Enabling Technologies, Protocols, and Applications: A Detailed Survey on IoT
The Internet of things is used as a parasol catch word for combining and covering the major aspects related to the extension of the Internet and Web into the phenomenon, by means of vast positioning of spatially distributed devices that contains embedded identification, sensing and/or actuation capabilities. Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To discuss the Internet of things in wider sense and precedence on protocols, technologies, and application along with related issues. The main factor IoT concept is the integration of different technologies. The IoT is empowered by the hottest developments in RFID, smart sensors, communication technologies, and Internet protocols. The primary hypothesis is to have smart sensor dealing directly to deliver a class of applications without any external or human participation. Recently development in the Internet and smartphone and machine-to-machine technologies can be considered first phase of the IoT. In the platinum should continue to raise IoT is expected to be one of the main hubs between various technologies by connecting smart physical objects together and allow different applications in support of smart decision making. In this paper, we discuss IoT architecture and the technical aspect that relate to IoT. Then, give overview about IoT technologies, protocols and applications and related issues with the comparison of other survey papers. The survey aims to help other researchers in delving into the details of such techniques by going through their classification and comparison. The classification has been done based on the inherent features of this authentication technique such as being distributed vs. centralized, flat vs. hierarchical, and more others.
Published by: Gururaj Kulkarni, S. H Manoor, P. V Mitragotri
Author: Gururaj Kulkarni
Paper ID: V3I2-1544
Paper Status: published
Published: April 26, 2017
A Survey on Current Issues Prevailing in Public Transport System
Public Transport system (PTS) is an important and an essential part of urban and rural dwellers. PTS enables a smooth mobility of people and goods. Without PTS no city can improve the standard of living of the people and can make progress. As population continue to increase, many problems arise which make the PTS an unreliable and inefficient service provider. So, providing a good PTS is required in today’s world. There is a need to check and know the causes and solutions for effective transport system. Objective of the paper is to identify the major problems that make PTS an unreliable system and suggest possible solutions to overcome the issues.
Published by: Mohankumari K. V, Anitha L, Apsara S, Rashmi G A, Jyothi B
Author: Mohankumari K. V
Paper ID: V3I2-1541
Paper Status: published
Published: April 26, 2017
Design, Analysis and Comparing for Different Cylinder Head of C.I. Engine
The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modeling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modelling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.
Published by: Kunal S. Nagrik, Nawaz M. Merchant, Mukesh S. Rajpurohit, Swanand S. Pachpore
Author: Kunal S. Nagrik
Paper ID: V3I2-1539
Paper Status: published
Published: April 26, 2017
A Novel Technique for Path Completion in Web Usage Mining
World Wide Web is a huge repository of web pages and links. The Web mining field encompasses a wide array of issues, primarily aimed at deriving actionable knowledge from the Web, and includes researchers from information retrieval, database technologies, and artificial intelligence. The growth of web is tremendous as approximately one million pages are added daily. Users’ accesses are recorded in web logs. Most data used for mining is collected from Web servers, clients, proxy servers, or server databases, all of which generate noisy data. Because Web mining is sensitive to noise, data cleaning methods are necessary. Web usage mining consists of three phases preprocessing, pattern discovery and pattern analysis. Web log data is usually noisy and ambiguous and data preprocessing system for web usage mining is an important process. A data processioning includes data cleaning, user identification, session identification and path completion. The inexact data in web access log are mainly caused by local caching and proxy servers which are used to improve performance and minimize network traffic. The proposed method uses path completion algorithm to preprocess the data. The proposed path completion algorithm efficiently appends the lost information and improves the consistency of access data for further web usage mining calculations.
Published by: Padmapriya .R, D. Maheswari
Author: Padmapriya .R
Paper ID: V3I2-1536
Paper Status: published
Published: April 26, 2017
An Innovation in Palm Vein Authentication for Biometric Privacy Preservation
In real-time security applications, the image processing, and computer vision plays a major part in determining the whole operation. The main advantages of biometric privacy are, to keep the information safe and secure, and access the information from anywhere at any time. In some traditional cases, the security systems are processed by passwords, personal identification numbers, and identification cards. In these cases, several problems occur due to the card was stolen and password hacking. Hence, to avoid such limitations it is necessary to implement the digital biometric data units in terms of face, iris, palm, fingerprints and voice. Among these data, the palm is considered in this work to explore the possibility of cryptography. Initially, the palm images are selected and stored in the database to cross-check the identity of private images which is considered as input, then the enrollment is made by comparing the public host images. The image is authenticated with the help of database with images. Finally, the decision is taken by matching the originally targeted palm image.
Published by: M. Suganya, Dr. S. Suganya
Author: M. Suganya
Paper ID: V3I2-1530
Paper Status: published
Published: April 26, 2017
Generalised Paranormal Operators
An operator T ∈B(H) is said to be generalized P-paranormal if ‖|T|^p U |T|^p x ‖‖x‖≥1/M^p ‖|T|^p x‖^2 for all x∈H, p > 0, and M > 0, where U is the partial isometry appeared in the polar decomposition T=U|T| of T. The aim of this note is to obtain some structure theorem for a class of generalized P-paranormal operators. Exactly we will give some conditions which are generalization of concepts of generalized paranormal operators.
Published by: N. Sivakumar, S. Angelin Abirani
Author: N. Sivakumar
Paper ID: V3I2-1528
Paper Status: published
Published: April 26, 2017
