scispace - formally typeset
Search or ask a question

Showing papers presented at "IEEE India Conference in 2012"


Proceedings ArticleDOI
01 Dec 2012
TL;DR: Fingerprint attendance system aims to automate the attendance procedure of an educational institution using biometric technology to save time wasted on calling out names and it gives a fool-proof method of attendance marking.
Abstract: Fingerprint attendance system aims to automate the attendance procedure of an educational institution using biometric technology. This will save time wasted on calling out names and it gives a fool-proof method of attendance marking. A hand-held device is used to mark the attendance without the intervention of teacher. The device can be passed and students can mark attendance during the lecture time. Students would be made to place their finger over the sensor so as to mark their presence in the class. It can communicate with a host computer using its USB interface. This device operates from a rechargeable battery. GUI application in host computer helps the teacher to manage the device and attendance.

112 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, the authors proposed a combined energy storage using batteries and super capacitors with high energy and power density for the photovoltaic (PV) based micro grid.
Abstract: The energy flow between source and the load of micro grid must be balanced to have a constant dc grid voltage. Due to intermittency in the natural sources and the variations in load, energy balance operation demands storage. The commonly preferred choice of energy storage in micro grid is valve regulated lead acid batteries. When batteries are used as energy storage, due to its low power density, the charge and discharge rate is low. It causes severe stress on the battery under quick load fluctuations and results in increase in the number of charge/discharge cycles. Hence, the lifetime of the battery reduces. The super capacitors have high power density and it can react speedily to quick load fluctuations. However, super capacitors alone cannot be used as energy storage as it cannot supply load for a longer time. Hence, this paper proposes a combined energy storage using batteries and super capacitors with high energy and power density. The photovoltaic (PV) based micro grid with combined energy storage is designed and the control strategy is validated for different atmospheric and load conditions.

101 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: The article targets at bringing awareness on such issues and provides information to make a suitable choice in cross platform application development.
Abstract: Mobile phones have become an inevitable part of day-to-day life and so do the mobile phone applications. User expectations about the applications are remarkably high. It is a real challenge for the application vendors to provide versatile applications in this competitive market in a short time. The challenge is even more if the application is targeted for multiple platforms. Cross platform mobile application tools are of great help in this scenario. These tools support to develop the applications for multiple platforms in less time. However cross platform application development is also not seamless, it has its own fallacies and pitfalls. The application vendors have to face lots of challenges in cross platform application development. The article targets at bringing awareness on such issues and provides information to make a suitable choice.

90 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this article, a modified Sage-Husa adaptive Kalman filter (SHAKF) was used to denoise the fiber optic gyroscope signal using a first order auto regressive (AR) model and used the coefficients of the model to initialize the transition matrix of SHAKF.
Abstract: Fiber Optic Gyroscope (FOG) is a key component in Inertial Navigation System. The performance of FOG degrades due to different types of random errors in the measured signal. Although Kalman filter and its variants like Sage-Husa Kalman filters are being used to denoise the Gyroscope signal the performance of Kalman filter is limited by the initial values of measurement and process noise covariance matrix, and transition matrix. To address this problem, this paper uses modified Sage-Husa adaptive Kalman filter to denoise the FOG signal. In this work, the random error of fiber optic gyroscope is modeled using a first order auto regressive (AR) model and used the coefficients of the model to initialize the transition matrix of Sage-Husa Adaptive Kalman filter. Allan variance analysis is used to quantify the random errors of the measured and denoised signal. The performance of proposed algorithm is compared with conventional Kalman filter and the simulation results show that the modified Sage-Husa adaptive Kalman filter (SHAKF) algorithm outperforms the conventional Kalman filter technique while denoising FOG signal.

