET

MANET is a networking paradigm that facilitates users to communicate with one another by establishing a temporary network without any form of centralized administrative infrastructure. In MANET, particularly, specialized routing protocols are needed in order to cope up with distinctive characteristic of MANET, which is time-varying topology due to anticipated frequent node mobility. The paper contributes by making a review of different authors who have worked to analyze the performance of various routing protocols in MANET.

Shruti Thapar, Anshuman Kalla
Retinal Nerve Fiber Layer Analysis in Digital Fundus Images: Application to Early Glaucoma Diagnosis

Glaucoma is a second biggest eye disease which leads to permanent vision loss. The present day glaucoma diagnosis includes analysis of cup-to-disk ratio and detection of retinal nerve fiber layer (RNFL) loss. Glaucoma detection using cup-to-disk ratio approach is possible only after 40 % of vision loss. Also, OCT instruments are not widely available in all hospitals due to the cost factor, thereby making them a costly approach. In this paper, fundus images are considered for texture property analysis. Texture properties of RNFL region are analyzed using image-based fractal dimension (FD) feature and gray level co-occurrence matrix method (GLCM). Positive correlation coefficient is achieved for FD and contrast property of GLCM. Such analysis of texture property involving RNFL on fundus images lead to low cost and early diagnosis of glaucoma.

Dharmanna Lamani, T. C. Manjunath, M. Mahesh, Y. S. Nijagunarya
Design, Development of MC-CDMA, and Reduction of ISI for Different Modulation Techniques

With the increasing demand of high data rate and increased in capacity, it is become necessary to analyze thedifferent modulating techniques. By using a good modulation schemes, the growth in speed and capacity can be achieved. In thispaper, we have designed a MC-CDMA for different modulation methods like BPSK, QPSK, 256-QAM, 512-QAM and 1024-QAM.To reduce the Inter-Symbol-Interference, MSE Equalization technique is used. Result shows the plot of Signal to Noise RatioVsEb/No and MMSE Vs SNR which clearly shows the performance improvement in MC-CDMA as compared to anyexisted MC-CDMA system for proposed modulation techniques.

Arun Kumar, Manisha Gupta
A Compact Dual Wide Band Patch Antenna with Modified Ground Plane

A compact rectangular patch wide band antenna is proposed in this paper which is designed on a planar FR4 (lossy) substrate of dielectric constant 4.4 and having a very compact size of dimensions 12 and 47 mm. To achieve wide band characteristics two slots are cut in ground plane and fed by microstrip feed technique. The designed antenna can operate in two bands to cover most of allocated ISM band and ultra wide band (UWB) in which first band covers 2.2459–2.7207 GHz and second is from 5.2698 to 10.863 GHz. The proposed antenna has been designed with the help of CST software and from results it is clear that proposed antenna has good performance with respect to bandwidth and radiation pattern. It has a simple structure and it is sufficiently small in size so can be easily used in a mobile phone or a USB dongle. This antenna is applicable for Bluetooth, WiMAX, military and medical applications.

Priyanka Jain, Shagun Maheshwari, Archana Agarwal
Contention Sensitive Routing for Mobile Ad Hoc Networks

Wireless mobile ad hoc network (MANETs) has emerged as a key technology for next-generation wireless networking. Admission control as always works out to be the foundation for QoS. If an AC protocol discovered route for an application shakes hands with QoS Gateway, it is welcomed in the network, else denied. In this paper, CSRP (contention sensitive routing protocol) for MANETS is explained that provides routes with sufficient bandwidth to satisfy the QoS requirements of the requesting application already running sessions.

Richa Sharma, Neha Janu, Chhagan Doot
An Analytical Approach for Accurate Design of MSPA Using Dielectric Constant Engineering (DCE)

This paper introduces a novel technique for retuning the microstrip patch antenna (MSPA) during fabrication to meet the desired frequency. Designing the patch antenna is a rigorous process due to its very low manufacturing tolerances. To defeat such limitations of the microstrip patch antenna, a new technique named as dielectric constant engineering (DCE) is proposed. In this proposed method, a new formula is given to cut the dielectric material from the substrate part of the patch antenna during fabrication so that the targeted resonant frequency can be achieved without affecting patch dimensions. The process is suitable for multilayer substrates. This method is very useful for bulk fabrication of patch antennas. The results are simulated and verified using FDTD-based optimizing tool HFSS® version 11.

Monika Mathur, Ghanshyam Singh, S. K. Bhatnagar
Design of CAN-Based Enhanced Event Data Recorder and Evidence Collecting System

An event data recorder (EDR), in general, is an on-board system or device installed in cars to record vehicle data during accidents or crashes [2]. The system proposed in this paper was made with the help of different sensors, navigation system (GPS), and GSM kit. This design provides information related to position and vehicle speed on real-time basis and also the status about the airbag deployment break status, seatbelt status, etc., just prior to accident. The design objective is to design an advanced microcontroller system to record and analyze the vehicular components. The ARM7 processors collect the information using modules or sensors which are connected to different ports of the processor. The collected data acts as information to the monitoring station [1]. These data recorded in real time can help people to analyze the fault protection at extreme conditions. This EDR displays the messages on LCD mounted on kit to alert as well as record it on storage device [2]. These data are useful to better understand the driving habits. This recorded data can be used to analyze the accident easily and also to settle many problems related to car accident such as vehicle maintenance, investigation, crash litigation, driver performance, and reconstruct the accident as well as insurance settlement.

Pankaj H. Chandankhede, M. M. Khanapurkar
Detection of Brain Tumor in MRI Images, Using Fuzzy C-Means Segmented Images and Artificial Neural Network

Brain tumors are the most serious concerns in the field of medicine. In this research paper, ANN and fuzzy c-means clustering are combined together and a model is developed to predict the preoperative prediction of brain tissues. The purpose of this study was to develop a method of the preoperative prediction and classification of brain tumors. A new hybrid model is developed for classification where image segmentation is done using fuzzy c-means clustering algorithm which pinpoints the cancerous area in a brain MRI image. Here, features are extracted from brain MRI images using GLRLM technique. Then artificial neural network is used to classify these images. This enables higher percentage detection and overall provides an excellent classification rate.

Parveen, Amritpal Singh
Multiple Inputs Combinational Logic Minimization by Minterms Set

The paper presents an easy technique to simplify multiple inputs combinational digital logic circuits. By grouping of minterms in different sets, multiple inputs can be easily synthesized. The proposed technique is an exact method of minimization. The new approach reduces the minimization complexity of combinational circuits. The proposed method is fast, can be solved by paper–pen, and also by computer programming.

Sahadev Roy, Rajesh Saha, Chandan Tilak Bhunia
Design and Simulation of 16 × 8 Synchronous SRAM in 90 nm CMOS Technology

We report the design of a 128-bit (16 × 8) synchronous static random-access memory in this paper. Standard 90 nm CMOS technology is being used for the design process. The approach is to design each single functional block by keeping in view the layout feasibility. The main functional blocks, i.e. bit cell, preconditioning circuits, clock tree, flip-flops row and column decoders are designed and implemented. The cell matrix of 16 × 8 has been designed, avoiding the usage of fully complementary CMOS gates, thus equalizing the voltage levels between bit lines using pass transistors for faster clocking, keeping the default pre-charge level of the word lines to one. Also, aspect ratio of each transistor is maintained so as to obtain the desired results.

Vipul Bhatnagar, Pradeep Kumar, Sujata Pandey
A Voltage-Mode Nonlinear-Synapse Neural Circuit for Bi-partitioning of Graphs

An NP-complete problem that finds applications in various fields in engineering and sciences is the graph partitioning problem. This paper presents a novel recurrent neural network, which makes use of nonlinearities in the feedback interconnections, for bipartitioning a given planar graph of n vertices (nodes). The scheme comprises of n neurons and n2 synaptic interconnection weights, as compared to the n2 neurons and n4 synapses required by conventional Hopfield network approaches. PSPICE simulation results serve as verification for the proposed theory.

Mohd Samar Ansari
CNFET-Based Resistive Sensor Interface with Voltage/Current-Mode Readouts

Integrated sensors, which are frequently electronic and occasionally electromechanical, can be placed in the broader set of mixed-signal systems where the interface circuitry is analog in nature and the processing is usually performed in a digital environment. Existing sensor interface analog circuitry is mostly based upon the ubiquitous MOSFET technology. Moreover, the lower transconductance gain of the MOSFET restricts the bandwidth of such CMOS sensor interface circuits. As the development over the present resistive sensor interfacing circuits, a substitute using CNFET has been presented in which a buffered-output current conveyor (CC-II) is employed to realize an electronic interface for resistive sensors. The circuit gives voltage-mode (VM) as well as current-mode (CM) outputs, and may be used in various resistive sensing applications like photocell sensor, strain gauge sensor, position sensor, temperature sensor, etc. SPICE simulations with CNFET 32 nm parameters are incorporated to authorize the design.

Mohd Samar Ansari, S. K. Tripathi
Design of CMOS Ring Oscillators with Low Phase Noise and Power Dissipation for Data Transmission in RF Range

This paper presents designing and comparative analysis of noise and power for ring voltage-controlled oscillator (VCO) architectures. A two-stage complementary metal–oxide–semiconductor (CMOS) ring VCO and differential ring oscillator are designed with 180 nm technology and 3.3 V supply for high-resolution and low phase noise. The relative parameters that influence the VCO phase noise are discussed and analysed comprehensively. The tuning range of the designed VCO is from 1 to 5 GHz for a five-stage circuit and 1−2 GHz for a two-stage circuit. An improved VCO unit circuit is obtained by adding a wave shaping circuit at the output of VCO. We have taken the upper frequency range as 5 GHz because it will work properly for a data rate of up to 10 Gbps for an evenly phased signal passing with Nyquist data rate. Our simulation result proves that the designed two-stage CMOS differential VCO has low noise in comparison to other architectures. The circuit can also provide higher stability, better gain and dissipate low power. Our designed VCO is a relaxation oscillator and it will form triangular waveform in the high speed frequency range. The value obtained for phase noise for the two-stage differential CMOS ring oscillator is −292.52 dBc/Hz. Cadence Virtuoso has been used for simulation purpose.

