作者:
Thasni NoushadKishore SebastianP G Scholar
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India. Assistant Professor
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India.
Energy harvesting is important in the case of recharging or repay of battery. Energy harvesting means that energy is derivered from external sources like solar energy, thermal energy, kinetic energy and wind energy. T...
Energy harvesting is important in the case of recharging or repay of battery. Energy harvesting means that energy is derivered from external sources like solar energy, thermal energy, kinetic energy and wind energy. Two or more sensors are attached to a body forms Body Sensor Networks (BSNs). BSN s are mainly focused in healthcare domain. it allows patients, physiciants, caregivers, scientists, etc. It useful for continuous monitoring of patients (Diagnosis patients, treatment of chronic obstructive pulmonary disease patients and other health conditions). Doctors made interaction between the data collected body sensors and personal digital assistant (PDA). Disadvantage of existing system is batteries cannot be easly replaced, met must be near a transmitter, expensive, etc. Energy Harvesting and Data Collection (EHDC) focuses two types of energy harvesting techniques such that solar and thermal energy harvesting and two types of data collections are used :indoor and outdoor data collection. Harvested energy can be predicted by using Kalman Filter. EHDC provide mobile healthcare services and does not need recharging.
作者:
Neetha GeorgeJeena ThomasP G Scholar
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India. Assistant Professor
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India.
Autonomous vehicles in Vehicular Ad-hoc Networks(VANET)-the spontaneous creation of a wireless network for data exchange to the domain of vehicles may pave the way for future systems where computers take over the art ...
Autonomous vehicles in Vehicular Ad-hoc Networks(VANET)-the spontaneous creation of a wireless network for data exchange to the domain of vehicles may pave the way for future systems where computers take over the art of driving. It aids in transferring secure messages for proper communication between the vehicles. Unauthorized access like injecting spoofed messages to VANET can arise as an extreme threat. So remedies should be taken at early degree of architectonic process. Denial-of Service(DoS) attack takes place while validating each message in VANET, so an equity between message authentication and DoS prevention should be maintained. This paper discusses on diverse security demanding situations and distinct techniques to secure message transfer between the vehicles that are connected wirelessly.
Delay Tolerant Network (DTN) is another category of network that lacks continuous network connectivity. Nodes are dependent on opportunistic contacts for message forwarding. Every node has a buffer space where message...
Delay Tolerant Network (DTN) is another category of network that lacks continuous network connectivity. Nodes are dependent on opportunistic contacts for message forwarding. Every node has a buffer space where messages are stored till the messages are forwarded to other nodes existing the network, till the message reach the destination node. Buffer space is a crucial resource in DTNs. When a buffer space becomes full, to accommodate new messages, older messages are dropped from buffer space. As nodes in DTN are subject to high data loss and intermittent connection problems. To overcome this issue, relay nodes, i.e. Throwboxes are introduced into the network. Throwboxes are tiny, inexpensive devices, acting as additional storage units for nodes to enhance the overall DTN based network performance. Throwboxes increases contact opportunities and improve over message delivery ratio. In this paper, we aim to analyze the performance of DTN network by introducing Static or Mobile throwboxes in the network in terms of Message Delivery Ratio, Latency and Contacts per hour. Extensive simulations are performed using ONE Simulator by considering both random and planned office-based scenarios. And it is observed via simulation-based results, that with introduction of Throwboxes in DTN, message delivery ratio is improvised at a whopping rate of 14%, latency is reduced by 10% and contacts per hour shows improvement by 25%.
Software is essential for the bulk of research today. It appears in the research cycle as infrastructure (both inputs and outputs, software obtained from others before the research is performed and software provided t...
Software is essential for the bulk of research today. It appears in the research cycle as infrastructure (both inputs and outputs, software obtained from others before the research is performed and software provided to others after the research is complete), as well as being part of the research itself (e.g., new software development). To measure and give credit for software contributions, the simplest path appears to be to overload the current paper citation system so that it also can support citations of software. A multidisciplinary working group built a set of principles for software citation in late 2016. Now, in ACAT 2017 and its proceedings, we want to experimentally encourage those principles to be followed, both to provide credit to the software developers and maintainers in the ACAT community and to try out the process, potentially finding flaws and places where it needs to be improved.
作者:
S. SarikaA. PravinA. VijayakumarK. SelvamaniAssistant Professor
Department of Computer Science and Engineering Sathyabama UniversityChennai India Assistant Professor
Department of Computer Science and Engineering Sathaybama UniversityChennai India Professor
Department of Information Technology Jerusalem College of Engineering Anna University Chennai India Assistant Professor
Department of Computer Science and Engineering Anna University Chennai India
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wire...
详细信息
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wired networks ensure the secured communications. But, in the case of wireless mobile ad hoc networks, the nodes are dynamic and the topology based and also needs more power consumptions. Because of mobility in wireless mobile adhoc networks, also there are lots of vulnerabilities when the attackers wish to collapse the partial or entire networks. Hence, there are lots of requirement for an understanding of the various problems associated with the wireless mobile networks. In this paper, the various vulnerabilities, attacks and security mechanisms are discussed for mobile ad hoc networks (MANETs) in detail.
