8-9 April 2016
Filter Results
-
[Front cover]
Publication Year: 2016, Page(s): 1|
PDF (505 KB)
-
[Title page]
Publication Year: 2016, Page(s): 1|
PDF (50 KB)
-
[Copyright notice]
Publication Year: 2016, Page(s): 1|
PDF (67 KB)
-
Table of contents
Publication Year: 2016, Page(s):iii - vii|
PDF (150 KB)
-
Message from chief patrons
Publication Year: 2016, Page(s):viii - xii|
PDF (278 KB)
-
Welcome message from organizing chair
Publication Year: 2016, Page(s):xiii - xiv|
PDF (124 KB)
-
Conference Organization
Publication Year: 2016, Page(s):xv - xvii|
PDF (96 KB)
-
Technical program committee
Publication Year: 2016, Page(s):xviii - xix|
PDF (63 KB)
-
Reviewers
Publication Year: 2016, Page(s): xx|
PDF (69 KB)
-
Determining best practices for windows server deployment in the cloud
Publication Year: 2016, Page(s):1 - 5The biggest obstacle today in Windows Server deployment is deciding upon whether to use it native or virtualized for maximum resource utilization. Windows Server holds seventy-five percent of the market shares of fortune 500 companies. Considering the monopoly of Windows Server over server market, it is crucial to study about best practices for deploying Windows Server in Virtualized/Non-Virtualiz... View full abstract»
-
7μm Core diameter fiber sensor: A solution for efficient strain measurement
Publication Year: 2016, Page(s):1 - 3In this paper the monitoring capabilities like static and dynamic nature of micro meter diameter fiber transmission lines are experimentally setup. This small diameter fiber optical lines have very less impact on mechanical performance. A 7micrometer fiber is used as strain sensor. The experimental results shows that the central axial shift linearly, without creating any displacement with strain a... View full abstract»
-
Design of high performance 8-bit Vedic multiplier
Publication Year: 2016, Page(s):1 - 6Multiplier is an essential functional block of a microprocessor because multiplication is needed to be performed repeatedly in almost all scientific calculations. Therefore, design of fast and low power binary multiplier is very important particularly for Digital Signal Processors. This paper describes a design of fast and low power 8-bit multiplier architecture which implements Urdhva-tiryakbyham... View full abstract»
-
Prediction of multi-response parameters in material removal processes using soft computing — A review
Publication Year: 2016, Page(s):1 - 6Advances in soft computing reshape the manufacturing industries to develop an integrated, self-adjusting manufacturing systems into dynamically scalable and highly distributed cost-efficient business model. Due to presence of uncertainty and inaccuracy in manufacturing processes, the various soft computing algorithms i.e. neural networks, fuzzy sets, genetic algorithms, ant colony optimization, ad... View full abstract»
-
Eradication of elephant mortality and injury due to railway accidents through automatic tracking and alert system
Publication Year: 2016, Page(s):1 - 4This paper report explains the methodology to overcome the problem of elephant mortality and injuries due to railway accidents by the use of automatic tracking and alert system. Automatic calling and tracking system has been implemented by incorporating GSM and GPS technology that would be attached to the body of an elephant and would be continuously monitoring the position of the animal with resp... View full abstract»
-
Android smartphone vulnerabilities: A survey
Publication Year: 2016, Page(s):1 - 5Round the globe mobile devices like Smartphone, PDAs & tablets are playing an essential role in every person day to day lives. Various operating systems such as android, ios, blackberry etc provides a platform for smart devices. Google's Android is a one of the most popular and user friendly open source software platform for mobile devices. Along with its convenience people are likely to download ... View full abstract»
-
A semi-centralized algorithm using adaptive gossip to detect and resolve distributed deadlocks
Publication Year: 2016, Page(s):1 - 8Distributed deadlock detection is a very complex task as no node has correct and complete information about the overall state of the system. An adaptive gossip based semi-centralized deadlock detection algorithm is proposed in this paper. Due to the basic inherent nature of the gossip protocol, our distributed deadlock detection algorithm using adaptive gossip can be said to be fault-tolerant, sca... View full abstract»
-
A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection
Publication Year: 2016, Page(s):1 - 6
