Prakashgoud Patil | B.V.B. College of Engineering & Technology (original) (raw)

Papers by Prakashgoud Patil

Research paper thumbnail of Nondirected indoor infrared wireless channel modeling using modulation schemes

2012 International Conference on Communication, Information & Computing Technology (ICCICT), 2012

ABSTRACT The indoor infrared wireless communication has been introduced a new dimension for short... more ABSTRACT The indoor infrared wireless communication has been introduced a new dimension for short range wireless communication. The modulation schemes play an important role during IR channel modeling. The modulation schemes enumerate the harshness of multipath ISI. This paper described and analyzed the various modulations schemes such as on-off-keying(OOK), pulse amplitude modulation (PAM) and pulse position modulation (PPM) and multilevel pulse amplitude and pulse position modulation (PAPM) for the performance measure of Non directed indoor IR channel. It performed the simulation analysis by taking into account the bit error rate (BER) . A fixed rectangular empty room with certain transmitter and receiver geometry was considered during the simulation.

Research paper thumbnail of Performance analysis and channel characterization of indoor infrared wireless communication system

2011 3rd International Conference on Electronics Computer Technology, 2011

Page 1. Performance Analysis and Channel Characterization of Indoor Infrared Wireless Communicati... more Page 1. Performance Analysis and Channel Characterization of Indoor Infrared Wireless Communication System Prakash H. Patil DD Shah Priyadarshini College of Engineering, Nagpur GHRaisoni College of Engineering, Pune Nagpur, India. Pune, India. ...

Research paper thumbnail of Concept Drift Adaptation in Intrusion Detection Systems Using Ensemble Learning

International Journal of Natural Computing Research

The primary challenge of intrusion detection systems (IDS) is to rapidly identify new attacks, le... more The primary challenge of intrusion detection systems (IDS) is to rapidly identify new attacks, learn from the adversary, and update the intrusion detection immediately. IDS operate in dynamic environments subjected to evolving data streams where data may come from different distributions. This is known as the problem of concept drift. Today's IDS though are equipped with deep learning algorithms most of the times fail to identify concept drift. This paper presents a technique to detect and adapt to concept drifts in streaming data with a large number of features often seen in IDS. The study modifies extreme gradient boosting (XGB) algorithm for adaptability of drifts and optimization for large datasets in IDS. The primary objective is to reduce the number of ‘false positives' and ‘false negatives' in the predictions. The method is tested on streaming data of smaller and larger sizes and compared against non-adaptive XGBoost and logistic regression.

Research paper thumbnail of Scalable Blockchain Framework for a Food Supply Chain

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Real-World Anomaly Detection Using Deep Learning

Intelligent Computing and Communication, 2020

In this paper, we have carried out a comparative study on two deep learning models for detecting ... more In this paper, we have carried out a comparative study on two deep learning models for detecting real-world anomalies in surveillance videos. Anomalous event is the one which deviates from the normal behavior. The anomalies considered are related to thefts such as robbery, burglary, stealing, and shoplifting. A framework is set up using supervised learning approach to train the models using the weakly labeled videos. The deep learning models considered are VGG-16 and inception model which are trained with both anomalous and normal videos to detect any anomalous activity in the video frame. UCF-Crime dataset is used which comprises long, untrimmed surveillance videos. The deep learning models are evaluated using various metrics. The experimental results show that the Inception V3 model performs significantly better in detecting the anomalies as compared to the VGG-16 model with an accuracy of 94.54%.

Research paper thumbnail of Academic Information Management System Using Open Source Programming Tools and Technologies

Proceedings of the International Conference on Transformations in Engineering Education, 2014

Hubli) developed a wide range of Software Applications using Open Source Programming Tools and Te... more Hubli) developed a wide range of Software Applications using Open Source Programming Tools and Technologies to meet the requirements of managing the Academic Information for autonomous engineering colleges. The applications developed using open source technologies include (i) Student Information Management System (SIMS), (ii) Student Assessment Management and Examination System (SAMS), and (iii) Examination Results (eResults). Brief overviews of these applications along with the benefi ts are presented in this paper. These tools were found to be very useful for managing and administering the information in an autonomous engineering college and well appreciated and used by the stakeholders for the last few years. Keywords SIMS-Student information management system • SAMS-Student assessment management and examination system • Open source programming languages and technologies • BVB College of Engineering and Technologies (BVBCET)

