Full Silicon Photonics Amp High Performance Computing Proceedings of CSI 2015 1st Edition Anurag Mishra Ebook All Chapters
Full Silicon Photonics Amp High Performance Computing Proceedings of CSI 2015 1st Edition Anurag Mishra Ebook All Chapters
Full Silicon Photonics Amp High Performance Computing Proceedings of CSI 2015 1st Edition Anurag Mishra Ebook All Chapters
com
https://textbookfull.com/product/silicon-
photonics-amp-high-performance-computing-
proceedings-of-csi-2015-1st-edition-anurag-mishra/
https://textbookfull.com/product/sensors-and-image-processing-
proceedings-of-csi-2015-1st-edition-shabana-urooj/
textbookfull.com
https://textbookfull.com/product/natural-antimicrobial-agents-1st-
edition-jean-michel-merillon/
textbookfull.com
https://textbookfull.com/product/graphic-medicine-manifesto-1st-
edition-mk-czerwiec/
textbookfull.com
https://textbookfull.com/product/a-favor-for-a-favor-nat-chelloni/
textbookfull.com
https://textbookfull.com/product/corporate-risk-management-for-
international-business-1st-edition-ayse-kucuk-yilmaz/
textbookfull.com
Functional polymer composites with nanoclays Yuri Lvov
https://textbookfull.com/product/functional-polymer-composites-with-
nanoclays-yuri-lvov/
textbookfull.com
Advances in Intelligent Systems and Computing 718
Anurag Mishra
Anirban Basu
Vipin Tyagi Editors
Volume 718
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on
theory, applications, and design methods of Intelligent Systems and Intelligent Computing.
Virtually all disciplines such as engineering, natural sciences, computer and information
science, ICT, economics, business, e-commerce, environment, healthcare, life science are
covered. The list of topics spans all the areas of modern intelligent systems and computing.
The publications within “Advances in Intelligent Systems and Computing” are primarily
textbooks and proceedings of important conferences, symposia and congresses. They cover
significant recent developments in the field, both of a foundational and applicable character.
An important characteristic feature of the series is the short publication time and world-wide
distribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]
Vipin Tyagi
Editors
123
Editors
Anurag Mishra Vipin Tyagi
Deen Dayal Upadhyaya College Department of Computer Science
University of Delhi and Engineering
New Delhi, Delhi Jaypee University of Engineering
India and Technology
Guna, Madhya Pradesh
Anirban Basu India
Department of Computer Science
and Engineering
Visvesvaraya Technological University
Belgaum, Karnataka
India
The last decade has witnessed remarkable changes in IT industry, virtually in all
domains. The 50th Annual Convention, CSI-2015, on the theme “Digital Life” was
organized as a part of CSI@50, by CSI at Delhi, the national capital of the country,
during December 2–5, 2015. Its concept was formed with an objective to keep ICT
community abreast of emerging paradigms in the areas of computing technologies
and more importantly looking at its impact on the society.
Information and Communication Technology (ICT) comprises of three main
components: infrastructure, services, and product. These components include the
Internet, Infrastructure-based/infrastructure-less wireless networks, mobile termi-
nals, and other communication mediums. ICT is gaining popularity due to rapid
growth in communication capabilities for real-time-based applications. The Silicon
Photonics & High Performance Computing includes design and analysis of parallel
and distributed systems, embedded systems, and their applications in scientific,
engineering, and commercial deployment. CSI-2015 attracted over 1500 papers
from researchers and practitioners from academia, industry, and government
agencies, from all over the world, thereby making the job of the Programme
Committee extremely difficult. After a series of tough review exercises by a team of
over 700 experts, 565 papers were accepted for presentation in CSI-2015 during the
3 days of the convention under ten parallel tracks. The Programme Committee, in
consultation with Springer, the world’s largest publisher of scientific documents,
decided to publish the proceedings of the presented papers, after the convention, in
ten topical volumes, under ASIC series of the Springer, as detailed hereunder:
1. Volume # 1:
ICT Based Innovations
2. Volume # 2:
Next Generation Networks
3. Volume # 3:
Nature Inspired Computing
4. Volume # 4:
Speech and Language Processing for
Human-Machine Communications
5. Volume # 5: Sensors and Image Processing
6. Volume # 6: Big Data Analytics
v
vi Preface
We hope that all the participated delegates will be benefitted academically and wish
them for their future endeavors.