48 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, a comparative study between various models of photo-Voltaic (PV) array which have been formulated exclusively using the data sheet parameters has been conducted and the best model that can be used for simulation purposes has been selected.
Abstract: This paper presents a comparative study between various models of Photo-Voltaic (PV) array which have been formulated exclusively using the data sheet parameters. The models used for comparative study in this paper includes single diode model, the two diode model, the simplified single diode model and the improved single diode model. PV systems are generally integrated with specific control algorithms in order to extract the maximum possible power. Hence it is highly imperative that the Maximum Power Point (MPP) is achieved effectively and thus we need to design a model from which the MPPT algorithm can be realized in an efficient way. Also other parameters should be taken into account for finding the best model for the use in simulator. In this paper, comparisons have been made on basis of the MPP tracking, the RMSD from the experimental data. Further, the resemblance of the P-V and I-V curves as obtained on the basis of experimental data has also been included in this study. On the basis of all these, the best model that can be used for simulation purposes has been selected. It is envisaged that the work can be very useful for professionals who require simple and accurate PV simulators for their design. All the systems here are modeled and simulated in MATLAB/Simulink environment.

37 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: An energy consumption model to calculate the energy-factor1 of the nodes is introduced and a trust based protocol for energy-efficient routing is proposed, which reduces delay, routing overhead, and increases packet delivery ratio by consuming less energy compared to AODV and DSR, the popular existing routing protocols.
Abstract: Mobile ad-hoc network (MANET) is an energy constraint multi-hop network and its nodes have routing capability with limited battery power. In such a network, establishing a correct and efficient route is a crucial design issue. But a more challenging goal is to provide an energy-efficient multi-hop route between source-destination pair. Thus, the routing protocols should setup an energy-efficient route between source-destination pair considering the energy consumption and residual energy of the nodes. Cooperative transmission, a recent technology, optimizes energy consumption of the nodes in the networks. The trust based routing mechanism is one way to form a cooperation among nodes for establishing an energy-efficient route between source-destination pair. In this paper, we first introduce an energy consumption model to calculate the energy-factor1 of the nodes and then propose a trust based protocol for energy-efficient routing. We also adopt a trust module to track the value of routing metric. Simulation results show that our proposed protocol reduces delay, routing overhead, and increases packet delivery ratio by consuming less energy compared to AODV and DSR, the popular existing routing protocols.

36 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, a photovoltaic system is simulated in which rather than using battery along with PV as is conventionally done, deloaded PVs are used to enhance the frequency regulation capability of the systems.
Abstract: New grid codes demand contribution by Distributed Generation like photovoltaics, wind power and the like in frequency regulation. In this paper, contribution of a battery connected to standard nine bus system to provide primary control is studied. A photovoltaic system is simulated in which rather than using battery along with PV as is conventionally done, deloaded PVs are used to enhance the frequency regulation capability of the systems. Photovoltaic system is to operate at a point away from Maximum Power Point Tracking (MPPT). The case of frequency response under deloaded operation with frequency regulation is compared with the case when the photovoltaics are working at their MPPT point and thereby not contributing to frequency regulation. A microgrid with a conventional synchronous machine and six photovoltaic generators is considered for the simulation.

30 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: The novel architecture of functional link artificial neural network with working principle of different models are provided to achieve best forecasting and classification with increase in accuracy of prediction and decrease in training time.
Abstract: Forecasting stock price index is one of the major challenges in the trade market for investors. Time series data for prediction are difficult to manipulate, but can be focused as segments to discover interesting patterns. In this paper we use several functional link artificial neural networks to get such patterns for predicting stock indices. The novel architecture of functional link artificial neural network with working principle of different models are provided to achieve best forecasting and classification with increase in accuracy of prediction and decrease in training time. Various FLANN models with different polynomials are investigated using different Indian stock indices like IBM, BSE, Oracle, & RIL. The main absolute percentage error (MAPE), sum squared error (SSE) and the standard deviation error (SDE) have been considered to measure the performance of the different FLANN models. In this paper we have presented the result using Reliance Industries Limited (RIL) stock data between 22/12/1999 to 30/12/2011 on closed price of every trading day.