Research paper thumbnail of Analysis of DEAP Dataset for Emotion Recognition

Research paper thumbnail of A Study on Blockchain Scalability

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Object Oriented Programming Using Real Life Paradigm with Open Source Technology

Journal of Electrical Engineering & Technology, 2017

Over the years Object oriented programming (OOP) has gained the dominance in both the software in... more Over the years Object oriented programming (OOP) has gained the dominance in both the software industry and education. Advance pedagogy is the way to enhance teaching and learning performance. Different innovative teaching methods are now in use across the globe. There are a number of OOP versions released by Software companies and the same are adopted by the educational institutions at various levels in their curricula. The main reason for this inclination is driven by the fact that OOP solves any problem by imitating the mental model of humans. It is usually a challenge for teachers to imbibe OOP concepts in novice programmers. Teaching fundamentals of OOP at an introductory level is challenging. This paper presents a pedagogical approach used for teaching/learning process of Object Oriented Programming in C++ course offered at MCA. The course focuses on development of OOP skills and concepts among students. The approach uses real life analogies to effectively enhance the learning...

Research paper thumbnail of Teaching C++ Using Real Life Analogies

Journal of Engineering Education Transformations, 2016

Over the years Object oriented programming (OOP) has gained the dominance in both the software in... more Over the years Object oriented programming (OOP) has gained the dominance in both the software industryand education. There are a number of OOP versions released by Software companies and the same are adopted by the educational institutions at various levels in their curricula. The main reason for this inclination is driven by the fact that OOP solves any problem by imitating the mental model of humans. It is usually a challenge for teachers to imbibe OOP concepts in novice programmers. Teaching fundamentals of OOP at an introductory level is challenging. This paper presents a pedagogical approach used for teaching/learning process of Object Oriented Programming in C++ course offered at MCA II semester. The approach uses real life analogies to effectively enhance the learning of OOP concepts among students. Students might program in an OOP language but fail to program in an object-oriented style. This is because students are unsuccessful to model given problem in terms of objects. T...

Research paper thumbnail of Analysis of Data Aggregation Techniques in Wireless Sensor Networks

The main goal of data aggregation algorithms is to gather and aggregate data in Wireless Sensor N... more The main goal of data aggregation algorithms is to gather and aggregate data in Wireless Sensor Network (WSN) in an energy efficient manner so that network lifetime is enhanced. Data aggregation may be effective technique in this context because it reduces the number of packets to be sent to sink by aggregating the similar packets. The performance of data aggregation protocols are characterized by performance measure such as energy consumption, latency ad data accuracy. In this paper, we present a survey of data aggregation algorithms and approaches for handling the trade-offs in data aggregation schemes.

Research paper thumbnail of Face Liveness Detection to Overcome Spoofing Attacks in Face Recognition System

Face recognition is widely used across several biometric applications. Hence, it is very importan... more Face recognition is widely used across several biometric applications. Hence, it is very important that the face recognition system is completely secure and is not prone to any threat. In recent research, it is observed that the face recognition system is vulnerable to many attacks such as spoofing, morphing or masking. These attacks pose a severe threat to the security of the face recognition system. In this paper, a novel method is proposed for face liveness detection to overcome spoofing attacks, and then, it is followed by face recognition. The proposed face liveness detection method is designed to identify whether the captured face image is of the live person or spoofed face of the person. Further, the face liveness detected image is processed for face recognition using OpenFace. In case, if face liveness detection fails, it is not further processed for face recognition. Thereby, the method overcomes the spoofing attacks on the face recognition system in the primary input step ...