Rapid growth of technology and infrastructure has made our lives easier. Whole system allows user's mobility to be tracked using a mobile phone and android Application. A mobile phone application has been develope...
详细信息
ISBN:
(纸本)9781538619605
Rapid growth of technology and infrastructure has made our lives easier. Whole system allows user's mobility to be tracked using a mobile phone and android Application. A mobile phone application has been developed and deployed on an Android Phone whose responsibility is to track the GPS location and update it to a database. Currently most of the public having their own vehicle, threat of theft is always there at parking or sometimes driving at insecure places. The safety of vehicles is extremely essential for public for which Vehicle tracking and locking system installed in the vehicle, to track the place in case of theft. In this system client just login to vehicle mobile and send you the current location of your vehicle in the form of latitude and longitude along with location name.
作者:
Sminu IzudheenSheena MathewAssistant Professor
Department of Computer Science & Engineering Rajagiri School of Engineering & Technology Kerala India Professor
Division of Computer Engineering School of Engineering Cochin University of Science & Technology Kerala India
Link prediction has recently attracted the attention of many researchers as an effective technique to understand the associations between proteins. But most of the work in this area was concentrated on predicting exis...
详细信息
Link prediction has recently attracted the attention of many researchers as an effective technique to understand the associations between proteins. But most of the work in this area was concentrated on predicting existence of links in future. Very few works has explored the prediction of links that might disappear in future. Also, links predicted by these methods may contain high levels of wrong interactions. In this paper, we propose a method to optimize the negative link predicted in protein network through Weak Edge-Edge Domination (WEED) set. We have tested our model using different standard prediction methods and the results obtained assert that our method can be used as an effective method to reduce false positive rate of negative links predicted in protein network.
Big Data, the new buzz word in the industry, is data that exceeds the processing and analytic capacity of conventional database systems within the time necessary to make them useful. With multiple data stores in abund...
详细信息
Big Data, the new buzz word in the industry, is data that exceeds the processing and analytic capacity of conventional database systems within the time necessary to make them useful. With multiple data stores in abundant formats, billions of rows of data with hundreds of millions of data combinations and the urgent need of making best possible decisions, the challenge is big and the solution bigger, Big Data. Comes with it, new advances in computing technology together with its high performance analytics for simpler and faster processing of only relevant data to enable timely and accurate insights using data mining and predictive analytics, text mining, forecasting and optimization on complex data to continuously drive innovation and make the best possible decisions. While Big Data provides solutions to complex business problems like analyzing larger volumes of data than was previously possible to drive more precise answers, analyzing data in motion to capture opportunities that were previously lost, it poses bigger challenges in testing these scenarios. Testing such highly volatile data, which is more often than not unstructured generated from myriad sources such as web logs, radio frequency Id (RFID), sensors embedded in devices, GPS systems etc. and mostly clustered data for its accuracy, high availability, security requires specialization. One of the most challenging things for a tester is to keep pace with changing dynamics of the industry. While on most aspects of testing, the tester need not know the technical details behind the scene however this is where testing Big Data Technology is so different. A tester not only needs to be strong on testing fundamentals but also has to be equally aware of minute details in the architecture of the database designs to analyze several performance bottlenecks and other issues. Like in the example quoted above on In-Memory databases, a tester would need to know how the operating systems allocate and de-allocate memory and u
作者:
M. NishaP.C. Reghu RajMtech Scholar
Department of Computer Science and Engineering Government Engineering College Sreekrishnapuram Palakkad Kerala Assistant Professor
Department of Computer Science and Engineering Government Engineering College Sreekrishnapuram Palakkad Kerala
The morphological richness and the agglutinative nature of Malayalam make it necessary to retrieve the root word from its inflected form in most of the NLP tasks. This paper presents an approach to identify the suffix...
详细信息
The morphological richness and the agglutinative nature of Malayalam make it necessary to retrieve the root word from its inflected form in most of the NLP tasks. This paper presents an approach to identify the suffixes of Malayalam words using MBLP approach. The idea here is to use Memory Based Language Processing (MBLP) algorithm for Malayalam suffix identification. MBLP is an approach to language processing based on exemplar storage during learning and analogical reasoning during processing. Sandhi splitting is essential for morphological analysis, document indexing and topic modeling. Suffix separation improves the quality of machine translated text. Training instances created from words are manually annotated for their segmentation and the system is trained using TiMBL (Tilberg Memory Based Learner). The paper presents memory-based model of Malayalam suffix identification and its generalization accuracy.
In the past decade, more stress has been given to user interface since technology is made available to every human being. This includes advancement of touch technology over buttons and many more gesture control mechan...
详细信息
In the past decade, more stress has been given to user interface since technology is made available to every human being. This includes advancement of touch technology over buttons and many more gesture control mechanisms. These technologies enable even a laymen to better use the day-to-day technologies like cell phone and personal computer easily with navigation. This work focuses on one such technology that can be implemented on a PC (Personal computer). We use single web camera as input device to recognize gestures of hand. Some of these gestures include controlling the mouse cursor, the clicking actions, and few shortcuts for opening specific applications. This work includes Face Recognition model as an replacement for default lock screen. The Face Recognition model uses Viola and Jones method for detection of face and PCA (Principal Component Analysis) for recognition and identification of algorithms.
暂无评论