25 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: The theoretical analysis and the numerical evaluations reveal that cooperative transmission scheme improves the energy efficiency, increases the optimal payload packet size, and extends the hop length, as compared to direct communication for all scenarios of WBANs that includes both in-body as well as on-body propagation models.
Abstract: In this paper, we investigate packet size optimization to improve energy efficiency of cooperative Wireless Body Area Networks (WBANs). We present models for the packet error rate and the energy efficiency of ARQ scheme for direct as well as cooperative communication scheme. We then consider the packet size optimization for both the transmission schemes. The theoretical analysis and the numerical evaluations reveal that cooperative transmission scheme improves the energy efficiency, increases the optimal payload packet size, and extends the hop length, as compared to direct communication for all scenarios of WBANs that includes both in-body as well as on-body propagation models.

25 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: The proposed ABC algorithm is a new metaheuristic approach inspired by intelligent foraging behavior of honeybee swarm for congestion management problem and is applied on IEEE 39 Bus New England test system.
Abstract: In a deregulated electricity market, when congestion occurs in a transmission line it violates system security and increase system cost. Transmission lines congestion is one of the technical problems which appear particularly in the deregulated environment. In a deregulated era, one of the important tasks of ISO is congestion free power system. Generator rescheduling is one of the techniques adopted by ISO to mitigate transmission congestion in a deregulated electricity market. Present paper proposed Artificial Bee Colony based generator rescheduling for congestion management problem. The ABC algorithm is a new metaheuristic approach inspired by intelligent foraging behavior of honeybee swarm. Firstly, generators are chosen based on their generator sensitivity factor (GSF). Secondly, Artificial Bee colony Optimization is used for rescheduling those selected generators. The proposed algorithm is applied on IEEE 39 Bus New England test system.