Research paper thumbnail of Experiential Learning Enhancing User Interface Design Skills through Cognitive Action

2016 IEEE 4th International Conference on MOOCs, Innovation and Technology in Education (MITE), 2016

In these days of intuitive and intelligent software systems the audience is not going to put any ... more In these days of intuitive and intelligent software systems the audience is not going to put any effort into using the product, application or operating system – they'll expect it to be obvious. The perception of any software is driven entirely by its User Interface (UI). Usable software sells better and unusable software is abandoned. Designing usable UIs is challenging and instilling such designing skills in students is even more challenging. This paper investigates Experiential Learning methodology used to imbibe UI Designing Skills in students through the course "Principles of User Interface Design". The primary objective was to attain Graduate Attributes/Program Outcomes (POs) 1, 2 and 3 as defined in the Outcome Based Education (OBE). The approach comprised of two main activities – Identifying Good UIs and Bad UIs and Designing UI Prototypes. A rubric based assessment was used to test the concepts' realization among students. This novel approach did not claim...

Research paper thumbnail of Acquiring User Interface Design Skills through Experiential Learning

Journal of Engineering Education Transformations, 2017

In these days of intuitive and intelligent software systems the audience is not going to put any ... more In these days of intuitive and intelligent software systems the audience is not going to put any effort into using the product, application or operating system - they'll expect it to be obvious. The perception of any software is driven entirely by its User Interface (UI). Usable software sells better and unusable software is abandoned. Designing usable UIs is challenging and instilling such designing skills in students is even more challenging. This paper investigates Experiential Learning methodology used to imbibe UI Designing Skills in students through the course "Principles of User Interface Design". The primary objective was to attain Graduate Attributes/Program Outcomes (POs) 1, 2 and 3 as defined in the Outcome Based Education (OBE). The approach comprised of two main activities- Identifying Good UIs and Bad UIs and Designing UI Prototypes. A rubric based assessment was used to test the concepts' realization among students. Though this novel approach did not...

Research paper thumbnail of Secure and Scalable Decentralized Supply Chain Management Using Ethereum and IPFS Platform

2021 International Conference on Intelligent Technologies (CONIT), 2021

There are various applications using Blockchain technology to make sure the accessibility, stabil... more There are various applications using Blockchain technology to make sure the accessibility, stability and reliability. Nevertheless these applications are cladding the warehouse issue unsettled to the information capacity extension of transaction. In the paper, an IPFS based Blockchain repository prototype to resolve the trouble of transaction in a block through the entry of a specific block’s transaction. Supply chain management is administering passing the merchandise from the producer to the client and incorporating all procedures that consist of unprocessed materials into finished products. The supply chain unwraps everything beginning with manufacturing to output advancement. Supply chain management performance face reproving challenges affiliated with scalability, data integrity, transparency, traceability, efficiency, and security to the parties’ transactions. Blockchain is a digital documentation of ledger that issues a cautious and secure interchanging of data among supply chain stakeholders. The paper put forward a collective structure using IPFS, Ethereum smart contract, and decentralized repository organization to robotize the procedure and data swapping. The code was evolved and evaluated in Remix IDE to publish the Smart contracts to IPFS and compile transactions, Metamask as a wallet for Ethereum transaction.

Research paper thumbnail of Adaptive Ensemble Learning with Concept Drift Detection for Intrusion Detection

Advances in Intelligent Systems and Computing, 2021

Research paper thumbnail of Intelligent Irrigation Control System by Employing Wireless Sensor Networks

International Journal of Computer Applications, 2013

Fast growing technology of wireless sensor networks (WSN) is an advantage to the agriculture sect... more Fast growing technology of wireless sensor networks (WSN) is an advantage to the agriculture sector. Modern advances in the development of WSN offer new trends like Precision Agriculture (PA). This paper presents Fuzzy Logic Based Intelligent Irrigation Control System by employing WSN for PA. In the proposed system the irrigation controller normalizes the desired moisture level in the agricultural soil by controlling the water flow of the irrigation pump based on the sensor readings, by switching the pump between ON and OFF states. For the efficient utilization of water in the agricultural irrigation, the proposed methodology offers a system equipped with soil moisture sensors, temperature sensors, precise irrigation equipments, computer-controlled devices, and an intelligent controller using fuzzy logic approach for irrigation of agricultural fields, which simulates or emulates the human being's intelligence. This leads to effective utilization of various resources like water and electricity and hence becomes a cost effective system for the expected yield. The fuzzy controller designed in this paper efficiently monitors moisture level in soil, leaf wetness, temperature, humidity, and other essential parameters and also controls the irrigation intelligently. The results show that the application is correct and reasonable and enables user to precisely acquire the crop water requirement information. The system can be effectively applied to PA applications such as water-saving agriculture areas, for example, the croplands, the nursery gardens and the greenhouses.