Cited by: Papers (2)Network attacks have become more pervasive in the cyber world. There are various attacks such as denial of service, scanning, privilege escalation that is increasing day by day leading towards the requirement of a more robust and adaptable security techniques. Anomaly detection is the main focus of our paper. Support Vector Machine (SVM) is one of the good classification algorithm applied speciall... View full abstract»
-
Analysis of adhoc routing protocols: A retrospective view
Publication Year: 2016, Page(s):1 - 5Adhoc networking field has been interestingly accepted by the research society due to its surprising features. Almost every aspect of the network has been explored by the researchers at some level of detail. A lot of analyses/surveys have been presented in the literature for showing the performance of well accepted adhoc routing protocols viz. AODV, DSR, AOMDV, CBRP etc. This paper presents some r... View full abstract»
-
Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method
Publication Year: 2016, Page(s):1 - 5
Cited by: Papers (1)In this paper, we suggested a new secured digital watermarking technique that can be used for the data validation. The suggested method is secure and efficient. The secured digital watermark is added by the hybrid method for which we have used combination of discrete cosine transform (DCT) and discrete wavelet transform (DWT) methods along with cryptographic technique (Arnold Transform). This tech... View full abstract»
-
Overview on synchronization in OFDM systems
Publication Year: 2016, Page(s):1 - 6Orthogonal Frequency Division Multiplexing (OFDM) is a advance bandwidth efficient digital modulation technique highly adopted for the broadband wireless services because it gives high performance in the multipath fading environments. It is very robust against narrowband interference, but it is not totally free from drawbacks. There are timing and frequency synchronization error for which this tec... View full abstract»
-
An ideal ANFIS-based approach for classification of biomedical signals employing wavelet sub-band energy-based characteristics feature
Publication Year: 2016, Page(s):1 - 6There is a critical linkage of the error detection and classification of various biomedical signals with the diagnosis of different abnormalities. In this paper, basing on the characteristic features of wavelet sub-band energy coefficient, an ideal approach has been implemented for ECG and EEG classification. The ECG and EEG signals are pre-processed using adaptive filter and further are decompose... View full abstract»
-
Bit error rate analysis of wireless sensor nodes with different packet size and distance
Publication Year: 2016, Page(s):1 - 6A Wireless Sensor Network is the collection of nodes working in different condition for the fulfillment of one common task. They are mostly used in areas where human intervention is difficult or impossible. The most commonly used situations where wireless sensor network is widely used are battlefields, traffic surveillance, disasters, environmental monitoring and industrial applications. While dep... View full abstract»
-
Side lobe and grating lobe suppression in stepped frequency pulse train using multi-objective optimization algorithms
Publication Year: 2016, Page(s):1 - 6Linear Frequency Modulated (LFM) pulses are used in radar because of its good range resolution capability. Range resolution can be further improve by introducing a frequency step between consecutive pulses. Resultant signal is known as Stepped Frequency Pulse Train (SFPT). When the product of pulse duration and frequency step become more than one, Autocorrelation Function (ACF) of SFPT shows undes... View full abstract»
-
A secure and simplified technique for configuaring SRAM based FPGA
Publication Year: 2016, Page(s):1 - 4FPGAs are becoming increasingly attractive - thanks to the improvement of their capacities and their performances. Today, FPGAs represent an efficient design solution for numerous embedded solutions. There are several alternatives for configuring these FPGAs. However, these configuration solutions are vulnerable and often require significant up-front design effort and time. This paper proposes a s... View full abstract»
-
Outage performance analysis of dual-hop multi-relay decode-and-forward system for asymmetric fading channels
Publication Year: 2016, Page(s):1 - 5
Cited by: Papers (1)The outage performance of dual-hop multi-relay decode-and-forward (DF) system for asymmetric fading channels is analyzed with the help of outage probability (Poutage). The channels between the source and relays are assumed to be generalized (k-μ) fading channels whereas channels between the relays and destination are generalized (η-μ) fading channels. Formulation of outage pro... View full abstract»