Jadhav S.,VJTI |
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2017
High density Wireless Sensor Networks (WSN) causes sensor observations to be statistically dependent. Modeling dependence of random variables is a major concern. This paper developed 3D mathematical fusion model for three sensor case and analyzed it using Gaussian copula. Copulas are tools used for evaluating joint distribution functions and also take into consideration non-linear dependence. Using Neyman-Pearson (NP) criterion, fusion statistic is evaluated at sink node. Further Gaussian copula and Chair Varshney (CV) fusion rules are discussed in terms of probability of detection. © 2016 IEEE.
Rai N.,VJTI |
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2017
Wireless sensor network (WSN) is typically deployed to monitor, detect or track events either randomly or deterministically depending on the accessibility to the monitored area and the application. In either case, it is imperative to compute the optimum number of nodes to be deployed such that they collectively satisfy spatial and temporal sampling of the network area. This can be quantified in terms of a critical quality of service (QoS) parameter-Network coverage. Deterministic approach is considered to be straightforward wherein number of nodes to be deployed is estimated using simple geometrical computations assuming disk based binary sensing model. However, the effective sensing radius of a node is affected by sensing device characteristics and environmental factors which leads to non-uniform sensing. These factors are stochastic in nature and can be modeled using probabilistic sensing models. In this paper, we investigate the effect of probabilistic sensing models on the required number of nodes to be deterministically deployed using a square grid based scheme in order to attain a given percentage coverage. The analysis highlights the need for consideration of an appropriate sensing model along with the suitable parametric values for estimation of required number of nodes to be deployed for desired coverage. This study based on sensing models can be taken up as a guideline for estimation of the appropriate number of sensor nodes to be deterministically deployed to design, evaluate and implement an effective WSN. © 2016 IEEE.
Waghmare S.A.,VJTI |
Optik | Year: 2017
Ray tracing for solar collectors finds wide application for designing the components. In this research, a solar flux concentration on the tubular receiver of compound parabolic collector (CPC) is determined by a novel approach of surface areal irradiance (SAI). The objective of this method is to determine the solar reflected irradiance at the receiver by incorporating effective areas of reflector and receiver. These areas are determined by 2D graphical ray tracing technique. Multiple ray tracing iterations are performed on various geometric possibilities of receiver–collector combinations by varying receiver diameter and height. The collector dimensions are fixed as per authors previously designed CPC to reduce the number of possibilities of receiver – collector combinations. The results of these iterations are presented in terms of utilization ratio (U), projection ratio (P) etc. based on which concentrated solar flux and heat equations are determined. It is observed that there is saturation point for all receiver diameters at which a receiver – collector combination gives highest utilization ratio and the corresponding height gives the best location for that receiver. SAI method gives a strong methodology for designing solar collectors on the basis of utilization ratios and heat equations. © 2017 Elsevier GmbH
Jadhav S.P.,VJTI |
Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 | Year: 2016
High density of sensors in Wireless Sensor Networks (WSN) causes sensor observations to be highly correlated in space and time domain. Measurements received at sensors can be characterized by multivariate distribution. Fusion of Statistically Dependent observations in WSN has become a major concern. An approach addressing fusion of dependent data in a WSN environment is done for two sensor design case. This paper extends fusion rule for three and four sensors using Bahadur-Lazarsfeld's polynomial expansion. Modeling includes evaluation of fusion rule and corresponding weighting factors. Joint sensor probabilities are further obtained from weighting factors. Fusion model illustrates that statistically dependent observations are computationally expensive as compared to those of independent ones. © 2016 IEEE.
Deshmukh S.,GHRCEM |
International Conference on Emerging Trends in Engineering and Technology, ICETET | Year: 2012
Singer identification is most important application of Music information retrieval. The process starts with identifying first the audio descriptors then using these feature vectors as input to further classification using Gaussian Mixture Model or Hidden Markov Model as classifiers to identify the singer. The process becomes chaotic if all audio descriptors are used for finding the feature vector, instead if the audio descriptors are selected with respect to the application then the process becomes comparatively simple. In this paper we propose a Hybrid method of selecting correct audio descriptors for the identification of singer of North Indian Classical Music. First only strong (primary) audio descriptors are released on the system in forward pass and the classification impact is to be recorded. Then only selecting the top few audio descriptors having largest impact on the singer identification process are selected and rest are eliminated in the backward pass. Then selecting and releasing all the less significant audio descriptors from the groups that had maximum impact on singer identification process increases the success of correctly identifying the singer. The method reduces substantially the large number of audio descriptors to few, important audio descriptors. The selected audio descriptors are then fed as input to further classifiers. © 2012 IEEE.