Dhruba Ghosh, Malay Ranjan Tripathy, Sujata Pandey
A Novel Hybrid Method for Segmentation of Ultrasound Images

Ultrasound (US) is a very convenient and safe diagnostic tool to distinguish benign from malignant masses of the body. As subjective interpretation is time consuming so a computer-aided segmentation approach is needed to assist doctors to estimate tumor margin, and it helps in providing real-time targeted image guidance during surgery. But due to higher noise in Ultrasound image segmentation is a challenging task. In this paper a novel and robust algorithm has been proposed for edge detection of diseased area for effective clinical use. The algorithm divides itself in four stages. Initially, thresholding using moving averages is done to overcome nonuniform illumination of US image which is followed by edge detection with different gradient masks. Morphological operations are used to carve out ROI. Results with several US images with various levels of noises are used to demonstrate the effectiveness of the proposed approach.

Yogendra Singh Poonia, Ramesh Kumar Sunkaria, Deepti Mittal, Dipesh Kumar Patidar
Temperature Sensor Using a SMF-PCF-SMF Heterostructure

In this paper, a temperature sensor is designed and simulated using an interferometric configuration formed by inserting a photonic crystal fiber (PCF) between two single-mode fibers (SMFs). In this device, phase delay at the output is achieved by the index difference between core mode and cladding mode of PCF. In this type of interferometer, greater index difference is possible because of air-hole structure of PCF. It indicates that a small length of PCF can introduce large delay, i.e., large phase shift while keeping optical loss of the cladding mode at a relatively low level. With increase in temperature, effective refractive index difference between core and cladding of PCF decreases which results in decrease in peak output power of the interferometer. Variation of output power with temperature is observed to be linear; it is thus applicable as a temperature sensor.

Rekha Mehra, Heena Shahani
Investigation of Channel Drop Filter Based on Two Dimensional Photonic Crystal Structure

In this paper, the design and performance of two dimensional (2-D) photonic crystal (PhC) channel drop filter is investigated using finite difference time domain (FDTD) method. Plane wave expansion (PWE) method has been utilized to calculate the photonic band gap (PBG). The channel drop filter has been optimized for telecommunication wavelengths λ1 = 1.531 µm and λ2 = 1.551 µm for two designs with refractive indices 3.11 and 3.325, respectively. The number of rods in Z direction is 21 and in X direction is 20 with lattice constant 0.540 nm. By varying the radius of scatter rods of PCRR, it is observed that this filter may be used for filtering several other channels also. The designed structure is useful for CWDM systems. This device may serve as a key component in photonic integrated circuits. The device is ultra compact with the overall size around 123 µm2.

Ritu Sharma, Mayur Kumar Chhipa, Lalit Kumar Dusad
Design and Analysis of a Nano-Fiber with All-Normal and Flat Dispersion for Supercontinuum Generation

A new design of nano-fiber having all-normal and flat-top dispersion in As2Se3 chalcogenide glass has been reported for broadband supercontinuum spectra ranging from 1580 to 7090 nm. Such broadband spectra in mid-infrared region has been obtained using only 2 mm long nano-fiber with 50 fs laser pulses of 500 W peak power. Proposed nano-fiber has been optimized to obtain zero dispersion wavelength at 3800 nm.

Than Singh Saini, Ajeet Kumar, Ravindra Kumar Sinha
Investigation of Semiconductor Optical Amplifier for DWDM System with 50 GHz Channel Spacing

In this paper, the performance of a 32 channel SOA-based dense wavelength division multiplexing system at 10 GB/s data rate with channel spacing of 50 GHz in terms of quality factor, BER, output optical power, and eye closure is investigated. Transmission over fiber optical link of different lengths at low signal input powers is demonstrated. The communication over fiber optical link is evaluated up to 215 km transmission distance at −35 dBm input signal power. It is also found that the signal can be transmitted effectively up to 241 and 260 km for −30 dBm and −25 dBm signal input power, respectively.

Aruna Rani, Sanjeev Dewra
Automatic License Plate Recognition System Using Raspberry Pi

In the last few decades, Automatic License Plate Recognition (ALPR) has been employed in many developed countries for Traffic management, Automatic speed control, tracking the stolen cars and also in automatic Toll systems for improving the Traffic Control. Due to the increase in the number of cars and other transportations it has became very difficult to control the traffic by the Humans. Automatic License Plate Recognition (ALPR) is a surveillance system that extracts the information from the vehicle license plate by capturing the images. The objective of this paper is to introduce a Completely Automated license Plate Recognition system using the Optical Character Recognition (OCR) to read the information on the images of license plate of vehicles captured by the camera on real time basis. The image of the Vehicles License plate is captured and is processed by the segmentation of the characters and is verified by the Raspberry Pi Processor for the authentication purpose.

Vijayaraghavan Sundararaman, T. G. Vijayalakshmi, G. V. Swathi, Sambit Mohapatra
Multiple Sink Data Aggregation

In-network aggregation is a technique in which queries are propagated in the network and in response phase information is processed at aggregator node only. In wireless sensor network, nodes are deployed in a particular area for sensing certain parameters like sound vibration, humidity, temperature etc. Information sensed by nodes may be highly correlated and redundant. It is not energy efficient to send correlated, redundant data to the sink. In wireless sensor network, correlation (spatial or temporal or spatiotemporal) among sensor readings may be exploited to reduce battery consumption and increase network lifetime. In this paper we propose an approach that handles multiplicity of sinks and shares information among sinks.

Krishna Joshi, T. P. Sharma, Shadab Siddiqui, Shahin Fatima
Handwritten Devnagari Script Database Development for Off-Line Hindi Character with Matra (Modifiers)

Due to advancement in digital technology, handwritten Character recognition plays a significant role for interaction between human and computer. For recognition of handwritten character a standard database is required. There is no benchmark data base of Devnagari script in Hindi with matra’s (modifiers). A database for off-line Hindi handwritten character with modifier is developed. The database consist more than 23000 images of their original size with programmatically segmented consonant and vowels. The Data set is collected from persons of different gender, age, profession and educational qualification. Data are also collected from person of different geographical location of India.

Maninder Singh Nehra, Neeta Nain, Mushtaq Ahmed
Part-of-Speech Tagging of Hindi Corpus Using Rule-Based Method

The main goal of analysis of NLP (natural language processing) is to understand natural languages by parsing them. In the practice of analyzing natural languages there exist various sub-tasks. These sub-tasks depend on inbuilt structure of language and do not require complete knowledge and understanding of language. Part-of-speech tagging is one of them. Part-of-speech tagging is basically a practice of assigning language-specific grammatical tags to each word of language-specific input text, according to word’s appearance in the text. These tags can be like noun, adverb, number, negative, etc. There exist a variety of taggers for most popular language in the world, i.e., English. But such taggers cannot be used for morphologically rich Hindi language as difference exists between structures of both languages. A “Rule-based system” is presented in this paper. 29 standard part-of-speech tags are used, including two special tags for date and time also in multiple formats. The special tags like punctuation, time, and date are based on regular expressions. Main aim of the proposed system is to increase automaticity and maintain high precision, while limiting the size of human made corpus. Proposed system uses human made corpus of around 9,000 words to increase tagging and rule-based (lexical features based) approach to decrease the size of already trained corpus. The system yields 91.84 % of average precision and 85.45 % of average accuracy.

Deepa Modi, Neeta Nain
A Survey on Security Analysis in Cloud Computing

In the era of mobile computing, the number of mobile users has increased day by day. The computing capability, storage capability, processing speed of mobile, etc., required by a mobile user is higher, which may not be affordable by a mobile device. The advanced customers of e-Science require high performance, flexibility, and scalability (according to their demand, they can increase and decrease their use of resources), reduced cost, mobility, easy upgrades, etc. The cloud computing paradigm can fulfill the requirements of customers. The cloud computing is becoming the most profitable technology for service industries and can provide a new paradigm for business computation. Cloud provides the paradigm by which the users can access the resources from any geographical location at any time like using Google Doc, Microsoft SharePoint, GoGrid, etc. The different geographical locations and large number of users lead to different security issues for cloud. The main focus of this paper is to pinpoint the security threads for cloud computing. In this paper, we discuss design objectives, different models, challenges, and security of cloud with intrusion detection techniques.

Suryambika, Abhishek Bajpai, Shruti Singh
Copper Nanofilm Antenna Design and Development: For X-Band Wireless Sensor Applications

In this paper we present design, fabrication, and experimental characterization of microstrip antenna with copper nanofilm of 43 nm thicknesses as radiating element. The copper nanofilm patch is 15 times smaller than the skin-depth of copper at 10 GHz. The proposed antenna is non-contact feeding type proximity coupled microstrip patch antenna designed for ‘X’ band applications. The antenna design is validated with IE3D simulation software. The simulated antennas are fabricated for both 17 µm thickfilm and 43 nm nanofilm patches on low-cost 1.6 mm height FR4 substrate. The thickfilm antenna is fabricated using common photolithography, whereas copper nanofilm is fabricated using RF-sputtering deposition system at room temperature. The thickness and uniform distribution of copper nanofilm is confirmed by scanning electron microscope. The radiation result shows nanofilm antenna exhibits outstanding performance over thickfilm antenna in terms of bandwidth. The nanofilm antenna presents wide bandwidth of 47.29 % over thickfilm antenna.

Rajendra R. Patil, R. M. Vani, P. V. Hunagund
Vein Biometric Template Security Using Overlapped Shares Accounting for Minimum Storage

A human vasculature-based algorithm has been proposed for template security. The complete biometric template is binarized and divided into specific number of shares. These shares are overlapped so that all the binary bits are overlapped. This leads to formation of entirely new pattern. The vein biometric information is kept secured in the overlapped shares but in an encrypted way. These overlapped shares are stored as coefficients of the vein curves instead of image for individuals. This exponentially reduces space to store the templates. If anyone steals this secured template then also no useful information regarding the vein biometric can be obtained. The proposed method has been implemented and proved for very small false acceptance and false rejections on standard datasets.

Ruchika Solanki, Saurabh Maheshwari, Vineet Khanna, Kalpana Sharma
Miniaturization of MEMs-Based Smart Patch Antennas for Biomedical Applications

In this paper, MEMs-based smart patch antennas which can be used for biomedical applications were investigated. An attention over the main constraints in designing efficient antennas for biomedical devices was made and the analysis is presented, in addition with some of the main issues in their categorization. The foremost constraint which was encountered during simulation was the miniaturization problem. As the size of the antenna is reduced different parameters of the antenna such as directivity, gain, antenna efficiency show degradation in values. The patch antenna is a trendy antenna which can be used in various sophisticated applications due to its small size, robust nature, and low power handling capacity which is the prerequisite in our study. The antenna which has been developed basically consists of a patch antenna along with a meta-material-based rectangular slot over the patch. Bulk micromachining technique is used to etch out certain portions of the silicon substrate and Rogers RT-duroid substrate is intentionally been added within the micro-machined portion. MEMs-based switches have been added in our design in order to make the antenna reconfigurable in nature. The results obtained after simulation is astonishing with considerable increase in bandwidth, directivity, and gain which make the antenna viable for the required purpose despite of considerable reduction in size of the antenna.