Research paper thumbnail of Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks

Advances in Intelligent Systems and Computing, 2013

The main goal of the data aggregation protocol is to gather and aggregate data in a wireless sens... more The main goal of the data aggregation protocol is to gather and aggregate data in a wireless sensor network (WSN) in an energy-efficient manner. Prolonging the network lifetime depends on the efficient management of sensor nodes energy resource by minimizing the number of transmissions through aggregating similar data from nearby region. The clustering technique and aggregating the correlated data greatly minimize the energy consumed in collecting and disseminating the data. Reducing the energy consumption of the nodes to prolong the network lifetime is considered a critical challenge while designing protocol for WSN. In this work, we propose a novel Energy-Efficient Cluster-Based Aggregation Protocol (EECAP) for heterogeneous WSN. The main focus in this proposed work is to achieve energy efficiency by proper selection of nodes for cluster heads by considering residual energy of a node. We present experimental results by calculating the lifetime of network using various parameters such as average residual energy of nodes, number of dead nodes after each round, and death of first and last nodes in the network. The results are compared with Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and Stable Election Protocol (SEP). The EECAP performs better in both homogeneous and heterogamous WSNs.

Research paper thumbnail of Energy Efficient Aggregation with Divergent Sink Placement for Wireless Sensor Networks

International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2013

In WSN the data aggregation is a means for condensing the energy requirement by reducing number o... more In WSN the data aggregation is a means for condensing the energy requirement by reducing number of transmission by combining the data and sending the final required result to the base station. The lifetime of the WSN can be improved by employing the aggregation techniques. During the process of aggregation the numbers of transmission are reduced by combining the similar data from the nearby areas. By using the clustering technique and aggregating the correlated data greatly minimize the energy consumed in collecting and disseminating the data. In this work, we evaluate the performance of a novel energy efficient cluster based aggregation protocol (EECAP) for WSN. The main focus in this proposed work is to study the performance of our proposed aggregation protocol with divergent sink placements such as when sink is at the centre of the sensing field, corner of the sensing field or at a location selected randomly in the sensor field. We present experimental results by calculating the lifetime of network in terms of number of sensing rounds using various parameters such as-average remaining energy of nodes, number of dead nodes after the specified number of sensing rounds. Finally the performance of various aggregation algorithms such as LEACH, SEP and our proposed aggregation protocol (EECAP) are compared with divergent sink placements. The simulation results demonstrates that EECAP exhibits good performance in terms of lifetime and the energy consumption of the wireless sensor networks and which can be as equally compared with existing clustering protocols.

Research paper thumbnail of SVM based data redundancy elimination for data aggregation in Wireless Sensor Networks

2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013

The data aggregation is most important in Wireless Sensor Networks (WSN) due to constraint of res... more The data aggregation is most important in Wireless Sensor Networks (WSN) due to constraint of resources. There is lot of data redundancy in WSN due to dense deployment. So, it is necessary to minimize the data redundancy by adopting suitable aggregation techniques. To resolve this problem, Support Vector Machine (SVM) based Data Redundancy Elimination for Data Aggregation in WSN (SDRE) has been proposed in this work. First, we build aggregation tree for the given size of the sensor network. Then, SVM method was applied on tree to eliminate the redundant data. The Locality Sensitive Hashing (LSH) is used minimize the data redundancy and to eliminate the false data based on the similarity. The LSH codes are sent to the aggregation supervisor node. The aggregation supervisor finds sensor nodes that have the same data and selects only one sensor node among them to send actual data. The benefit of this approach is it minimizes the redundancy and to eliminate the false data to improve performance of WSN. The performance of proposed approach is measured using the network parameters such as Delay, Energy, Packet drops and Overheads. The SDRE perform better in all the scenarios for different size network and varying data rate.