We also take the opportunity to thank the entire team from Springer, who have
worked tirelessly and made the publication of the volume a reality. Last but not
least, we thank the team from Bharati Vidyapeeth’s Institute of Computer
Applications and Management (BVICAM), New Delhi, for their untiring support,
without which the compilation of this huge volume would not have been possible.
Chief Patron
Padmashree Dr. R. Chidambaram, Principal Scientific Advisor, Government
of India
Patrons
Prof. S. V. Raghavan, Department of Computer Science, IIT Madras, Chennai
Prof. Ashutosh Sharma, Secretary, Department of Science and Technology,
Ministry of Science of Technology, Government of India
Advisory Committee
Padma Bhushan Dr. F. C. Kohli, Co-Founder, TCS
Mr. Ravindra Nath, CMD, National Small Industries Corporation, New Delhi
Dr. Omkar Rai, Director General, Software Technological Parks of India (STPI),
New Delhi
ix
x The Organization of CSI-2015
Adv. Pavan Duggal, Noted Cyber Law Advocate, Supreme Courts of India
Prof. Bipin Mehta, President, CSI
Prof. Anirban Basu, Vice President–cum–President Elect, CSI
Shri Sanjay Mohapatra, Secretary, CSI
Prof. Yogesh Singh, Vice Chancellor, Delhi Technological University, Delhi
Prof. S. K. Gupta, Department of Computer Science and Engineering, IIT Delhi
Prof. P. B. Sharma, Founder Vice Chancellor, Delhi Technological University,
Delhi
Mr. Prakash Kumar, IAS, Chief Executive Officer, Goods and Services Tax
Network (GSTN)
Mr. R. S. Mani, Group Head, National Knowledge Networks (NKN), NIC,
Government of India, New Delhi
Editorial Board
A. K. Nayak, CSI
A. K. Saini, GGSIPU, New Delhi
R. K. Vyas, University of Delhi, New Delhi
Shiv Kumar, CSI
Vishal Jain, BVICAM, New Delhi
S. S. Agrawal, KIIT, Gurgaon
Amita Dev, BPIBS, New Delhi
D. K. Lobiyal, JNU, New Delhi
Ritika Wason, BVICAM, New Delhi
Anupam Baliyan, BVICAM, New Delhi
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Contents
xi
xii Contents
Dr. Anurag Mishra has more than 23 years of research and teaching experience.
He is presently working as Associate Professor of Electronics, Deen Dayal
Upadhyaya College, University of Delhi, India. He is actively involved in research
in information security and digital watermarking of images and video in particular,
intelligent systems employed for image processing using soft computing techniques
such as artificial neural networks, fuzzy systems, support vector machines, and
extreme learning machines. He has developed fuzzy inference system-based models
for coded image transmission over wireless channels. Additionally, he also
extensively uses hybrid techniques such as neuro-fuzzy systems and GA-BPN
systems for different image processing applications.
Dr. Anirban Basu holds a master’s and Ph.D. in Computer Science and has more
than 35 years of experience in academia, advanced research and development,
commercial software industry, consultancy, and corporate training. He has worked
at the Indian Statistical Institute, Kolkata, in 1979 and joined CDAC, Pune, India, in
1989 to play a key role in the development of India’s first supercomputer PARAM.
He has also worked at Siemens Information Systems Ltd and Computer
Associates TCG in senior/top management positions. He has published 80 research
papers in respective national and international journals and authored 6 books
including one on “Software Quality Assurance, Testing and Metrics” published by
PHI.