Shankar Bhattacharjee, Santanu Maity
Authentication of Primary User at Physical Layer Through Approximation in Cognitive Radio

Cognitive Radio (CR) is a mechanism that adjusts its radio parameters dynamically to use the unoccupied spectrum holes so as to overcome the problem of spectrum shortage arose due to enormously increasing wireless devices. It is done by assigning free spectrum to the unlicensed users without compromising the licensed users. Hence, distinguishing Primary Users (PUs) from Secondary Users (SUs) is a major concern in CRN and it becomes more challenging when it has to be done at the physical layer, without understanding the data in the signals. Here, we propose a mechanism to authenticate a PU based upon approximation of distance and angle of arrival of the signal received from it. We also propose a mechanism where a SU can be hopped to Dedicated Control Channel (DCCH) for seamless communication, when it has to vacate the spectrum for PU and there are no traffic channels (TCH) to continue its ongoing communication.

Muzzammil Hussain, Suditi Choudhary
Data-Based Correlation Scheme

In wireless sensor network the work of spatial correlation is to find those nodes having common readings and to form a group of them called clusters. A node from the cluster is selected to represent the whole cluster and is called cluster head. The idea of using spatial correlation is to increase lifetime of network and to increase the energy of sensor nods.

Krishna Joshi, Shadab Siddiqui, Shahin Fatima
A Comparative Analysis of Different LFSR-Based Ciphers and Parallel Computing Platforms for Development of Generic Cipher Compatible on both Hardware and Software Platforms

Pseudorandom numbers are at the core of any network security application. Pseudorandom numbers find its application in the network security domain in key generation, re-keying, authentication, smart-phone security, etc. These random numbers are produced through PRNG (Pseudorandom Number Generator). Hence, if there is a flaw or the PRNG produces predictable sets of random numbers, then the entire application would be prone to attacks. Therefore, development of a generic framework for generating strong sets of pseudorandom numbers is proposed. Hardware implementation for GSM stream cipher has already been implemented, under a particular segment of mobile communication. The project advanced into many dimensions like vulnerability testing, protocol designing, implementation in both software and hardware and evaluating. The proposal aims to build an in-general framework and a unified model for enhanced security specifically for LFSR (Linear-feedback shift register)-based stream ciphers. Hence, a thorough study on already existing LFSR-based ciphers is done. This study aims to extract out the behaviour of different ciphers under different application domains. As pseudorandom numbers are used in both software (stream ciphers, protocol design) as well as hardware (wireless devices, smart phones) areas of security, the generic model proposed is aimed at using a co-simulation of both hardware and software. For software development of the cipher, a parallel computing environment has been chosen because in today’s computing trends, multi-core processors are superseding the sequential ones; hence, the basic force for growth of processor is to increase parallelism rather than increasing the clock rate. The paper thus presents the CSPRNG (Cryptographically secure pseudo-random number generator) model based on hardware and software co-simulations, using a generic approach.

Trishla Shah, Darshana Upadhyay, Priyanka Sharma
Generation of Automatic Variable Key to Make Secure Communication

By the modernization of computer technology, the possibility of various cryptanalytic attacks increases rapidly, due to which maintaining the confidentiality on insecure channel becomes the burning problem and makes a large arena for the researchers. To tackle such problems and provide suitable solution, many methods have been introduced out of which automatic variable key (AVK) is the most dominated mechanisms as found in theoretical survey. In this paper, we have proposed a new scheme in AVK to generate the sequence of keys on the basis of divisibility factor of previous key. To prove the fruitfulness of our proposed scheme, we have compared our scheme with the existing related schemes based on randomness and standard deviation among the successive keys.

Bishal Kumar Singh, Subhasish Banerjee, Manash P. Dutta, C. T. Bhunia
Vector Evaluated Genetic Algorithm-Based Distributed Query Plan Generation in Distributed Database

Distributed query processing (DQP) determines an optimal query plan, which generates user query results in efficient manner by selecting optimal set of database sites. Multi-objective DQP problems become more complex because a query optimizer has to select optimal, non-dominated QEP’s, query equivalent plans, based on conflicting objective values. In past few years, evolutionary techniques are employed on such problems, although they are unable to get a good balance between efficacy and efficiency in all attempts. A meta-heuristic-based algorithm is presented which determines the combinations of database sites, in response to a query or group of queries. In this paper a technique is proposed for the optimal query plan generation, based on the meta-heuristics, modelled for distributed query processing, through an improved vector evaluated genetic algorithm for generation and selection of optimal query plans on distributed database. The algorithm’s optimization performance is evaluated with other approaches and optimization reliability along with efficiency is benchmarked using performance graphs; comparisons indicate that the vector evaluated genetic algorithm (VEGA) converges better than aggregation-based method (weighted-sum approach). Top-K query plans, average query cost and number of generations are the parameters used for the comparative analysis.

Vikash Mishra, Vikram Singh
A Novel MEMS-Based Frequency Tunable Rectangular Patch Antenna

This paper comprises of a frequency tunable patch antenna on which a U-shaped metamaterial structure is designed. The antenna is loaded with coplanar waveguide (CPW) stub on which two MEMS shunt switch with capacitive gap of 1.5 $$ \upmu{\text{m}} $$ were placed at 0.2 mm distant from each other. The tunability in frequency is achieved by changing the gap between the bridge and the insulating layer, at up state of the switches. The antenna resonant frequency shifted from 10.54 GHz down to 10.52 GHz by changing the capacitive height from 1.5 to 1 $$ \upmu{\text{m}} $$. The simulation of designed model has been carried out in Ansoft HFSS and different antenna parameters like gain, radiation pattern, efficiency, and scattering parameter have been adopted in this paper.

Rajesh Saha, Santanu Maity, Lipi Sarkar
Design and Optimization of Band-Stop Filter Using Metamaterial Structures for K-Band Applications

This work describes the design, simulation and fabrication of a metamaterial-based band-stop filter operating at K-band with a resonant frequency of 24.5 GHz and a notch level of −33.15 dB. The device specifically implements metamaterial structures which are of practical interest in microwave applications to obtain wide bandwidth, high performance and small electrical lengths. The device consists of four unit cells with two cells placed in each ground plane on a coplanar waveguide (CPW) structure. Achieving a good suppression level has been made possible by the four unit cells which are nothing but the metamaterial structures. The band-stop performances for various widths and the gaps of the rectangular-shaped resonators (complementary split ring resonators) have been shown proving that the response characteristics of the metamaterial-based filter can be dynamically tuned. The device shows the capability of CSRR/CPW structures for microwave applications such as filters.

Ngasepam Monica Devi, Santanu Maity
Low-Cost Crash Protection System for Heavy Motor Vehicles

This paper proposes the use of an ultrasonic sensor module which is used to calculate the ground clearance of a heavy motor vehicle (HMV). The sensor calculates distance based on the estimation of the travelling time of an ultrasonic pulse, transmitted by an ultrasonic sensor, which gets reflected back from the ground. These low-cost sensors seem ideal to be housed underneath HMVs running in hilly areas with narrow roads, which have the risk of falling off the cliffs in sharp turns. The sensors will be placed such that whenever the vehicle’s rear wheel senses a height more than that of the wheel by a considerable amount, the vehicle will move away from the cliff and the automatic braking system will be activated. The system may be used similarly in dumper HMVs that need to fill large shallow holes with mud, sand, etc.; the sensor will be placed differently in such condition.

Vishwajit Nandi, Rijita Poddar, Rajesh Saha, Sahadev Roy
Effect of Parasitic Elements on Non-inverting Buck-Boost Converter Used in PV System

In the proposed study, MOSFET device used in non-inverting buck-boost converter for photovoltaic (PV) system is analyzed. The parameters Rds(on) are varied and the output of buck-boost converter is observed. The inductor and capacitor are used as filter elements in the converter. The parasitic resistance of these filter elements are varied and the performance of the converter is analyzed. From the study, the variation of parasitic element of capacitor will not much disturb the output voltage, whereas the variation of parasitic element of inductor will disturb the output voltage and has significant contribution on the output voltage of converter. Also, the proposed study gives better insight into parasitic effect of printed circuit board and losses incurred due to the same. In PV systems buck-boost converter is used to convert solar energy to electrical energy which is then stored in battery to drive the loads. These parasitic elements will have considerable effect on the performance of converter used in solar power system.

Subramanya Bhat, H. N. Nagaraja
Effective Medium Approximation for Defining the Unavoidable Resistance of Solar Cell Front Contact

Contact resistance and series resistance are the most crucial problem to collect carrier from the both electrodes. In general, contacts are made by screen printing process which is industrially established. After the screen printing process some factors arises like change of with and thickness of finger and pores are created on the top side due to solvent. For the unavoidable pores series resistance is decreased. In this paper, the mathematical modeling has done considering resistance and distribution of pores.

S. Maity, P. Chakraborty, R. Raushan, C. T. Bhunia, P. P. Sahu
A Novel Low-Power Design Approach to Exploit the Power Usage of AMBA APB Bridge

In this paper, AMBA advanced peripheral bus bridge (APB Bridge) is implemented with a new design approach. The approach consists of a gated clock and reset controller circuits with APB Bridge for efficient optimization of power and for synchronizing the sequential circuits. Though clock net does not have any significant role in digital computation, it only provides synchronization to the sequential circuits, but unnecessary switching activities of clocks may cause a huge amount of power dissipation around 15–50 %. A proposed approach is to implement the effective gated clock circuit with negative latch to produce a gated clock as an output. This gated clock provides a selective control over clock net that means when a target’s device clock functioning is required at that time controlling device’s clock had been switched off. When the proposed approach is implemented in Verilog as APB Bridge with reset controller, clock power has been reduced to some level and provides power utilization in circuit. Simulation results are verified in ModelSim version 10.3c and then power report is extracted from Xilinx ISE suite 13.4 version. Result of the proposed approach: Total clock domain power of 0.39 mW, total hierarchy power of 0.49 mW, and total on chip power of 0.109 W are consumed by the proposed design. Hence total clock domain power consumption is 27.78 %, total hierarchy power consumption is 47.31 %, and total on chip power consumption is 6.84 % less than the bridge without clock gating and reset controller conditions. Simulation results and power summary reports are also included with the proposed design.