24 citations


Proceedings ArticleDOI
01 Dec 2012
TL;DR: The proposed system implements an embedded system for monitoring wireless sensor nodes and camera installed inside a building for security surveillance and utilizes an FTP server for camera feeds and guarantees reliability by integrating various components of a security system.
Abstract: Real-time surveillance is an important aspect of an intelligent building with modern security demands. The proposed system implements an embedded system for monitoring wireless sensor nodes and camera installed inside a building for security surveillance. A number of surveillance devices in a Zigbee protocol (IEEE 802.15.4) based wireless network are connected to a BeagleBoard Single Board Computer (SBC) based surveillance management system. Remote alerting on fire and intruder detection are the key features of the system. When smoke or intruder movement is detected, the system sends warning messages through Short Message Service (SMS) to cell phones, starts capturing real-time video for fixed duration and makes the alarm on. The captured video clip is immediately uploaded to an FTP (File Transfer Protocol) webserver so that it can be retrieved later from anywhere around the world. The advantages of the system are that it guarantees reliability by integrating various components of a security system (sensors, alarm, camera, wireless connectivity etc.) and utilizes an FTP server for camera feeds.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: Six parameters related to flood effecting causes directly or indirectly are considered, which gives early warning as well as flood situation for disaster management and preparedness to combat aftermath of flood.
Abstract: The operation of the surface water system for flood control is very important and crucial to minimizing the impacts of flood during the real-time flood events. The model considered here is assumed for a sophisticated flood warning system. Many works have been done with different parameters using Artificial Neural Network (ANN) but this paper considers six parameters related to flood effecting causes directly or indirectly. The input parameters are theoretically bounded and prediction simulated using ANN. The output results obtained are perfectly matched with the taken model and satisfactorily acceptable. The output gives early warning as well as flood situation for disaster management and preparedness to combat aftermath of flood.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, the performance of both Mach-Zehnder modulator and Electro absorption modulator for Radio over Free Space Optical Communication systems and it is compared with Radio over Fiber systems.
Abstract: Radio over Free Space Optics (RoFSO) and Radio over Fiber (RoF) are recent technologies in optical communication systems. Both these technologies require some form of external optical modulator in the transmitter side. The commonly used optical modulators are Mach-Zehnder modulator (MZM) and Electro absorption modulator (EAM). In this paper, we analyze the performance of both Mach-Zehnder modulator and Electro absorption modulator for Radio over Free Space Optical Communication systems and it is compared with Radio over Fiber systems. We also discuss about the choice of optical modulator based on the intensity of output light signal.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: An approach to detect clones in UML models is introduced, based on finding similarities between two object oriented diagrams, which suggests that clones in models poses similar threats as in code.
Abstract: Model driven development has become a key industry practice. With higher levels of abstraction and advent of domain specific languages, models find their presence in every field. Latest software engineering practices lead to large models which are really hard to design and manage. Significant overlaps in large models are really a matter of concern. Anecdotal evidences suggest that clones in models poses similar threats as in code. The paper introduces an approach to detect clones in UML models. The technique is based on finding similarities between two object oriented diagrams. Firstly, UML models are encoded as XMI files. Subtree comparison is applied after the XMI file is filtered and represented as a tree. Similarity between two diagram elements in a model is determined and reported as a clone.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: This project aims to overcome this communication barrier by providing a direct call routing technique using Asterisk hardware and considerably cuts down on the overheads involved in referring to a online database and then calling the donors and verifying their willingness at a time when there is a critical need for the blood.