Dr. Vipin Tyagi works at the Department of Computer Science and Engineering,
Jaypee University of Engineering and Technology, Raghogarh, Guna (MP), India,
and is the Regional Vice President of Region 3 of the Computer Society of India
(CSI). He is also associated with the CSI Special Interest Group on Cyber
Forensics. He has over 20 years of teaching and research experience. He was the
President (Engineering Sciences) of the Indian Science Congress Association for
the term 2010–2011. He is a Life Fellow of the IETE, New Delhi, India.
xiii
Tackling Supply Chain Management
Through High-Performance Computing:
Opportunities and Challenges
P. R. Nair (&)
Department of Computer Science Engineering,
Amrita School of Engineering, Amrita Vishwa Vidyapeetham University,
Amrita Nagar, Coimbatore 641112, India
e-mail: [email protected]
S. P. Anbuudayasankar
Department of Mechanical Engineering,
Amrita School of Engineering, Amrita Vishwa Vidyapeetham University,
Amrita Nagar, Coimbatore 641112, India
1 Introduction
3 Cloud Computing
Forrester Research estimates the total worth of the cloud and associated technology
economy worldwide to be $241 billion by 2020 [8]. Prominent ERP solution
providers like Baan and SAP are increasingly selling cloud versions of their
products. These thin solutions reduce the Total Cost of Ownership (TCO) for
companies and contribute to improving profits as well as sales.
4 P. R. Nair and S. P. Anbuudayasankar
Major HPC advantages like scalability, integration, and interoperability are like a
wish list in SCM deployments. This renders efficient management and analysis of
the big data generated from multifarious sources. A unified view of the supply chain
is preferred by all suppliers, partners, customers, logistic providers, and other
stakeholders. The world’s largest retail giant, Wal-Mart stocks over 500,000 unique
products. Empanelled suppliers in their network battle intensely for shelf space and
SKU. Retailers continually need visibility of their inventory from point of sale to
warehouse as also the patterns of customer preferences and buying behavior. Many
world-class companies in the aerospace, life sciences, and automotive industries are
using HPC and mandating their supplier network to plug in.
Wal-Mart is an early adopter of HPC for SCM. HPC is used for the supply chain
activities like store, resource, and shelf space planning as also have visibility of all
their stores from their headquarters at Bentonville, USA. Pratt and Whitney, the
leading aerospace company, simulates inventory positions using supercomputing
systems. Various suppliers and partners are also encouraged to plug into the system
[10]. However apart from some large enterprises, who have touched the tip of the
iceberg, many are yet to leverage the power of HPC or the force multiplier effect
through the use of cloud and SMAC technologies. Perhaps, the biggest challenge
would be to convince all partners to drift from existing legacy computers to cloud or
supercomputers.
Cloud computers and its component services such as Software as a Service
(SaaS), Hardware as a Service (HaaS), and Platform as a Service (PaaS) are a
Tackling Supply Chain Management Through High … 5
5 Conclusion
HPC solutions, both stand-alone as also in conjunction with cloud or with SMAC
stack have started making inroads into various processes and activities for SCM,
planning, and execution. These systems help in providing agility, adaptability,
communication, collaboration, decision support, elasticity, robustness, sensitivity,
scalability, portability, storage, processing power, data integration, interoperability,
and visibility to supply chains. HPC along with the cloud computing paradigm
integrated in the Social Mobile Analytics and Cloud (SMAC) stack can emerge as a
game changer to integrate all stakeholders in the value chain into a social network
real-time and actionable intelligence. Cloud computing can join together all supply
chain stakeholders into a real-time and interconnected social network like com-
munity with real-time updates. SMAC and cloud deployments for SCM are
expanding fast with some vendors offering Software as a Service based solutions.
However, HPC deployments for SCM are limited to some big players. Deployment
challenges include difficulty in migrating from legacy to high-end systems, high
cost, lack of skilled manpower, and application software.