Kiran Rawat, Kanika Sahni, Sujata Pandey, Ziauddin Ahmad
Solar Wind and Diesel Hybrid Energy System: A Review

Access to electricity is now a basic requirement of mankind. There are still many places in the world which have no access to electrical energy. Even though many of these places might have substantial potential for energy generation the resources are not utilized or identified properly. So, in remote places generation of electricity from renewable energy sources, like solar and wind, could be a good option. For stand-alone, isolated, or off-grid system the energy needs to be stored whenever it is available from these sources and supplied if required. In hilly and remote regions where renewable energy potential is high, large-scale generating systems could also be an option but due to the complex geography and difficult infrastructure, small-scale systems might seem more feasible. The energy from these renewable/natural sources tends to vary throughout the day and hence optimizing the energy capture is necessary. The major objective of this paper is to identify and suggest a simple and flexible system that optimizes the power generation from all of these renewable sources. In this paper, a brief overview of various hybrid systems’ connection topologies having wind, solar, and diesel genset has been discussed.

R. A. Gupta, Bhim Singh, Bharat Bhushan Jain
Analysis and Optimization of Stability for 6T SRAM Cell Using 180 nm Technology

This paper presents a simple circuit design of 6Transistor SRAM. This work is focused on an important parameter of any memory device known as stability. The 6T SRAM cell is simulated to improve stability. This paper focuses on two techniques for analysis of stability: trial and error technique and graphical technique for SNM calculation. SNM is the measure of stability. The analysis of stability is done on different ratios of Waccess and Wdriver transistor and on different supply voltages. Simulation is done using a 180 nm technology and different power supplies. Simulated results have important implications in the design of low-power SRAM.

Nidhi Tiwari, Srishti Gusain, Surabhi Chakravorty, Ankita Nirankari, Apoorva Khandelwal
Harvesting Electric Field Energy for Powering Wireless Sensors of Smart Grid

In this paper, a new energy together with technology using stray electric field of an electric power line is presented. It is discovered that energy can be gathered and stored in the place for storing capacitor 1 that is connected to a body of roller form of aluminium foil covered up around an advertisement-insulated 220 V power line. The average current flowing into 47 μF storage capacitor-2 is about 4.53 A with 60 cm3 long body of roller form of aluminium foil, and it is possible to do medical operation on radio sensor network point to send RF facts every 42 s. The gathered mean power is about 47 W 4 in this example. Since the energy can be gathered without removing insulating cover, it is a belief that this made an offer on getting together with technology which can be sent in name to power the sensor network points in radio everywhere sensor network 5 and well-dressed network system.

Anil Boyal, Akanksha Deo, Amit Kr. Pandey, Amit Limba
Chalcogenide (LiGaSe2, LiGISe, LiGaS2): A Perfect Material to Design Highly Nonlinear PCFs for Supercontinuum Generation

In this paper, we have investigated photonic-crystal fibers based on lithium ternary compounds, namely LiGaSe2, LiGaS2, and LiGISe (LiGa0.5In0.5Se2) and characterized them for supercontinuum generation. These highly nonlinear chalcogenide photonic crystal fibers are suitable for supercontinuum generation for pump wavelength at 2.2 µm. We have designed the fibers and optimized them to have a flat dispersion which yields ultra flat supercontinuum spectrum over a wide range of frequencies.

Sandeep Vyas, Manish Tiwari, Takasumi Tanabe, Ghanshyam Singh
Mach–Zehnder Interferometer: A Review of a Perfect All-Optical Switching Structure

This article reviews Mach–Zehnder interferometer waveguiding structure-based optical switches in terms of their working principle, design, fabrication, and related performance issues. The effect of the material chosen and the use of tapered interferometric arms on the performance of such switching structures are also explained in brief. In the later part, discussion on the popular applications of the structure is given in brief.

A. I. Stanley, Ghanshyam Singh, James Eke, Hiroyuki Tsuda
Design and Analysis of Different Decoders for SAC-OCDMA Systems

Spectral amplitude coding for OCDMA (SAC-OCDMA) reduces MAI as compared to other types of OCDMA coding techniques. Different decoder designs are presented for spectral amplitude coding which are simulated on OptiSystem-13. Enhanced double weight code is used in wavelength selection of users for simulation. Variations in decoder configuration are attempted using fiber Bragg gratings and other components such as photodiode and power splitter to improve system performance. The effect of the different configurations of SAC-OCDMA decoder on system BER performance is analyzed.

Soma Kumawat, M. Ravi Kumar
An Efficient Trust-Based Routing Scheme by Max-Min Composition of Fuzzy Logic for MANET

Mobile ad hoc network is an infrastructure-less network of distributed nodes. It is spontaneous, self-organized, and also dynamic. In ad hoc environment, due to frequent communication among nodes and lack of enough information about nodes, it is complicated to measure trust. It has been observed that the nature of trust is dynamic that means its value varies with respect to time. Therefore, fuzzy logic is the more suitable technique for expressing and computing the node’s trust value than other existing probabilistic approach. In this paper, node’s trust values are converted into membership function of the fuzzy logic with the help of Gaussian membership function for clustered ad hoc network. Then cluster head is able to obtain the highly trusted nodes by the fuzzy logic-based max-min composition technique for the purpose of successful communication between sources and destination, so that it can be able to identify and save the nodes against non-cooperative nodes efficiently. It saves the energy consumption by avoiding packet delivery to the non-cooperative nodes by selecting the trusted neighbors for the purpose of communication. Therefore, we have been able to design a reliable and better throughput trust routing method for clustered ad hoc network using max-min composition technique of the membership function of fuzzy logic.

Joydeep Kundu, Koushik Majumder, Debashis De
Modified D-Latch Enabled BEC1 Carry-Select Adder with Low Power-Delay Product and Area Efficiency

In electronic applications, better performance of the digital systems can be achieved using a faster adder circuit. This paper shows a modified carry-select adder (CSA) architecture which has low power and reduced area compared to the regular CSA. This high speed CSA is achieved by replacing the existing binary to excess-1 converter (BEC-1) with D-latch enabled CSA. Regular square-root CSA (SQRT CSA) architectures have also been developed and compared with the proposed BEC-1 D-latch enabled CSA. This work evaluates the performance of delay, area, power, and their products for existing and proposed CSA designs. This shows that proposed D-latch CSA structure is better than the regular and modified SQRT CSA and existing Ripple CSA. The proposed CSA architecture requires approximately 86 % fewer gates and 77 % shorter delay than the original CSA designs.

Sakshi Bhatnagar, Harsh Gupta, Swapnil Jain
Identification of Devanagari Script from Bilingual Printed Text Documents

Bilingual script identification is one of the challenging steps in the development of optical character recognition (OCR). As India is a multilingual multiscript country, in its constitution for each state, the respective state language and the script is used for state official work. In Maharashtra, Marathi is the state official language with Devanagari script and English as the communication language. We need to develop the OCR that can identify and differentiate both scripts. This paper presents a research work for identification of Devanagari (Marathi) script from printed bilingual text document. In our work, we have developed a methodology that applies projection profile in line segmentation which is followed by twofold word segmentation. We examined the use of structural features (header-line pixel count and intercharacter gap) as a tool for determining the Devanagari words. The heuristic rule approach is used for classification. The proposed method is implemented on ten printed bilingual text images. These images consist of 77 lines and 474 words of varying font sizes. The result of our experimentation shows accuracy of 87.25 % in identification of Marathi words.

Ranjana S. Zinjore, R. J. Ramteke
Ultra-Wideband Equal Power Divider Using Stepped-Impedance Technology

A novel approach to design ultra-wideband (UWB) equal power divider which uses stepped-impedance technology on microstrip line has been proposed in this paper. This divider uses the method of multi-section impedance transformer of microstrip lines. The designed power divider demonstrates that power from one input port is divided equally into two output ports. It also exhibits matched impedance termination at all the three ports and very good isolation between two output ports over the specified 3.1–10. Also, the simulated return loss is better than 10 dB over the UWB. In addition, the group delay and average insertion loss are around 0.20 ns around 3 dB across the UWB. The output ports are isolated by an amount greater than 10 dB over the UWB.

Atul Kumar Agrawal, Deepak Bhatia
Implementation and Performance Analysis of Enhanced SHA-192

Hash functions used to provide integrity and authentication on messages sent over unsecure network. There are two most commonly used hash and MD algorithms: SHA-1 and MD5, which are vulnerable to collision attack. The weakness of these hash algorithms is that sometimes two different inputs will produce the same hash as output. To reduce this collision attack there is need to have a better hash algorithm so that the output in each round will be different and not to be equal with the same output in the next coming stages. In this paper, modified SHA-192 is implemented having a message digests of length 192 and we have also compared the security analysis of famous secure hash algorithm with enhanced SHA-192.

Harshita, Sarvesh Tanwar
Human Object Detection in Images Using Shift-Invariant Stationary Wavelet Transform

Surveillance system has proven as a key step in providing public security in many crowded places like railway stations, bus stops, cinemas, malls, etc. Several advancements in computer vision have been found but very less is applied in actual implementation of surveillance system. There is a need to add some intelligence in the surveillance system which can accurately detect human objects. This paper presents a method for human object detection using stationary wavelet transform (SWT) coefficients. Stationary wavelet transform coefficients are independent to the other parameters like color, shape, size, etc., of the object. The proposed method detects the human object from the complex images. The use of shift-invariance property of stationary wavelet transform handles object translations well. The detection of human object has been performed using Adaboost classifier. The quantitative assessments of the proposed method have shown improved performance over other state-of-the-art methods.

Om Prakash, Manish Khare, Nguyen Thanh Binh, Ashish Khare
A Novel Framework for Extracting GeoSpatial Information Using SPARQL Query and Multiple Header Extraction Sources

In the current digital world, where all the data is available digitally, data extraction has become quite a massive field of research. Web mining uses the data mining techniques to discover knowledge from the Web. Such sort of technique can be very useful in some applications which require massive and updated data. One of such applications that can deploy such an expertise automated query engine having a user-friendly graphical interface that can provide data regarding competitive exams. This paper proposes such a system that is more appropriate and advanced as it fetches data directly from one of the largest regularly updated database, i.e. Wikipedia.