Abstract: A number of online blood bank databases are available, however none of them offer the capability for a direct contact between the donor and recipient. This is a major drawback particularly in cases where there is an urgent need of blood. Our project aims to overcome this communication barrier by providing a direct call routing technique using Asterisk hardware. A blood bank database is created by collection of details from various sources like Blood banks, NSS, NGO's, hospitals and through web interface. The data collected will be maintained in a central server. This central server will be associated with a Toll free number that can be used to connect to it. An algorithm will be defined based on the various parameters that need to be accounted for, before blood transfer is done. The willingness of donor and the closeness of the donor to the place from where the call is coming are also accounted for in defining this algorithm. Based on the algorithm the most eligible donor is found out. From the server the call from the required person is routed to the eligible donor's number. Such a system considerably cuts down on the overheads involved in referring to a online database and then calling the donors and verifying their willingness at a time when there is a critical need for the blood.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: Hardware design of digital signal processing based PSK demodulator using Costas loop using MATLAB shows that the costas loop could correctly realize BPSK signal's carrier recovery and data demodulation.
Abstract: The paper presents hardware design of digital signal processing based PSK demodulator using Costas loop. On the basis of analyzing the mathematical models of Costas loop, a method to model and simulate it by MATLAB is put forward. The design of LPF (low-pass filter), LF (loop filter) and VCO (voltage-controlled oscillator) are researched. It is first simulated using MATLAB in analog domain and then in digital domain using digital multiplier and NCO (numerically controlled oscillator) replacing VCO. The functional simulation is accomplished in VHDL code on Modelsim simulator. The whole design is accommodated in a ProASIC3 Actel FPGA. Results show that the Costas loop could correctly realize BPSK signal's carrier recovery and data demodulation. Results of theoretical simulation and practical engineering experiments are the same. Paper also highlights the programmable nature of the design.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, a linear quadratic regulator based load frequency control for two area thermal system in deregulated electricity market has been proposed, where super conducting magnetic energy storage device (SMES) is incorporated in the model to observe the impact on the load-frequency control.
Abstract: In this paper, linear quadratic regulator based load frequency control for two area thermal system in deregulated electricity market has been proposed. Super conducting magnetic energy storage device (SMES) is incorporated in the model to observe the impact on the load-frequency control. SMES is controlled through LQR based controller. A comparative study has been provided for two area system with bilateral model without and with LQR-SMES controlled system.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: The provision to monitor the posture of the patient in the bed helps to reduce the cases of bedsore in bedridden elders and the system, HOPE, has sensors to Monitor the heart rate, body temperature, tilt and fall.
Abstract: Home-bound patients, mostly elders face many problems regarding their critical health parameter variations and timely assistance in case of emergencies. It is really a malady when they suffer from other severe diseases, heart problems etc. A constant and reliable assistive technology is essential while taking care of home-bound patients. The system, HOPE we have proposed has sensors to monitor the heart rate, body temperature, tilt and fall. The sensors are attached to the body of the elderly patient in a contented manner. The data can be sent to any Smartphone with Bluetooth support. In case of any emergency the caretaker will be given a notification about the critical situation. The provision to monitor the posture of the patient in the bed helps to reduce the cases of bedsore in bedridden elders. Day by day the menace of weakening health and chances of skin related problems, bed sores etc. are becoming critical in case of bed ridden patients. The experimental results presented in this paper give some insight into the behavior of the proposed system.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: A new algorithm called CELBA (Centralized Energy efficient Load Balancing Algorithm) is proposed for wireless sensor networks that not only balances the load of the gateways but also energy efficient communication of the sensor nodes in their clusters.
Abstract: In a large-scale wireless sensor network, clustering sensor nodes around a few less-energy constrained gateways (also called cluster heads) has been considered as an effective means to achieve scalability and robustness of the networks However, if some gateways are overburdened with a large number of sensor nodes, they can die quickly and as a result the network life time can be over within a short period of time To prolong the lifetime of the network, therefore, it is imperative to balance the load of the gateways It is also equally important to minimize average communication energy of the sensor nodes inside their clusters In this paper, we propose a new algorithm called CELBA (Centralized Energy efficient Load Balancing Algorithm) for wireless sensor networks that not only balances the load of the gateways but also energy efficient communication of the sensor nodes in their clusters Simulation results demonstrate that the proposed algorithm is more energy efficient and load balanced than the existing algorithms