Research paper thumbnail of Nondirected indoor infrared wireless channel modeling using modulation schemes

2012 International Conference on Communication, Information & Computing Technology (ICCICT), 2012

ABSTRACT The indoor infrared wireless communication has been introduced a new dimension for short... more ABSTRACT The indoor infrared wireless communication has been introduced a new dimension for short range wireless communication. The modulation schemes play an important role during IR channel modeling. The modulation schemes enumerate the harshness of multipath ISI. This paper described and analyzed the various modulations schemes such as on-off-keying(OOK), pulse amplitude modulation (PAM) and pulse position modulation (PPM) and multilevel pulse amplitude and pulse position modulation (PAPM) for the performance measure of Non directed indoor IR channel. It performed the simulation analysis by taking into account the bit error rate (BER) . A fixed rectangular empty room with certain transmitter and receiver geometry was considered during the simulation.

Research paper thumbnail of Performance analysis and channel characterization of indoor infrared wireless communication system

2011 3rd International Conference on Electronics Computer Technology, 2011

Page 1. Performance Analysis and Channel Characterization of Indoor Infrared Wireless Communicati... more Page 1. Performance Analysis and Channel Characterization of Indoor Infrared Wireless Communication System Prakash H. Patil DD Shah Priyadarshini College of Engineering, Nagpur GHRaisoni College of Engineering, Pune Nagpur, India. Pune, India. ...

Research paper thumbnail of Concept Drift Adaptation in Intrusion Detection Systems Using Ensemble Learning

International Journal of Natural Computing Research

The primary challenge of intrusion detection systems (IDS) is to rapidly identify new attacks, le... more The primary challenge of intrusion detection systems (IDS) is to rapidly identify new attacks, learn from the adversary, and update the intrusion detection immediately. IDS operate in dynamic environments subjected to evolving data streams where data may come from different distributions. This is known as the problem of concept drift. Today's IDS though are equipped with deep learning algorithms most of the times fail to identify concept drift. This paper presents a technique to detect and adapt to concept drifts in streaming data with a large number of features often seen in IDS. The study modifies extreme gradient boosting (XGB) algorithm for adaptability of drifts and optimization for large datasets in IDS. The primary objective is to reduce the number of ‘false positives' and ‘false negatives' in the predictions. The method is tested on streaming data of smaller and larger sizes and compared against non-adaptive XGBoost and logistic regression.

Research paper thumbnail of Scalable Blockchain Framework for a Food Supply Chain

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Real-World Anomaly Detection Using Deep Learning

Intelligent Computing and Communication, 2020

In this paper, we have carried out a comparative study on two deep learning models for detecting ... more In this paper, we have carried out a comparative study on two deep learning models for detecting real-world anomalies in surveillance videos. Anomalous event is the one which deviates from the normal behavior. The anomalies considered are related to thefts such as robbery, burglary, stealing, and shoplifting. A framework is set up using supervised learning approach to train the models using the weakly labeled videos. The deep learning models considered are VGG-16 and inception model which are trained with both anomalous and normal videos to detect any anomalous activity in the video frame. UCF-Crime dataset is used which comprises long, untrimmed surveillance videos. The deep learning models are evaluated using various metrics. The experimental results show that the Inception V3 model performs significantly better in detecting the anomalies as compared to the VGG-16 model with an accuracy of 94.54%.

Research paper thumbnail of Academic Information Management System Using Open Source Programming Tools and Technologies

Proceedings of the International Conference on Transformations in Engineering Education, 2014

Hubli) developed a wide range of Software Applications using Open Source Programming Tools and Te... more Hubli) developed a wide range of Software Applications using Open Source Programming Tools and Technologies to meet the requirements of managing the Academic Information for autonomous engineering colleges. The applications developed using open source technologies include (i) Student Information Management System (SIMS), (ii) Student Assessment Management and Examination System (SAMS), and (iii) Examination Results (eResults). Brief overviews of these applications along with the benefi ts are presented in this paper. These tools were found to be very useful for managing and administering the information in an autonomous engineering college and well appreciated and used by the stakeholders for the last few years. Keywords SIMS-Student information management system • SAMS-Student assessment management and examination system • Open source programming languages and technologies • BVB College of Engineering and Technologies (BVBCET)