Poonam Malpani, Paras Bassi, Mehul Mahrishi, Vipin Jain
Secure Data Sharing with Data Integrity in Public Clouds Using Mediated Certificate-Less Encryption

The popularity and widespread use of cloud have brought great convenience for data sharing and collection. Data sharing with a large number of participants must take into account several issues, including data integrity, efficiency, and privacy of data owners. The shared data must be strongly secured from unauthorized accesses. Many encryption mechanisms support fine-grained encryption. The existing mediated Certificate-less Public Key Encryption scheme reduces the management of key, but the method was found to be insecure against partial decryption attack. Although their scheme relies on pairing operations that incur considerably high computational costs. The proposed mediated Certificate-less Public Key Encryption (mCL-PKE) scheme provides its formal security without pairing operations on based access control.

Atesh Kumar, Saurabh Mishra, Priyank Dubey, Niraj Kumar
K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement

Visual cryptography is a method offering a plan which uses pictures circulated as shares in such a way that when the shares are stacked, a sensitive or secrete image is uncovered. According to extended visual cryptography, the offer pictures are built to hold the scattered images together, simultaneously opening a way to assist biometric security and visual cryptography methods. In this paper, we entail a proposal for halftone pictures that beautify the nature of the shares to come about from secrete image and to regain the secret picture in an extended visual cryptography plan for which the figure size of the secret pictures and the reconstructed picture by stacking shares is similar with respect to the first halftone secret picture. The ensuing plan upholds the ideal security of the first developed visual cryptography approach. This process includes 2 × 2 block replacement for generating shares from secrete image.

Ashish Sharma, Devesh Kumar Srivastava
Stepping Stone Detection Techniques: Classification and State-of-the-Art

Today, the most common way to perform various attacks is to use stepping stone hosts in the attacking path. In stepping stone attacks, attacker creates a long chain of connections via intermediary previously compromised nodes, to execute attack. The only way to break this chain is to detect stepping stones and applying some security constraints on the traffic flowing through them, not to allow malicious traffic through them. In this paper, we present classification and state-of-the-art of existing schemes proposed for stepping stone detection in recent past. Moreover, we compare these techniques based on their merits and demerits, and discuss open issues and challenges that can be used for further research in this domain.

Rahul Kumar, B. B. Gupta
CBIR Feature Extraction Using Neuro-Fuzzy Approach

This paper proposes a neuro-fuzzy based CBIR framework for image retrieval. Here, in the first phase, the fuzzy clustering algorithm is used for the classification of the images on the basis of their texture feature. In second phase, result of first phase serves as an input to the back propagation algorithm which helps to find images most semantically related to the query images. Our experiment shows that the proposed method results in better performance in terms of precision and recall as compared to the traditional CBIR techniques.

Ajay Kumar Bansal, Swati Mathur
Multiband and Wideband Antenna for Wi-Fi, WLAN, X-Band and Space Research Applications

With the rapid growth of high speed wireless communication, there is a need for a single antenna operating at different frequencies. Multiband antenna has provided the much needed solution for single antenna with wide bandwidth that will support multiple standards at the same time. Here, we have proposed a compact annular ring-shaped monopole antenna. The antenna has an L-shaped slot etched along with an additional slot near the feed point. The additional slot contributes in minimizing the return loss S11. Further for bandwidth enhancement to cover the wide range upper bevel cut with defected ground plane is proposed, two C-shaped slots are etched in the ground plane were made for obtaining new band at 7.5 GHz. The stepwise design procedure is thoroughly discussed along with parametric analysis and can be independently controlled for most applications. The proposed monopole antenna has dimensions of 50.9 × 33 × 0.8 mm3 with FR4 as its substrate. The FR4 substrate has a dielectric constant value $${\epsilon}_{r}$$= 4.4. This paper analyses the impedance bandwidth, return loss along with radiation plots. We have also verified the housing effect by placing the antenna in the vicinity of copper plate. Efficiency is improved up to 90 % with better return loss of −40 db is obtained.

Goswami Siddhant Arun, Deepak C. Karia, Bhushan Dhengale
Triple Band Slotted Antenna for Wireless Applications

In this paper, a compact triple frequency band antenna has been proposed using combinations of S-shaped and two comb-shaped slots. The FR-4 substrate has been used for the proposed design. This work aims to meet the requirements of weather radar system, Wi-Fi, WLAN, and Wi-MAX. The obtained simulated results show that the antenna has triple band in the frequencies ranging from 5 to 7.5 GHz for C band. The antenna resonates at 5.4, 5.8, and 6.8 GHz. The proposed design is simulated using CST software.

Ankur Dalmiya, Om Prakash Sharma
A Compact Design of Modified E-shaped Ground Plane Patch Antenna for Broadband Applications

A compact design of modified E-shaped antenna with wideband characteristics has been designed for high-speed WLAN and other wireless communication systems covering the operating frequency ranging from 3.295 to 5.655 GHz. Two parallel slots are incorporated into the patch of a microstrip antenna to expand its bandwidth. The length of the intermediary wing can be clipped and the length of the lower arm can be modified to tune the frequency of the resonant mode. Extensive study of E-shaped antenna has been carried out to improve the radiation performance of the proposed geometry. Low dielectric constant substrate is chosen to achieve a small-size radiating structure that meets higher bandwidth. Simulation is performed on CST software.

Sanjay Sharma, Sanyog Rawat
Frequency Switching in Coupled Microstrip Line Loaded with Split-Ring Resonator

This paper presents investigation of frequency switching of split-ring resonator-loaded microstrip line. We loaded the microstrip line with planar square split-ring resonator structure of a copper on Rogers RO3010, a substrate. The electric and magnetic interaction of split-ring resonator (SRR) with microstrip line is presented by simulating microstrip line-loaded split-ring resonator inside a waveguide with “High Frequency Structure Simulator” software. In this paper, the change in magnetic resonance is observed at varying loading distance between microstrip line and split-ring resonator.

Gurwinder Singh, Rajni, Anupma Marwaha
A New Compact Dual Band Microstrip BPF for GSM (1.8GHz) and WiMAX Using Asymmetric Stepped Impedance Resonators

We propose a design of a compact dual-bandpass microstrip filter (DBPF) for the GSM (1.8 GHz) and WiMAX (3.4 GHz) application using asymmetric SIRs. The presented filter has very low insertion loss (S21) and high selectivity for the desired band. Appearance of transmission zeroes near the edges of passband in the proposed design guarantees sharp cut off frequency and improves the selectivity of proposed band pass filter with fractional bandwidth (FBW) of 10 and 7.08 %.The proposed filter has low insertion losses, (S21) −0.24 and 0.14 dB and the return losses, (S11) −14.71 dB and −25.01 dB for the center frequencies 1.8 GHz and 3.4 GHz, respectively.

Tasher Ali Sheikh, Janmoni Borah, Sahadev Roy, Abhishek Kumar Pandey
Performance Analysis of ZigBee Mesh Networks Under Nodes Failure

ZigBee is an IEEE 802.15.4 standard which is created by ZigBee alliance. ZigBee uses three topologies star, mesh, and tree. In this research, the performance of mesh is analyzed with the failure of ZigBee end devices, ZigBee coordinator, and ZigBee routers. The effect of node failure, router failure, and coordinator failure is analyzed by changing the channel sensing duration from 1 to 3 s. The result is compared in terms of data traffic received, load, and throughput. The simulation is carried out by using Opnet 14.5 modeler.

Jashan Preet Kaur, Rajdeep Kaur, Gurpreet Singh Mann
Probabilistic-Based Energy Efficient Dynamic Route Discovery in MANET’s

The routing is able to send request message from source to destination hop through intermediate hops. The intermediate hops forward the received messages to its neighbours. The replicated copies of the request message will received at each hop. Each hop transmits the copy of message to its neighbours. In receiving and transmitting the messages, it consumes much of energy of hop, which can be saved by using selective hop forwarding approach. This paper proposed a model name as dynamic probabilistic broadcast for route discovery (DPBRD), which tries to reduce the replicated copies of control messages to save energy. This method determines the forward probability by consider extended area and hop density to forwards request messages to its neighbours. The performance of the proposed protocol has been evaluated and compared with AODV (Flooding), THPRD and DPBSC protocols across different performance metrics—Average received duplicate messages, saved percentage of forward messages, and energy consumption. The results demonstrate that the proposed DPBRD protocol outperforms other. NS-2 environment was used to simulate and analyse the proposed protocol.

Madan Mohan Agarwal, M. C. Govil, Anuj Kumar Jhankal
A Survey Paper on Computational Intelligence Approaches

Wireless sensor networks (WSN) is the collection of thousands sensor nodes. WSN faces many problems related to communication failures, data storage, and limited power supply. This paper includes the existing paradigms, such as fuzzy logic, neural network, evolutionary computing with some hybrid paradigms of computational intelligence, including some major challenges which help to reduce the gap between researchers and developers of WSN.

S. Taruna, Nidhi Bhartiya
Simulation of p-GaN/i-InαGa(1-α)N/n-GaN Solar Cell for Maximum Efficiency

The external efficiency of nonpolar p-GaN/i-In α Ga(1-α)N/n-GaN solar cells was simulated using limited constituent approach. Reduction of the poor effect of conduction band peak is done which is seen at the n-GaN/i-In α Ga(1-α)N interface. This particular effect is trimmed down by sinking the peak thickness. The optimization is done of p-doping in i-In α Ga(1-α)N layer on different indium composition (α) which reduces the thickness of conduction band peak and assists the carriers to flow through the peak. Our optimizations are presented here which predict 53.53 % efficiency for p-GaN/i-In0.37Ga(1-0.37)N/n-GaN device at 1 × 1016 cm−3 p-doping and 480 nm thickness of i-In α Ga(1-α)N layer using realistic material parameters.

Manoj Thosar, R. K. Khanna, Ashwini Joshi Thosar
Assessing the Severity of Attacks in Wireless Networks

Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.