Nalavade K.C.,VJTI |
ICWET 2010 - International Conference and Workshop on Emerging Trends in Technology 2010, Conference Proceedings | Year: 2010
Host based and network based intrusion prevention systems are available in the market. Host based Intrusion Prevention Systems are designed to protect information systems from unauthorized access, damage or disruption. We combined these features with the network based intrusion systems which counteract the rapidly evolving threats presented by the latest generation of worms, software and network exploits. The raising number of alarms can be reduced by applying data mining algorithms to the network traffic. Our proposed model combines the knowledge discovery and the intrusion detection so that best action can be taken against the attack. Also this knowledge will be helpful to make the systems efficient and secure. The model is useful against denial of services floods, brute force attacks, vulnerability detection, protocols anomaly detection and prevention against unknown exploits. Thus we propose the prevention technology for the security of networks and host users using data mining algorithms. The sequence pattern, classification and association rule mining algorithms are used for taking the various decisions about security. Copyright 2010 ACM.
Waghmare S.A.,VJTI |
Solar Energy | Year: 2016
Ray tracing for solar collectors shows the behavior of light rays which falls on collector surface and reflected to the receiver. Accordingly the solar collectors are designed or modified to enhance thermal performance. Compound parabolic collectors (CPC) are capable of collecting and reflecting a large amount of solar radiation towards the receiver with less tracking effort. With the help of ray tracing technique its performance can be increased by minimizing the optical losses. In this paper, the limiting diameter (LD) of the tubular receiver at the focus of CPC is determined by the geometrical method of ray tracing. The CPC is designed and ray tracing analyses were performed without receiver to differentiate the region of maximum collection and no collection of reflected rays. The region where not a single reflected ray enters from a CPC half follows an elliptical shape which is tangent internally to the LD of the receiver at the focus and its geometrical relation with the acceptance angle is presented. The geometrical relationship between LD and maximum diameter is also determined. The receiver height is obtained on the basis of receiver surface covered and collector surface utilized. © 2016 Elsevier Ltd
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014 | Year: 2014
Steganography is the art of hiding data in a particular form of media and making it accessible for the recipient. This process of encrypting data can be embedded in media like image and audio. This paper represents a snake and ladder based algorithm for encrypting a streamline of bits in a greyscale image. © 2014 IEEE.
Karande A.M.,V.J.T.I. |
Chunekar V.N.,V.J.T.I. |
Communications in Computer and Information Science | Year: 2011
Service Oriented Architecture is used to achieve loose coupling among diverse interacting software applications. SOA is used for reduction in development time and cost. Web services standards used for SOA are distributed software components that provide information to applications rather than to humans, through an application-oriented interface. SOA with web services standards provide greater interoperability. It also provides protection from lock-in to proprietary vendor software. Using XML based orchestration business process execution language (BPEL) enables task sharing across multiple enterprises using a combination of Web services. Web services combine the advantages of the component-oriented methods and web techniques. Maintaining Web service quality requires more effort to manage overall Web service framework than each of Web service. Web Services Manager is a security administrator's environment designed to secure access to Web services and monitor activities performed on protected Web services. Web services provide platform independence for the service oriented communication. This way data integration can be done providing the service as a request and service as provider. © 2011 Springer-Verlag Berlin Heidelberg.
Sabnis S.K.,Rajiv Gandhi Institute of Technology |
Procedia Computer Science | Year: 2016
Steganalysis of high capacity Wavelet based fusion image steganography with encryption, using Image quality metrics (as a set of features) is proposed. As the first order image statistics using the proposed algorithm are inherently preserved, which is desirable feature of the scheme, improving the security of algorithm against the targeted attacks.In addition comparing the present steganography scheme with two different encryption techniques, on the undetectibility ground, the generalized objective metric like SVD is used as a steganalysis tool. DFrFT encryption is found statistically and visually undetectable achieving the desired robustness though PSNR values are better in DNA encryption. © 2016 The Authors.