Research paper thumbnail of Analysis of DEAP Dataset for Emotion Recognition

Research paper thumbnail of A Study on Blockchain Scalability

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Object Oriented Programming Using Real Life Paradigm with Open Source Technology

Journal of Electrical Engineering & Technology, 2017

Over the years Object oriented programming (OOP) has gained the dominance in both the software in... more Over the years Object oriented programming (OOP) has gained the dominance in both the software industry and education. Advance pedagogy is the way to enhance teaching and learning performance. Different innovative teaching methods are now in use across the globe. There are a number of OOP versions released by Software companies and the same are adopted by the educational institutions at various levels in their curricula. The main reason for this inclination is driven by the fact that OOP solves any problem by imitating the mental model of humans. It is usually a challenge for teachers to imbibe OOP concepts in novice programmers. Teaching fundamentals of OOP at an introductory level is challenging. This paper presents a pedagogical approach used for teaching/learning process of Object Oriented Programming in C++ course offered at MCA. The course focuses on development of OOP skills and concepts among students. The approach uses real life analogies to effectively enhance the learning...

Research paper thumbnail of Teaching C++ Using Real Life Analogies

Journal of Engineering Education Transformations, 2016

Over the years Object oriented programming (OOP) has gained the dominance in both the software in... more Over the years Object oriented programming (OOP) has gained the dominance in both the software industryand education. There are a number of OOP versions released by Software companies and the same are adopted by the educational institutions at various levels in their curricula. The main reason for this inclination is driven by the fact that OOP solves any problem by imitating the mental model of humans. It is usually a challenge for teachers to imbibe OOP concepts in novice programmers. Teaching fundamentals of OOP at an introductory level is challenging. This paper presents a pedagogical approach used for teaching/learning process of Object Oriented Programming in C++ course offered at MCA II semester. The approach uses real life analogies to effectively enhance the learning of OOP concepts among students. Students might program in an OOP language but fail to program in an object-oriented style. This is because students are unsuccessful to model given problem in terms of objects. T...

Research paper thumbnail of Analysis of Data Aggregation Techniques in Wireless Sensor Networks

The main goal of data aggregation algorithms is to gather and aggregate data in Wireless Sensor N... more The main goal of data aggregation algorithms is to gather and aggregate data in Wireless Sensor Network (WSN) in an energy efficient manner so that network lifetime is enhanced. Data aggregation may be effective technique in this context because it reduces the number of packets to be sent to sink by aggregating the similar packets. The performance of data aggregation protocols are characterized by performance measure such as energy consumption, latency ad data accuracy. In this paper, we present a survey of data aggregation algorithms and approaches for handling the trade-offs in data aggregation schemes.

Research paper thumbnail of Face Liveness Detection to Overcome Spoofing Attacks in Face Recognition System

Face recognition is widely used across several biometric applications. Hence, it is very importan... more Face recognition is widely used across several biometric applications. Hence, it is very important that the face recognition system is completely secure and is not prone to any threat. In recent research, it is observed that the face recognition system is vulnerable to many attacks such as spoofing, morphing or masking. These attacks pose a severe threat to the security of the face recognition system. In this paper, a novel method is proposed for face liveness detection to overcome spoofing attacks, and then, it is followed by face recognition. The proposed face liveness detection method is designed to identify whether the captured face image is of the live person or spoofed face of the person. Further, the face liveness detected image is processed for face recognition using OpenFace. In case, if face liveness detection fails, it is not further processed for face recognition. Thereby, the method overcomes the spoofing attacks on the face recognition system in the primary input step ...

