HomePaper SubmissionProgram CommitteeAccepted PapersContact Us

Accepted papers

  • Utilization of Bandwidth in Transmission Network with Corrective Control and Security Mechanism
    Sharyu Kankapure1 and Antara Bhattacharya2,Department of Computer Science and Engineering,Nagpur University,India
    ABSTRACT
    Efficient and reliable communication is essential for achieving high performance in a network computing environment. The transmission network needs to be flexibly and economically robust against all uncertainties. Corrective control operation strategy, however, can be alternatively used to boost the flexibility, to expedite the integration of the new generators. The growth in application of corrective actions to enhance network utilization will require a probabilistic treatment of network security for determining efficient levels of investment in network reinforcement. Input files like audio, text, word etc. can be sent over the network via normal and utilized network mode. After sending the data throughput, bandwidth and latency will be compared in calculated data and in graphical format. The performance of interconnection networks is often measured in terms of transmission latency and network throughput. Latency is calculated as the average number of cycles required to deliver a packet from source to destination, this is mainly a function of the signals travel time, and processing time at any nodes the information traverses. Bandwidth commonly measured in bits/second is the maximum rate that information can be transferred. Throughput is the actual rate that information is transferred. The Advanced Encryption Standard (AES) is used for encryption of data in a large variety of applications, and high throughput and security are required. Secured data can send over the network by applying AES algorithm so that data security is maintained for different kind of applications where data security is the major concern. And at client end data can be decrypted as per requirement. The objective of research project is to utilize maximum bandwidth and throughput along with minimum latency. Low latency is advantageous for data transfer over a network.
  • SEDAS:A Self Destructive Active Storage Framework for Ensuring Security & Privacy of Data
    Vaishali Jadhao and Hemlata Dakhore,G.H Raisoni Nagpur, India
    ABSTRACT
    On Cloud personal data is stored that may contain account numbers, passwords, notes of users, and these data and other information that could be important for the user may be misused by a hacker, a competitor, or by a court of law. These data which we store on cloud are cached and copied by Cloud Service Providers; this often happens without users' authorization and control. Self-destruction of data mainly aims at protecting the data's privacy of user. Without any information to user there data and copies get destructed after the user specified time. Also the decryption key gets destructed after the user-specified time. Various cryptographic techniques along with active storage techniques are used in this system to meet the challenges which are faced by the user. We implemented a proof-of-concept self destructive prototype. The results demonstrate that the system can be practically used and meets all the goals for preserving privacy by the self destructive prototype. The throughput for uploading the data and downloading the data with the proposed system acceptably decreases, while the latency for upload/download operations with the self-destructing data mechanism increases if we compare to the system without self destruction data mechanism. Index Terms- Cloud computing, Active storage data privacy, self-destructing, data privacy
  • Multi-Cloud Based Secure Storage System using Triple-DES Algorithm
    Dolly Talware and Ms.Purnima Soni, Nagpur University,India
    ABSTRACT
    In modern centuries use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organization as per requirements. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access mechanism is an actual technique to guarantee the file safety in the cloud. On the other hand, due to file farm out and untrusted cloud servers. The file entrance mechanism develops an exciting issue in cloud storage systems. In effect right to use mechanism systems are no extended related to cloud storage schemes, because they also produce various converted copies of the similar files or involve a completely reliable cloud server. Malicious user at cloud storage is become most difficult attacks to stop. In proposed system, we are executing the ideas of various cloud storage beside with enhanced safety using encryption methods where rather storing complete file on single cloud system. File can divided the file in different sections at that time encode and store it on different cloud and the meta information necessary for decrypting and affecting a file will be stored in metadata organisation server
  • Control of Linear Systems Using Dynamic Output Controllers
    Anna Filasov'a and Duˇsan Krokavec,Technical University of Koˇsice,Slovakia
    ABSTRACT
    The paper deals with the problem of control of continuous-time linear systems by the dynamic output con- trollers of order equal to the plant model order. The design procedure is based on a solution of the set of linear matrix inequalities and ensures the closed-loop stability using Lyapunov approach. Numerical examples are given to illustrate the design procedure and relevance of the methods as well as to validate the performances of the proposed approach.
  • On Observer Design Methods For A Class of Takagi-Sugeno Fuzzy Systems
    Duˇsan Krokavec and Anna Filasov'a,Technical University of Koˇsice,Slovakia
    ABSTRACT
    The generalized design principle of TS fuzzy observers for one class of continuous-time nonlinear MIMO systems is presented in this paper. The problem addressed can be indicated as an descriptor system ap- proach to TS fuzzy observers design, implying the asymptotic convergence of the state observer error. A new structure of linear matrix inequalities is outlined to possess the observer asymptotic dynamic proper- ties closest to the optimal.
  • Adaptive sliding mode based trajectory tracking controller
    Smain Azzeddine Tchenderli Braham, Faiza Hamerlain and Nadia Saadia,Algeria
    ABSTRACT
    In this paper we address the problem of a chatter attenuation using a first order sliding mode control in the case of a trajectory tracking task for a four wheel mobile robot in double steering mode. A simulation results will show the effectiveness of the method.