Jeril Kuriakose, V Amruth, R Jaya Krishna, Devesh Kumar Srivastava
SD and TCH Blocking KPI Improvement Without Adding TRX Unit in BTS in GSM Network

Key performance indicators (KPIs) are used by all mobile service providers and their vendor as a benchmark to evaluate their performance and quality of service (QoS), and also to make comparative analysis with other service providers’ QoS and network performance. The Telecom Regulatory Authority of India (TRAI) also has its own sets of KPIs and its benchmarks to monitor the QoS provided by service providers. There are hundreds of KPIs used monitor network quality, of which network blocking KPIs, SD Blocking, and TCH blocking are tackled in this paper. ACLC, half rate (HR) tuning, and cell load sharing (CLS) are the advocated methods for SD and TCH blocking KPI improvement without adding TRX unit in BTS in GSM network on-air sites. These methods were implemented in live GSM network to improve TCH and SD blocking KPIs without increasing number of transceiver (TRX) units in the base transceiver station (BTS) and are mentioned accompanied with the results obtained by parameter changes on live GSM sites of Bharti Airtel.

Jitendra Vaswani, Gaurav Sharma
Design and Analysis of Right-Angled EBG Structure

A compact ultra-wideband microstrip antenna with double band-notched characteristics is presented in this paper. A circular split ring resonator (CSRR) and a Right Angled electromagnetic band gap (RA-EBG) design has been used to create double band-notched characteristics for WiMAX (3.3–3.6 GHz) and WLAN (5.1–5.8 GHz), respectively. Analysis of CSRR and RA-EBG shows EBG structure has advantages over CSRR to design notched band, such as tuneable notched frequency and notch-bandwidth controllable capacity. The proposed antenna has broad bandwidth and includes UWB band with VSWR <2.

Ajay Yadav, Dinesh Sethi, Priyanka Rahi, R. K. Khanna
High-Speed Packet Encoded Error Correction Technique for Wireless HD Video Streaming

The commercial images videos presently need to be modified with high definition (HD) because of its high quality and resolution. But in real-time environment flickering is a major problem associated in HD because of packet loss during transmission. To overcome this problem, in this paper we have proposed a high-speed packet encoded error correction technique and comparative analysis of various error correction methods with reference to speed and capacity to correct errors. The time required for the computation for proposed work is 0.017 s/frame in HD video streaming.

C. P. Latha, M. B. Manjunatha, A. Mohsin Khan
Review of Circular Polarization Techniques for Design of Microstrip Patch Antenna

This paper is a review of the techniques used to generate circular polarized radiation with reference to the feeding techniques. Circular polarized antennas are increasingly gaining importance in wireless communication. The usable bandwidth is the overlap of axial ratio bandwidth and impedance bandwidth. Cross-polarization is a measure of the polarization purity of circular polarized antenna. Dual circular polarization techniques involve the generation of both right-handed circular polarized radiation (RHCP) and left-handed circular polarization (LHCP) using the same antenna. Dual circular polarized antennas may be used for either frequency reuse or diversity applications.

Madhuri Sahal, V. N. Tiwari
A Proposed Modification Over Learning Vector Quantization and K-Means Algorithms for Performance Enhancement

Neural networks are extensively used nowadays to carry out tasks like prediction, pattern matching, and detections primarily carried out by medical practitioners acquiring expertise and knowledge of a very high level in the area of medical science. The artificial neural networks (ANNs) are applied to conduct tasks like image analysis and interpretation, signal analysis, development of drugs, etc. The proposed work focuses on performing effectual prediction and diagnosis of diseases like diabetes using data classification techniques, thereby modifying these algorithms to enhance their performance. This proposed work contains simulated learning vector quantization algorithm, and replaced the conventional Euclidean distance function with the Canberra distance function. The simulation results revealed significant performance enhancement in the output produced by this modification. The modification is also applied to K-means algorithm and its outcome is recorded.

Shirish Nagar, Ajay Khunteta
Taxonomy of Recent DDoS Attack Prevention, Detection, and Response Schemes in Cloud Environment

In recent years the need for using cloud environment has increased abundantly. Threats to cloud computing are also rising with its usage. Among various threats to cloud, distributed denial-of-service (DDoS) attack is a main threat today. DDoS attack compromises the availability of the services and risks everything including financial loss, losing reputation, and loss of confidence of cloud users over the organization. To avoid this we need more profound and elegant way to secure cloud structure from DDoS attack. In this paper, we discuss recent development and protection mechanisms (i.e., prevention, detection, and response) against DDoS attack in cloud environment. These methods include preventive measures that are applied before the attack, detection method that can be applied while the attack is live, and responsive methods that are applied after the attack. This paper discusses about DDoS attack problem, currently proposed solutions, and research scope possible in future to deal with such attacks efficiently.

Omkar P. Badve, B. B. Gupta
Design of Compact Concentric Circular Ring Patch Antenna with Defected Ground Plane

The design and radiation performance of a modified planar arrangement of concentric circular rings on defected ground plane (DGP) is reported for wireless communication and satellite applications. The etching of a defect in the ground plane is applied for antenna size reduction. The proposed compact antenna is simulated by applying CST Microwave Studio software and fed through strip line feeding. The overall size of the antenna is 39 mm × 46 mm × 1. 59 mm. The antenna resonates at three frequencies and the obtained frequency bandwidth is close to 2.2 GHz (2.330–4.530 GHz). The gain of antenna is simulated in the desired frequency range and is found close to 3 dBi. The proposed arrangement of antenna provides maximum radiations normal to patch geometry and shape of realized radiation patterns is somewhat similar to a dumble shape in the upper hemisphere. This antenna is specifically designed considering the wireless communication systems applicable in India.

Neelam Choudhary, Ajay Tiwari, Brajraj Sharma, J. S. Saini, D. Bhatnagar
On the Bandwidth Enhancement of Modified Star-Triangular Fractal Antenna

This paper presents a star-triangular fractal (STF) antenna operating between 1 and 30 GHz, which is modified by incorporating additional Sierpinski gasket fractal structure. The STF antenna is designed and simulated using adaptive mesh generation in Ansys software High Frequency Structure Simulator, based on finite element method (FEM) technique. The simulated outcome of amended fractal antenna has been evaluated in comparison to reference antenna. It is observed that the proposed antenna is applicable over super high frequency range.

Simarpreet Kaur, Rajni, Gurwinder Singh
A Simple Miniaturized Dual Band Antenna for WiMAX/WLAN Applications

A simple minitiaturized antenna for dual band operation is presented in this paper. A Microstrip line feed is used for achieving 50 Ω impedance matching and the antenna consist of a square patch of a small size 18(W) × 18(L) mM. By introducing two parasitic elements, two bands are created with resonating frequencies at 3.2 and 5.63 GHz. These two frequency bands range from 2.86 to 4.03 GHz (WiMAX) and 5.28–6.04 GHz (WLAN). It is a multiband antenna that could be easily integrated with portable mobile devices. The VSWR, gain, and radiation pattern of the proposed antenna are simulated using computer simulation technology software and shows good acceptance with the theoretical concepts.

Nirma Kumawat, Krishna Rathore
Fault Detection for the Cluster-Based System in Wireless Sensor Networks

A wireless sensor network is a self-configuring network of sensor nodes. One of the major areas to be concerned in wireless sensor networks is fault management. Due to some undesirable circumstances like crash and energy enervation faults become obvious to occur. In order to avoid performance degradation of deployed system due to these faults, it is essential to detect faults at an early stage. Therefore, an energy efficient cluster-based fault detection system has been designed. This system uses neighbour’s coordination approach to perform failure detection process. In addition to this failure detection, it is also mandatory to detect failure detection of cluster heads. So concept of detector is introduced for it. Failure detection for cluster heads is performed by this detector; a node having maximum residual energy among all cluster heads.

Rimpi Goyal, Sukhwinder Singh Sran
Gain and Bandwidth Enhancement of Single-Layered Slotted Triangular-Shaped Microstrip Patch Antenna with Stub for WLAN Applications

The paper presents a triangle-shaped patch antenna designed for WLAN systems operating in the range of 5150–5350 MHz (IEEE 802.11 a,n) and 5725–5825 MHz (IEEE 802.11 a,n). This paper presents a single-layered equilateral triangle-shaped microstrip patch antenna having rectangular slots and one stub. The simulated antenna is resonating at two resonance frequencies 5.20 and 5.76 GHz with 18.01 % impedance bandwidth and, 7.94 and 6.24 dBi directivity, respectively. The performance along with the design of the patch antenna is optimized considering different slot variance to obtain an antenna with high gain and efficient bandwidth. The E-palne and H-plane radiation pattern have also been synthesized in accordance with the other parameters. The substrate material of FR4 Lossy with relative permittivity 4.4 and loss tangent of 0.025 is used in this proposed antenna. All the simulation work is carried using IE3D software.

Dheeraj Bhardwaj, Gitansh Gulati, Lakshit Bhardwaj, Komal Sharma
Design of Dual Resonator Broadband Multilayer Electromagnetically Coupled Microstrip Antenna for X-Band Applications

This paper demonstrates the Dual resonator Broadband microstrip patch antenna for X-band applications with high bandwidth and gain. The antenna has wide bandwidth of 3880 MHz (7.12–11.0 GHz) or 42.76 % and covers wide band of X-band. 10.0 and 10.5 GHz are two resonant frequencies for the designed antenna. The antenna presented in this paper is microstrip patch antenna with rectangular geometry which has multilayer arrangement with two biangular uniform slots, which has been fed by Electromagnetic coupling with air-gap. This antenna designed and simulated has been carried out by IE3D simulation software.

Dheeraj Bhardwaj, Aayush Dwivedi, Nidhi Jain, Komal Sharma
An Environment Aware Frequency Selective Headset

A common problem associated with the use of conventional headsets is that all or most of the external audio signals are prevented from reaching the user which makes him unaware of the environment. Many times, accidents occur due to the user not being able to hear people calling them or trying to make them aware of a potential threat. To overcome this drawback of headsets, this paper proposes a novel technique that allows the user to hear and respond to certain frequencies such as human voice without having to take off the headset.

Sambit Mohapatra, G. V. Swathi, Vijayaraghavan Sundararaman
Performance Analysis and Optimization of 40 Gbps Transmission System over 4000 km with FBG

In this paper, we analyze the performance of the single channel transmission system for different lengths of fiber using dispersion compensated fiber (DCF) and fiber Bragg grating (FBG). A system with high data rate of 40 Gbps is simulated and analyzed to study effects of factors like dispersion and nonlinearity for different modulation techniques. The analysis is done in terms of bit error rate (BER) and quality factor (Q) for a comparative study of different level coding. The simulation results depict that FBG works as a better dispersion compensator as compared to DCF, also provides improved performance in optical fiber network with symmetrical compensation. The observation results that duo-binary coding schemes depict good performance with FBG (Fiber brag Grating) up to a length of 4000 km.