Research paper thumbnail of Experiential Learning Enhancing User Interface Design Skills through Cognitive Action

2016 IEEE 4th International Conference on MOOCs, Innovation and Technology in Education (MITE), 2016

In these days of intuitive and intelligent software systems the audience is not going to put any ... more In these days of intuitive and intelligent software systems the audience is not going to put any effort into using the product, application or operating system – they'll expect it to be obvious. The perception of any software is driven entirely by its User Interface (UI). Usable software sells better and unusable software is abandoned. Designing usable UIs is challenging and instilling such designing skills in students is even more challenging. This paper investigates Experiential Learning methodology used to imbibe UI Designing Skills in students through the course "Principles of User Interface Design". The primary objective was to attain Graduate Attributes/Program Outcomes (POs) 1, 2 and 3 as defined in the Outcome Based Education (OBE). The approach comprised of two main activities – Identifying Good UIs and Bad UIs and Designing UI Prototypes. A rubric based assessment was used to test the concepts' realization among students. This novel approach did not claim...

Research paper thumbnail of Acquiring User Interface Design Skills through Experiential Learning

Journal of Engineering Education Transformations, 2017

In these days of intuitive and intelligent software systems the audience is not going to put any ... more In these days of intuitive and intelligent software systems the audience is not going to put any effort into using the product, application or operating system - they'll expect it to be obvious. The perception of any software is driven entirely by its User Interface (UI). Usable software sells better and unusable software is abandoned. Designing usable UIs is challenging and instilling such designing skills in students is even more challenging. This paper investigates Experiential Learning methodology used to imbibe UI Designing Skills in students through the course "Principles of User Interface Design". The primary objective was to attain Graduate Attributes/Program Outcomes (POs) 1, 2 and 3 as defined in the Outcome Based Education (OBE). The approach comprised of two main activities- Identifying Good UIs and Bad UIs and Designing UI Prototypes. A rubric based assessment was used to test the concepts' realization among students. Though this novel approach did not...

Research paper thumbnail of Secure and Scalable Decentralized Supply Chain Management Using Ethereum and IPFS Platform

2021 International Conference on Intelligent Technologies (CONIT), 2021

There are various applications using Blockchain technology to make sure the accessibility, stabil... more There are various applications using Blockchain technology to make sure the accessibility, stability and reliability. Nevertheless these applications are cladding the warehouse issue unsettled to the information capacity extension of transaction. In the paper, an IPFS based Blockchain repository prototype to resolve the trouble of transaction in a block through the entry of a specific block’s transaction. Supply chain management is administering passing the merchandise from the producer to the client and incorporating all procedures that consist of unprocessed materials into finished products. The supply chain unwraps everything beginning with manufacturing to output advancement. Supply chain management performance face reproving challenges affiliated with scalability, data integrity, transparency, traceability, efficiency, and security to the parties’ transactions. Blockchain is a digital documentation of ledger that issues a cautious and secure interchanging of data among supply chain stakeholders. The paper put forward a collective structure using IPFS, Ethereum smart contract, and decentralized repository organization to robotize the procedure and data swapping. The code was evolved and evaluated in Remix IDE to publish the Smart contracts to IPFS and compile transactions, Metamask as a wallet for Ethereum transaction.

Research paper thumbnail of Adaptive Ensemble Learning with Concept Drift Detection for Intrusion Detection

Advances in Intelligent Systems and Computing, 2021

Research paper thumbnail of Intelligent Irrigation Control System by Employing Wireless Sensor Networks

International Journal of Computer Applications, 2013

Fast growing technology of wireless sensor networks (WSN) is an advantage to the agriculture sect... more Fast growing technology of wireless sensor networks (WSN) is an advantage to the agriculture sector. Modern advances in the development of WSN offer new trends like Precision Agriculture (PA). This paper presents Fuzzy Logic Based Intelligent Irrigation Control System by employing WSN for PA. In the proposed system the irrigation controller normalizes the desired moisture level in the agricultural soil by controlling the water flow of the irrigation pump based on the sensor readings, by switching the pump between ON and OFF states. For the efficient utilization of water in the agricultural irrigation, the proposed methodology offers a system equipped with soil moisture sensors, temperature sensors, precise irrigation equipments, computer-controlled devices, and an intelligent controller using fuzzy logic approach for irrigation of agricultural fields, which simulates or emulates the human being's intelligence. This leads to effective utilization of various resources like water and electricity and hence becomes a cost effective system for the expected yield. The fuzzy controller designed in this paper efficiently monitors moisture level in soil, leaf wetness, temperature, humidity, and other essential parameters and also controls the irrigation intelligently. The results show that the application is correct and reasonable and enables user to precisely acquire the crop water requirement information. The system can be effectively applied to PA applications such as water-saving agriculture areas, for example, the croplands, the nursery gardens and the greenhouses.