Proceedings ArticleDOI
01 Dec 2012
TL;DR: This paper describes the development of state-of-the-art large vocabulary continuous speech recognition (LVCSR) system for the Malayalam language with an application for visually challenged people and is integrated to OpenOffice Writer together with TTS for making it user friendly editor for visually challenge people.
Abstract: This paper describes the development of state-of-the-art large vocabulary continuous speech recognition (LVCSR) system for the Malayalam language with an application for visually challenged. For an LVCSR, building a high accurate acoustic models and large-scale language models are the challenging task. Speech corpus for training the system is collected from 80 native speakers in room environment ensuring the speaker variance. Mel-frequency Cepstral Coefficients (MFCC) method is used as a front-end to extract acoustic features from the input signal. Acoustic model is built on 30 hours of speech data based on Hidden Markov Model (HMM). A hybrid model, integrating rule based and statistical method is used to handle pronunciation variations in the dictionary. The best configuration of the system achieved word accuracy of 75% in average. Accuracy of the system is further increased up to 80% in average, by implementing speaker adaptation technique. The developed system is integrated to OpenOffice Writer together with TTS for making it user friendly editor for visually challenged people.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: A survey on attack graph-based metrics has been done and comparative analysis of the existing metrics have been presented to facilitate understanding of a given network's level of security strength.
Abstract: Computer network has grown both in size and complexity with the advent of Internet. It facilitates easy access to vast store of reference materials, collaborative computing, and information sharing. However, this requires a secure interconnected world of computing where confidentiality, integrity, and availability of information and resources are restored. Traditionally, security mechanism is enforced by access control and authentication. However, these security best practices do not take operating system, or network service-based or application vulnerabilities (programming flaws) into account. With the evolution of sophisticated hacking tools, attackers exploit these vulnerabilities and can gain legitimate access to network resources, bypassing the access control and authentication policies. One tool that presents a succinct representation of different attack scenarios specific to a network is attack graph. Attack graph models service or application-based attacks and depicts all possible multi-host multi-step attack scenarios that an attacker can launch to penetrate into an enterprise network. The severity associated with each attack scenario can be evaluated following some attack graph-based security metrics. A good number of security metrics are prevalent in the literature, however, there exists no reported work which determines their efficacy and applicability. In this paper, a survey on attack graph-based metrics has been done and comparative analysis of the existing metrics has been presented to facilitate understanding of a given network's level of security strength. A case study has been perceived for the purpose of analysis.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: Cadence tool is used to design ASIC based programmable LFSRs (Linear feedback shift register) used in cryptography systems and its performance is far higher than traditional FPGAs in terms of Speed.
Abstract: The intension of this work is to design ASIC (Application Specific Integrated Circuit) for LFSRs (Linear feedback shift register) used in cryptography systems.(Stream ciphering). Presently FPGAs (Field Programmable Gate Array) and Processors are used for this purpose which have speed limitations. Since FPGAs have general structure and implementing LFSRs in FPGAs are unable to achieve the required speed. So ASIC based programmable LFSRs are required to the requirements of speed which are used in stream ciphering. Implementation of any design on ASIC is only possible with EDA (Electronic Design automation) tools. In this paper the cadence tool is used to accomplish the task. LFSRs are designed using Verilog and the maximum frequency is achieved and determined the critical path delay. The design is verified both in functional and timing simulation. Its performance is far higher than traditional FPGAs in terms of Speed.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: An Enhanced Accident detection System for Indicating Victim Status from the accident zone is developed and implemented using the biomedical smart sensors and microcontroller based mobile technology integrated with the evolving LabVIEW platform to reduce the human death ratio by accidents.
Abstract: In the speedy moving world, nobody is ready to look what's happening around them. Even when there occurs an accident nobody cares about it. This is an intention to implement an innovative solution for this problem by developing an Enhanced Accident detection System for Indicating Victim Status from the accident zone. This system has been developed and implemented using the biomedical smart sensors and microcontroller based mobile technology integrated with the evolving LabVIEW platform. The system will automatically identify the accident, then immediately transmit the location of the accident and the status of the physiological parameters of the victims to the emergency care center phone number through Short Message Service (SMS). The victim's physiological parameters such as body temperature, Heartbeat, Coma stage recovery status have been transmitted in the SMS. So the proposed system ensures that to reduce the human death ratio by accidents. When the accident occurs and realizes that there is no severe collision, then the person involved in accident has to press the switch provision which has been made to indicate that the accident is diminutive and no communication will be established i.e. no further alarming SMS has been transmitted.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: The name CUEDETA comes from the word cuerpo which means human body and detalles which means details, and this system will continuously monitors the ECG signals of the patient and send alerts to his/her contacts, medical professional and ambulance services.
Abstract: According to WHO(World Health Organization), estimated about 17 million people die around the world due to cardio vascular diseases, particularly heart attack, in them most of the deaths are due to untimely intervention. If proper medical care can be given to the patients at the right time their lives can be saved, for that all we need is a system that continuously monitors ones ECG signal, so we have introduced a system called CUEDETA. The name CUEDETA comes from the word cuerpo which means human body and detalles which means details. This system will continuously monitors the ECG signals of the patient and send alerts to his/her contacts, medical professional and ambulance services. The alert also includes a URL which can be used to find the exact position of the patient using Google maps. The alerts are propagated in a arranged fashion, so that the patient and his/her social contacts have a chance to detect false alerts before contacting medical professionals, this is possible by connecting wireless heart rate monitoring device to the body and interfacing it with a smart phone. Here the software frame work is developed in android to support diverse class of mobile devices.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this article, a cross plate of suitable dimension was added to a rectangular patch antenna to increase the impedance bandwidth of the antenna for ultra wideband frequency range (3.1 - 10.6 GHz).