Mukesh Kumar Gupta, Jyoti Agarwal, Anila Dhingra, Ghanshyam Singh
Broadband Modified U-Shaped Patch Antenna for Wireless Communication

This paper presents a novel single-patch broadband microstrip patch antenna that is obtained by cutting a modified U-shaped slot on patch. The proposed antenna also has slots on ground plane. The length, width, and position of ground plane slots are so optimized to achieve wide bandwidth. The substrate material of proposed antenna is FR4-lossy and simulated on a CST-microwave design tool. The proposed antenna provides a bandwidth of 2.33 GHz centered at 4.73 GHz frequency with stable gain in the impedance bandwidth range.

Devendra Mehra, Sanyog Rawat
Performance Improvement of Epidemic Routing Protocol of Delay Tolerant Networks Using Improved Buffer Management

Large quantum of work has already been carried out by researchers in the field of delay tolerant networks (DTN). Most of the past work is related to designing and formulating routing strategies for DTN, managing the buffer using various queuing model, and securing the message bundle. In this work, we have analyzed the removal and accommodation of messages at the node, and observed that there are certain cases in which some messages that are removed from the node to accommodate new messages again arrive at the node through some other node, which in turn initiates the process of removal of the message from the buffer to accommodate this message. This leads to the circular loop of message removal/accommodation which in turn increases the overhead linked with the routing protocol and lowers the delivery probability. So, in this work we have proposed and analyzed the extension to this basic epidemic routing principle to avoid this message accommodation and removal loop. The results that were obtained clearly show that the extension applied to the epidemic routing protocol has a significant impact on the performance of the routing protocol and hence it is to be applied in the working environment.

Harminder Singh Bindra
Elliptically Slotted Self-affine 8-Shaped Fractal Multiband Antenna

Antennas in modern telecommunication systems require smaller dimensions and wider bandwidth. The authors have presented the self-affined multiband elliptically slotted 8-shaped fractal antenna. The elliptically slotted 8-shaped fractal antenna has been designed by iterated function system (IFS) up to the second iteration. The resonance frequencies of the second iteration of (K2) fractal antenna are 2.462, 3.329, 3.827, and 4.775 GHz with VSWR 1.359, 1.339, 1.221, and 1.911, respectively. The proposed fractal antenna (K2) size is reduced to 19.5 % from base structure (K0). Proposed fractal antenna (K2) obtained a bandwidth of 592 MHz. IE3D software has been used for simulation in this paper.

Rohit Gurjar, Ravi Singh, Saurabh Kumar
Design of Compact Triangular Patch Antenna for WiMax Applications

This paper presents a design of triangular microstrip patch antenna with varying substrate heights. The operating frequency used is in the range 1–3 GHz for wireless communication systems. Microstrip patch antenna with triangular shape is fabricated on FR-4 substrate which has a relative permittivity of 4.4 and mounted at a height above ground plane. Important parameters of antenna like return loss, input impedance, antenna gain, and VSWR are observed and comparison is done among the different antenna widths.

Manisha Gupta, Vinita Mathur
Post-accident Assistance Using On-Board Diagnostics and Smartphones

Today, we have reached a stage where we humans cannot imagine a life without automobiles. With considerable increase in the use of automobiles in our day-to-day life there is a proportional rise in the safety requirement in the vehicular network. Medical services are required to reach the accident location in minimal amount of time. Thus, we propose a system to accelerate the process of medical assistances and emergency services, reaching to the victims involved in a road accident. Smartphones give us a mean to establish wireless communication with the on-board diagnostics (OBD-II) and provide us with the computation power to monitor and detect various accident scenarios. The system determines the accident location using Global Positioning System (GPS) and broadcasts the location of the accident to the emergency services in the vicinity using the available GSM cellular network.

Arghya Biswas, Abhishek Pal
Digital Image Forensics and Counter Anti-forensics

The use of digital images in journalism and as evidence in the court of law for crime investigation and law enforcement are some application areas where it is extremely important to ensure authenticity of the images being used. Wide availability of sophisticated image processing software has simplified image manipulation. Image forensics deals with the study of the images to reconstruct their history and detect if it has undergone some intentional or unintentional modifications. This paper presents an introductory overview of the digital image forensics and its counterpart aiming to help the beginners understand their alliance so as to develop robust forensic tools against intentional and unintentional attacks on the multimedia. A brief look into counter anti-forensics is also presented in this paper.

Neha Singh, Sandeep Joshi
Can We Use Mass-Based Similarity Measure in Classification?

Similarity measures are very much essential in solving many data mining tasks such as clustering, information retrieval, and classification. A large number of the similarity measures directly or indirectly depend upon distance. Recently developed mass-based similarity measure, Massim, is well established in information retrieval task with algorithm MassIR. This paper will examine the probable uses of mass-based similarity measure in classification tasks.

Ashish Kumar, Roheet Bhatnagar, Sumit Srivastava
CNT-Based Biomedical Sensor for Cancer Detection

This paper proposes on simulation and characterization of sensing layer for biosensor application. Prostate cancer becomes critical for human being, when it is not detected at an early stage. So biosensor can play a vital role to detect initially. New generation sensor includes carbon nanotube (CNT). It could be better solution for sensing. This paper details biosensor and this aspect single-wall carbon nanotube with 20 Å is analyzed. And the functionalization, surface immobilization, as well as strict monitoring of physical and chemical features of single-wall carbon nanotube are described. These are necessary successful implementation for biomedical sensor. The chirality control, band gap control (semiconducting and metallic) properties along with some unique characteristics are also described with the help of Ninithi software.

Argha Sarkar, B. Madhuri, Shivam Kumar, Santanu Maity
Effective Role of Thrashing in Load Balancing During VM Live Migration

Virtualization is an important component of cloud computing. Researchers are paying attention in the field of virtualization for last many years. Researchers are taking much attention in load balance for proper resource migration (e.g., computing, storage and networking) and they proposed static, dynamic, linear, and heuristic algorithms in different ways with concept of time and energy efficiency. Proposed paper focused on thrashing mechanism to manage the resources during live migration in different virtual machines (VMs). This paper presents the different aspects of effective resource management mechanism.

Pradeep Kumar Tiwari, Sandeep Joshi
Real-Time Abandoned Object Detection Using Video Surveillance

Due to increase of attacks in public places, security has now become a major issue in public places. In this paper, we have proposed an abandoned object detection through video surveillance with real-time alarming. We use dual background subtraction method to find out the static object. It is been assumed that object which is part of foreground for longer period of time slowly turns as part of background. Background modelling is done using approximate median model. For foreground processing background subtracting method is followed by ANDing operation of frames to find out the static object. The system is simple to design and not having complexity of filters or complex calculation. PETS 2006 database is used for testing algorithm. The result shows satisfactory performance even under complex condition of shadow, moving crowd, and lightning condition. MATLAB R2013a is used for compilation of system.

Aditya Gupta, V. R. Stapute, K. D. Kulat, Neeraj Bokde
Request Allocation and Resource Management Techniques in Cloud Computing

Cloud computing raises capacity by providing resources as a service; there is no need to purchase new resources. Popularity of cloud computing systems has been increasing, which rents computing resources on user demand. Many users must be provided services by cloud simultaneously as per their requirements. In this, it is difficult for the cloud to process requests of all and allocates resources to the users in a mutually optimal way at the same time. So, this paper is a review of certain papers on request processing and resource allocation techniques or algorithms in cloud computing and proposes a new user defined dynamic priority scheduling algorithm.

Swati Khemka, Mehul Mahrishi
Blind Image Watermarking of Variable Block Size for Copyright Protection

The development of multimedia technology has paved a way for rapid and fast communication. Various multimedia objects are transmitted through Internet once they have been captured. This has lifted up the concern over secure communication and also copyright protection issue. It is likely a case for the creator to be in dilemma whether the data had reached the intended person with all its imbibes integrity or not. Watermarking is an art of hiding owner’s signature in terms of text, audio, video, or image to prove the authenticity of an owner. This serves as safeguard for the originator in case of any misshape. In this paper, an efficient and blind watermark embedding method has been developed using Haar wavelet. The binary logo is used as a watermark that carries a sequence of zeros and ones. The single bit of watermark is embedded in k block size of the original image. The proposed scheme shows an excellent performance and has admirable robustness against various attacks.

Amit M. Joshi, Monica Bapna, Manisha Meena
Compact Goblet-Shaped Single Band-Notched UWB Antenna

A compact planar monopole antenna with band-notched characteristics suitable for ultra-wide band operation is presented. The antenna consists of a goblet-shaped patch with a wide bandwidth ranging from 2.6 to 11.7 GHz. A good band reject performance is obtained by suitably placing the vertical strip on one of the lower sides of goblet-shaped radiating patch. The specialty in the design is its simplicity and compactness. Antenna occupies a very small size of 20(W) × 33(L) × 1.6(H) mm3. Because of its compactness and good radiation performance; it can be easily integrated with mobile wireless devices for UWB applications.

Rajesh Kumar Raj, Krishna Rathore, Bhavana Peswani, Roopkishor Sharma, H. R. Chaudhary
An Application of Firefly Algorithm for Clustering in Wireless Sensor Networks

Wireless sensor network gained popularity during the past few decades due to the ad hoc nature, which makes it easy to install in a landscape where human may not be able to approach. Wireless Sensor Network (WSN) is considered for networks consisting of many tiny sensor devices running on batteries. This type of wireless sensor networks are deployed to fulfil a specific objective for a long period of time, hence the energy consumed in communication should be optimized to prolong the network. This paper presents the energy optimization method using Firefly algorithm to prolong network lifetime. Firefly algorithm is a nature inspired optimization technique that is based on the behaviour of an insect known as “Firefly” that produces the flashing light mainly to attract the pray and to attract the mating partner. The proposed algorithm for effective communication is compared with LEACH and ABC (Artificial Bee Colony) optimization for cluster-based sensor network and the simulated result shows the better performance.

Arshad Nadeem, T. Shankar, Rakesh Kumar Sharma, Sourabh K. Roy
Microstrip Antenna with Defected Ground Structure (DGS) for Multiband Operation

In this paper, a microstrip feeding rectangular MPA using DGS structure into ground plane is presented. In the absence of a slot, a conventional rectangular MPA is also considered for confirming the validity of designed antenna. This conventional antenna design was found to resonate on 7.0611 GHz frequency at −23.70 dB return loss. When introducing the combination of two L-shaped DGS structures into the ground plane, then the frequency shift from 7.0611 GHz to 3.2012 GHz is observed. The main involvement of this antenna design is the multiband responses. Further, the end result confirms that the designed DGS antenna has return loss at −14.0170 dB on 3.2012 GHz, −16.5623 dB on 4.4505 GHz, −17.8874 dB on 5.1952 GHz, and−17.5474 dB on 8.9349 GHz.