Research paper thumbnail of Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks

Advances in Intelligent Systems and Computing, 2013

The main goal of the data aggregation protocol is to gather and aggregate data in a wireless sens... more The main goal of the data aggregation protocol is to gather and aggregate data in a wireless sensor network (WSN) in an energy-efficient manner. Prolonging the network lifetime depends on the efficient management of sensor nodes energy resource by minimizing the number of transmissions through aggregating similar data from nearby region. The clustering technique and aggregating the correlated data greatly minimize the energy consumed in collecting and disseminating the data. Reducing the energy consumption of the nodes to prolong the network lifetime is considered a critical challenge while designing protocol for WSN. In this work, we propose a novel Energy-Efficient Cluster-Based Aggregation Protocol (EECAP) for heterogeneous WSN. The main focus in this proposed work is to achieve energy efficiency by proper selection of nodes for cluster heads by considering residual energy of a node. We present experimental results by calculating the lifetime of network using various parameters such as average residual energy of nodes, number of dead nodes after each round, and death of first and last nodes in the network. The results are compared with Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and Stable Election Protocol (SEP). The EECAP performs better in both homogeneous and heterogamous WSNs.

Research paper thumbnail of Energy Efficient Aggregation with Divergent Sink Placement for Wireless Sensor Networks

International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2013

In WSN the data aggregation is a means for condensing the energy requirement by reducing number o... more In WSN the data aggregation is a means for condensing the energy requirement by reducing number of transmission by combining the data and sending the final required result to the base station. The lifetime of the WSN can be improved by employing the aggregation techniques. During the process of aggregation the numbers of transmission are reduced by combining the similar data from the nearby areas. By using the clustering technique and aggregating the correlated data greatly minimize the energy consumed in collecting and disseminating the data. In this work, we evaluate the performance of a novel energy efficient cluster based aggregation protocol (EECAP) for WSN. The main focus in this proposed work is to study the performance of our proposed aggregation protocol with divergent sink placements such as when sink is at the centre of the sensing field, corner of the sensing field or at a location selected randomly in the sensor field. We present experimental results by calculating the lifetime of network in terms of number of sensing rounds using various parameters such as-average remaining energy of nodes, number of dead nodes after the specified number of sensing rounds. Finally the performance of various aggregation algorithms such as LEACH, SEP and our proposed aggregation protocol (EECAP) are compared with divergent sink placements. The simulation results demonstrates that EECAP exhibits good performance in terms of lifetime and the energy consumption of the wireless sensor networks and which can be as equally compared with existing clustering protocols.

Research paper thumbnail of SVM based data redundancy elimination for data aggregation in Wireless Sensor Networks

2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013

The data aggregation is most important in Wireless Sensor Networks (WSN) due to constraint of res... more The data aggregation is most important in Wireless Sensor Networks (WSN) due to constraint of resources. There is lot of data redundancy in WSN due to dense deployment. So, it is necessary to minimize the data redundancy by adopting suitable aggregation techniques. To resolve this problem, Support Vector Machine (SVM) based Data Redundancy Elimination for Data Aggregation in WSN (SDRE) has been proposed in this work. First, we build aggregation tree for the given size of the sensor network. Then, SVM method was applied on tree to eliminate the redundant data. The Locality Sensitive Hashing (LSH) is used minimize the data redundancy and to eliminate the false data based on the similarity. The LSH codes are sent to the aggregation supervisor node. The aggregation supervisor finds sensor nodes that have the same data and selects only one sensor node among them to send actual data. The benefit of this approach is it minimizes the redundancy and to eliminate the false data to improve performance of WSN. The performance of proposed approach is measured using the network parameters such as Delay, Energy, Packet drops and Overheads. The SDRE perform better in all the scenarios for different size network and varying data rate.