Abstract: This paper presents a novel and compact ultra wideband microstrip-fed crossed monopole antenna. The impedance bandwidth of a rectangular patch antenna is increased by including a cross plate of suitable dimension. The crossed monopole shows the return loss of 10 dB over the ultra wideband frequency range (3.1 - 10.6 GHz) while maintaining the stability in radiation pattern. The effects of the parameters on the performance of the antenna are investigated. The measured result for the return loss of a prototype antenna is presented for verification of the simulated result.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: By the simulation results, it is shown that UW-ASNs environment incorporated with the data aggregation technique performs better than without aggregation in terms of energy consumed and network lifetime.
Abstract: The underwater acoustic channel has unique features such as low bandwidth, high propagation delay, high channel error rates, multipath fading and so on and also sensor nodes are constrained of the resources such as limited power, limited memory space and processing speed. In this paper, we are concerned with efficient utilization of these resources by applying data aggregation technique on the sensor data. We propose a data aggregation technique for the underwater acoustic sensor networks(UW-ASNs) involving 3 steps: (i) Formation of clusters (ii) Election of cluster heads (CH) (iii) Transferring of data to the sink node without aggregation and by applying the aggregation technique (averaging technique). A comparative study of with aggregation and without aggregation is carried out. By the simulation results we show that UW-ASNs environment incorporated with the data aggregation technique performs better than without aggregation in terms of energy consumed and network lifetime.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: The design and implementation of a highly energy efficient, multimode control for an automated irrigation system which uses an in-situ soil moisture potential measurement and the programmed data to irrigate a desired area.
Abstract: The maintenance of even a small garden gets tedious at times in the urban scenario. A fully automated system which optimizes the use of energy and water resources is the need of the day. In this paper, we propose the design and implementation of a highly energy efficient, multimode control for an automated irrigation system. The system uses an in-situ soil moisture potential measurement and the programmed data to irrigate a desired area. The soil moisture content is monitored by a microcontroller-based data acquisition and distribution system. An integrated GSM module provides critical information to the user during system failure. The proposed microcontroller based system was programmed and tested for its performance.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: A novel routing protocol has been proposed which introduces new clustering algorithm and constructs the routing tree for efficient data transmission and extends the network lifetime.
Abstract: Wireless Sensor Network consists of tiny, battery enabled sensor nodes. In the recent years, the most important problem in WSN is to improve the life time of Network. Network life time depends on the residual energy of the sensor nodes. Most of the energy in the sensor node is used for data transmission. So, we should employ the routing protocols which can consume the energy of nodes efficiently. Already, many energy efficient routing protocols have been suggested by the researchers, among which Hierarchical Protocols achieve the better performance. In this paper, a novel routing protocol has been proposed which introduces new clustering algorithm and constructs the routing tree for efficient data transmission. The objective of this algorithm is to consume less energy, distributing energy consumption equally among all nodes and finally, extends the network lifetime. The simulation results show that this protocol consumes the energy of the nodes efficiently and improves the life time of the network. For a set of 100 nodes, the proposed algorithm gives 31% better performance than LEACH, 18% better performance than LEACH-C and 15 % better performance than TL-LEACH in terms of network life time.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: A computer-aided dental identification system for matching dental records is presented and experimental results show that the finer matching distance is observed by the distance metric rather than similarity measures.
Abstract: Forensic dentistry involves the identification of people based on their dental records, mainly available as radiographic images. Human identification is done by matching the given post-mortem radiographs with the ante-mortem images. In this paper, a computer-aided dental identification system for matching dental records is presented. The tooth contour is used as a feature for matching here. The proposed algorithm consists of five stages. As an initial step, the image is preprocessed. Then it is isolated as individual tooth by radiograph segmentation. Shape extraction is made using connected component labeling. Finding similarity metric is the next step. Various distance measures are also applied to find better matching. Finally candidate matching is done by obtaining the percentage of match between the original and extracted shape using both the similarity and distance measures. Experimental results show that the finer matching distance is observed by the distance metric rather than similarity measures. The experimental results are obtained on a database of 100 dental images which includes both periapical and bitewing. The results show that a high hit rate is observed for the Euclidean distance measure and which is comparable with the other methods.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: The database statistics which can impact the SQL query cost with increase in the database size and how these can be used to predict ERT are identified and discussed.
Abstract: In a typical database application development, requirement is to optimize SQL queries to meet service level agreements (SLA); the optimized queries are tested on the application development database which is some fraction of the production database. As time progresses the database grows and the earlier optimized queries may not hold SLA anymore. Once the application is launched and deployed, it becomes difficult and expensive to modify the SQL queries. In this paper, we have discussed a model for predicting the SQL query cost and hence the SQL query elapsed response time with the growth of the database at application development time. We have identified and discussed the database statistics which can impact the SQL query cost with increase in the database size and how these can be used to predict ERT. We have tested the model on Oracle 10g and have presented the results in the paper.