Vinay Sharma, Rajesh Kumar Vishwakarma
Design of a Compact Novel Planar Dual Band-Notched UWB Antenna

In this paper, a compact planar ultra-wideband (UWB) antenna with double band-notched characteristics has been presented. The design involves a lamp post-shaped planar radiator fed through a microstrip line of width 2.6 mm, with a U-shaped slot and a C-shaped slot etched on the radiator, with a slotted ground plane on the other side of the substrate. The proposed antenna has been realized using CST MWS SuiteTM. The antenna has a size of 30 × 30 × 1.6 mm3 prototyped on FR4 substrate. The proposed antenna exhibited a bandwidth of more than 7.5 GHz, i.e., 2.68–11.75 GHz for VSWR ≤ 2 over the entire range except at two notched bands for WiMax systems at 3.3–3.7 GHz and WLAN systems at 5.15–5.85 GHz. The average gain of the antenna is 4.5 dBi with a variation of ±1.8 dBi over the entire impedance bandwidth. The proposed antenna has demonstrated nearly omnidirectional radiation pattern over the entire impedance bandwidth except for the two notched bands centered at 3.5 and 5.5 GHz.

Sanjiv Tomar, Ajay Kumar
X-Band and Ku-Band Patch Antenna for Radio Location Applications

Simple and compact microstrip patch antenna for radiolocation application in X-band and Ku-band is proposed. Using three rectangular and two cylindrical slots in patch, we get one frequency band (9.8–10.3 GHz) in X-band and another band (13.23–13.60 GHz) in Ku-band and both the bands are used for radiolocation applications. The proposed antenna is designed on Rogers R04350 substrate with dielectric constant 3.66 and thickness 1.5 mm and its overall size is 10 × 10 × 1.57 mm3 with patch size 7 × 8 × 0.035 mm3. The results of the proposed antennas like return loss, VSWR, and radiation pattern (gain, directivity, and efficiency) are simulated and analyzed using commercial computer simulation technology microwave studio (CST MWS). By simulating this antenna structure using the above EM tool, we are getting two resonant frequencies 10.12 and 13.5 GHz. The return loss at these frequencies is −34.19 dB and −32.75 dB which is very good. The gain at the first resonant frequency is 4.76 dB and at second resonant frequency it is 5.14 dB and the efficiency at both the resonant frequencies is 93 and 72.2 %. The value of VSWR ≤ 1.5 for both the resonant frequencies. The main application of the proposed antenna is to make it compatible with radiolocation applications in X-band (8–12 GHz) and Ku-band (12–18 GHz).

Amit Singh Bhadouria, Suman Kumari, Mithilesh Kumar
Procuring Wireless Sensor Actuator Network Security

Wireless Sensor Actuator Networks (WSANs) are large-scale innovative networks. The dynamic, reconfigurable, and self-adjustment nature of these networks make them distinctive from rest of the networks using wireless medium for communication. This is because these networks are basically placed in hostile environments like—surveillance, forest fire detection, flood detection; it has many applications and defense is the most prominent one. Hence security forms the basis of this paper which includes attack detection and mitigation using various schemes. A vision on denial-of-service (DoS) attack and its preventive measures for WSAN are in particular. The preeminent objective of this paper is to identify various intruder attacks in WSANs and to propose a new optimal solution for the prevention of DoS attacks (flooding attack) in WSAN. There are various mechanisms to eliminate the malicious node that carry out an attack. These mechanisms are used to safe guard against intruder attacks. In this paper, we have simulated flooding attack in wireless sensor actuator networks, computed a mitigation system and tested the validity of our results.

Jasminder Kaur Sandhu, Sharad Saxena
Performance Analysis of VoIP over WiMAX Networks Under Nodes Failure

WiMAX stands for Worldwide Interoperability for Microwave Access. Multimedia applications are gaining much of the user attention with the introduction of new broadband technologies. VoIP is the most well-known service of WiMAX and is a growing rapidly in world of telecommunication. Not only for improved quality but for also a wide range we prefer wireless networks. As in wireless networks nodes are mobile meaning they can move freely so in my thesis we do study on the performance under nodes failure, and its effect on the entire performance of the network. Various codecs have been used to check the performance. In this Paper, the performance of WiMAX for Voice over IP (VoIP) by varying no. of nodes failure is analyzed for two transmitter techniques MIMO and SISO. The performance is analyzed by using OPNET Modeller. The performance is compared in terms of throughput, end-to-end delay, and traffic sent.

Jinia, Jarnail Singh
Design of Reduced Order Controller for Mechanical System

Most of control system designing methods are based on mathematical model of the object. Consequently, it is very thorny to design the controller when containing high order. For this purpose, the system is modelled as linear time invariant system using well-known laws of mechanics, and then use model order reduction techniques for reducing the system. Using the state derivative feedback and reduction methods a reduced state derivative feedback controller is designed and used for a mechanical system. In addition comparison is done with state feedback controller and state derivative feedback controller.

Jyoti Kataria, Manish Kumar Madhav, Sunny Kumar Verma
A Survey on Black Hole Attack in MANET

Security is a primary goal in order to provide data transmission or communication among mobile hops in hostile wireless environment. MANET is self-configuration and decentralized-type network and it is different from wired one. Some unique characteristics of MANET are dynamic topology, self-configuration, and strict resources and shared medium; make it different from wired infrastructure. All nodes in mobile ad hoc network perform their task in associative way. These characteristics become also challenges for MANET to some extent and make a situation to build a solution that provides broad protection and efficient performance. Security is a very important characteristic during implementation of MANET or other network. MANET is widely used in our daily life like meeting, conference, medical field emergency situations like flood, earthquake, and military operation. In this chapter we discuss on the security services in MANET. We also discuss security attack at different layers and our major concern about network layer attack is especially on black hole attack and its existing solution.

Shruti Singh, Abhishek Bajpai, Suryambika
Area-Efficient FPGA Model of LMS Filtering Algorithm

Present technical scenario of communication system, adaptive filters has been widely used, in several applications such as adaptive interference cancellation, beamforming, prediction equalization, and plant identification. This research work proposes an area-efficient design of FPGA based least mean square. A control approach is used to minimize the state diagram of the FSM of the proposed filter design. Least mean square algorithm is usually used for low computational complexity, simplification, and better performance in different running environments.

Devendra Goyal, Manish Singhal
An Efficient Hybrid-Cascaded Framework for Emission Computed Tomography Using OSEM Image Reconstruction Algorithm

In the literature, it is well established that the ordered subset expectation maximization (OSEM) algorithm, is an accelerated version of original maximum likelihood expectation maximization (MLEM) method, which performs better than MLEM in terms of processing speed. But, the quality of the reconstructed image with OSEM still remains same as MLEM and it also suffers from the problem of initialization and ill-posedness. To address these issues, in this paper a hybrid-cascaded framework of OSEM is proposed. This framework consists of breaking the reconstruction process into two parts, viz., primary and secondary. In the primary part, simultaneous algebraic reconstruction technique (SART) is applied to overcome the problems of slow convergence and initialization. SART provides fast convergence and produce good reconstruction results with lesser number of iterations than other iterative methods. The task of primary part is to provide an enhanced image to secondary part to be used as an initial estimate for reconstruction process. The secondary part is a hybrid combination of two parts namely, the reconstruction part and the prior part. The reconstruction is done using OSEM algorithm while anisotropic diffusion (AD) is used prior to deal with ill-posedness. A comparative analysis of the proposed model with some other standard methods in the literature is presented both qualitatively and quantitatively for a phantom test data and standard medical image. The proposed model yields significant improvements in reconstruction quality from the projection data.

Shailendra Tiwari, Rajeev Srivastava
A Review of Energy-Efficient Routing Protocols in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are collection of randomly distributed minute devices mainly named as nodes which interact with each other and base station to transmit the required information to the controller via Internet. These networks sense or track the phenomenon, occurring at an unattended place. The major constraint of the WSN is limited life of sensor nodes due to loss of energy. Several routing protocols are developed to transfer the information or data among these nodes in an efficient way and to enlarge the lifetime of nodes. A thorough review of different categories of routing protocols has been discussed in the presented paper.

Simerjeet Kaur, Rajni, Barinder Paul Singh
A Study of Phase Shifting Surface

This paper presents a study of phase-shifting surface (PSS). The phase-shifting surface (PSS) is a free-standing surface or screen that allows for shifting, controlled, or changing of the phase of an electromagnetic (EM) wave propagating through it. PSS dielectric surface is divided into a lattice of unit cells which are rectangular or square, each unit cell designed to provide a predetermined phase shift. A high-gain, low-cost and lightweight antenna for microwave region is required in various applications. For achieving that goal PSS concept is used.

Neha Singh, Kamal Kishor Choure
Review on Student Attendance Maintenance System: A Discontentment

In many counties including India, monitoring student attendance, in almost all the educational sectors be it schools, institutes, college or universities, is still a tedious, time-consuming, error-prone, unmanageable and manual process. The above fact is hard to fathom in the present era where technological developments are on the cutting-edge and technology-driven solutions have served as primary key to unlock doors to trouble free quality life. Thus the paper aims to bring in lime light the importance of careful monitoring of student attendance, hardship associated with prevailing ways of monitoring student attendance, typical nature of problem of student attendance maintenance (as compared other problems with innate identification requirement), RFID as a promising technology, salient features (and needs) to which student attendance systems should be tailored. The paper reviews of some of the work done so far in the field of RFID based student attendance maintenance systems. The paper aims to lay foundation for focused research to develop and deploy not just feasible but broadly acceptable technical solution for maintenance of student attendance in all educational sectors.

Anshuman Kalla, Dileep Kumar Tiwari
Backmatter
Metadata
Title
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
Editors
Nitin Afzalpulkar
Vishnu Srivastava
Ghanshyam Singh
Deepak Bhatnagar
Copyright Year
2016
Publisher
Springer India
Electronic ISBN
978-81-322-2638-3
Print ISBN
978-81-322-2636-9
DOI
https://doi.org/10.1007/978-81-322-2638-3