  • Cooperation adaptive devices applied in general game playing
    Jose Maria Novaes Santos and Joao Jose Neto,University of Sao Paulo,Brazil
    ABSTRACT
    In the literature, there are formalisms whose behavior can be described by a finite set of rules that maps the current device's state into a new one, like the finite state machines, statecharts and petri nets. Those formalisms are named as rule-driven devices. A formal device is said to be adaptive if its behavior changes dynamically in response just to its input stimuli and its current state, without any external help. Adaptive rule-driven devices can be used for modeling complex problems in artificial intelligence, natural language, reactive systems, synchronous system and others applications. General game playing (GGP) is a research subfield of Artificial Intelligence which aims at developing systems able to play a variety of games, knowing and understanding the rules only in execution time. Most of the proposed GGP systems are based in statistic methods. This paper aims a new approach in GGP systems, proposing a solution based in adaptive technology modeling. In brief, it has been developed a GGP system that changes its behavior dynamically in response the rules information and its history of games played. It is presented the proposal and some results of an amount of games played, comparing the strategies approach.
  • Analysis of Spectrum sensing Techniques for detection of DVB-T Signals in Gaussian and Fading Channels
    Ireyuwa Igbinosa1 , Olutayo Oyerinde 2 and Stanley Mneney3, University of kwaZulu-Natal1,3 , University of the Witwatersrand,2 South Africa.
    ABSTRACT
    Spectrum sensing is an essential concept in cognitive radio. It exploits the inefficient utilization of radio frequency spectrum without causing destructive interference to the licensed users. In this paper we considered spectrum sensing of Digital Video Broadcast Terrestrial (DVB-T) signal in different scenario. We compared various spectrum sensing algorithms that make use of the second order statistics; the energy detector was also included for comparison. The results show that it is possible to obtain good detection performance by exploiting the correlation method.
  • Speaker Identification using FBCC in Malayalam Language
    Drisya Vasudev and Anish Babu K.K,Rajiv Gandhi Institute of Technology,India.
    ABSTRACT
    Speaker identification attempts to determine the best possible match from a group of certain speakers, for any given input speech signal. The text-independent speaker identification system does the task to identify the person who speaks regardless of what is said. The first step in speaker identification is the extraction of features. In this proposed method, the Bessel features are used as an alternative to the popular techniques like MFCC and LPCC. The quasi-stationary nature of speech signal is more efficiently represented by damped sinusoidal basis function that is more natural for the voiced speech signal. Since Bessel functions have damped sinusoidal as basis function, it is more natural choice for the representation of speech signals. Here, Bessel features derived from the speech signal is used for creating the Gaussian mixture models for text independent speaker identification. A set of ten speakers is used for modelling using Gaussian mixtures. The proposed system is made to test over the Malayalam database obtaining an efficiency of 98% which is promising.
  • Speech Recognition by Adaptive Network Based Fuzzy Inference System and Subtractive Clustering
    Samiya Silarbi,University of Sciences and Technology,Algeria.
    ABSTRACT
    This paper presents the application of Adaptive Network Based Fuzzy Inference System ANFIS on speech recognition. The primary tasks of fuzzy modeling are structure identification and parameter optimization: the former determines the numbers of membership functions and fuzzy if-then rules while the latter identi-fies a feasible set of parameters under the given structure. However, the increase of input dimension, rule numbers will have an exponential growth and there will cause problem of "rule disaster". Thus, determina-tion of an appropriate structure becomes an important issue where subtractive clustering is applied to define an optimal initial structure and obtain small number of rules. The appropriate learning algorithm is per-formed on TIMIT speech database supervised type, a pre-processing of the acoustic signal and extracting the coefficients MFCCs parameters relevant to the recognition system. Finally, hybrid learning combines the gradient decent and least square estimation LSE of parameters network. The results obtained show the effectiveness of the method in terms of recognition rate and number of fuzzy rules generated.
  • Generating Random Path between Two Points in Space: Proposed Algorithm
    Ahmad Tayyar,Jordan
    ABSTRACT
    In this paper a computerized method is proposed to generate a random path that consists of finite number of points in space, those points are randomly generated in number. They satisfy the following condition: L(PiPn) < L(Pi-1Pn) Where L(PiPn) is the length of the segment (PiPn). This is a significant issue and should be taken into account for the importance of generating paths which cannot be predicted in advance, and every repeated generation gives new path in different way from previous ones. This contribution will be applicable to various fields, such as economic,engineering, militaries, and other fields of applied sciences. Furthermore, the suggested method depends on random displacements. Therefore, we generate random displacement at the starting point to decreases the remaining distance between the actual point (Pi) and the target point (Pn). This procedure is repeated at the end of previous displacement to reach a point with a certain distance to the target point (Pn). The evaluation of the developed algorithm shows that the generated points are converged to the target point.
  • Huddle-Sole Mobility Model in Mobile Adhoc Network
    R.Logambal1 and K.Chitra2,Bharathiar University1, Govt Arts College2,India.
    ABSTRACT
    The mobile adhoc network is highly dynamic and the nodes are mobile. It is a challenge to identify the mobile nodes' moving patterns and routing the packets along optimized routing paths according to the topology change in mobile adhoc networks. The research on Mobile Ad-hoc Network is drastically increased to achieve better performance and scalability. Node mobility is one of the important factors that affect the operation and performance of MANET routing protocols. In this paper, we propose Huddle-Sole mobility model that deals with the mobile nodes movement pattern as a group or individual node along the roads modeled in urban area. We examine the impact of huddle-sole mobility model on the routing protocols DYMO, DSDV and DSR and summarize results.