References
1. Nair PR, Balasubramaniam OA (2010) IT enabled supply chain management using decision
support systems. CSI Comm 34(2):34–40
2. Nair PR (2012) RFID for supply chain management. CSI Comm 36(8):14–18
3. Nair PR (2013) E-supply chain management using software agents. CSI Comm 37(4):13–16
4. Toka A, Eirini A, Antonios A, Konstantinos A (2013) Cloud computing in supply chain
management: an overview. E-logistics E-Supply Chain Manage 218–231
5. Frank M (2012) Don’t get SMACked: how social, mobile, analytics and cloud technologies
are reshaping the enterprise. Cognizant Future of Work
6. Chandrasekharan R, Udhas P (2013) The SMAC code: embracing new technologies for future
business.CII and KPMG report information. http://www.kpmg.com/IN/en/IssuesAndInsights/
ArticlesPublications/Documents/The-SMAC-code-Embracing-new-technologies-for-future-
business.pdf
7. Betts B (2012) HPC cloud: supercomputing to go. E&T 7(2)
8. King J The rise of the Cloud. Supp Chn Europe information http://www.scemagazine.com/
the-rise-of-the-cloud/
9. Sujay R (2011) Hybrid cloud: a new era. Int J Comp Sci Tech 2(2):323–326
10. Conway S (2006) HPC and supply chain management. HPC Wire, Sep 15
11. Christopher M (2000) The agile supply chain: competing in volatile markets. Ind Mark
Manage 29:37–44
12. McCrea B (2012) Supply chain technology: cloud computing breakthrough. Logistic manage.
http://www.logisticsmgmt.com/article/supply_chain_technology_cloud_breakthrough
13. Harris J, Alter A (2010) Cloudrise: rewards and risks at the dawn of cloud computing.
Accenture. http://itri.uark.edu/Cloud_Computing_-_Theirs_Mine_and_Ours-v4.pptx
Tackling Supply Chain Management Through High … 7
14. Schramm T, Nogueira S, Jones D (2011) Cloud computing and supply chain: a natural fit for
the future: Logistic manage. http://www.logisticsmgmt.com/article/cloud_computing_and_
supply_chain_a_natural_fit_for_the_future
15. JDA Company information. http://www.jda.com/view/press-release/planning-in-the-cloud-
jda-software-reshapes-supply-chain-management-for-manufacturers/
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
Energy Theft Identification in Smart Grid
1 Introduction
Smart grid is the future power grid with the integration of electrical power grid and
ICT which is developing all over world, it is a fully sustainable form of reliable and
green electrical energy in existing network with advanced technologies and com-
munication devices to manage the system in both sides [1]. These advanced
methodology and frameworks provide a great flexibility and management, this also
possesses a new class of risk [2]. Smart grid is one of the most critical infras-
tructures that are augmented by the large-scale ICT and renewable energy inte-
gration [3], even with all the crises, smart grid is the best infrastructure to handle a
large set of management system that is distributed in the network. To provide grid
monitoring and control capabilities, numerous power applications are necessary to
exist [4]. Every year, the utility provider company fares their power theft from 20 to
30% and to that power, ministry loss is more than Rs. 125 billion [7], at this stage,
service providers took several steps to manage the distribution system, but this is
not enough to handle the power theft. This paper proposes a new model to handle
power losses in distribution system.
2 Literature Review
In [1], the author has proposed a security framework using location-based security
for protecting the SG infrastructure which is designed based on the algebraic code
based cryptosystems, they chose it for smart grids to create location-based security
applications.
In [2], the authors have done a study on threads on smart grid and solved it
through system engineering and fault management concepts and expanded the
range potential, range behaviors, and outcomes in the grid technologies with fault
tolerance.
In [3], the authors have investigated challenges and security issues in smart grid,
some important issues include privacy issue, identity spoofing, and so on and
challenges such as mobility, scalability, deployment, and so on.
In [4], the author has discussed about the cyber security threats in smart grid and
focused particularly on government grid infrastructures threats and measures to
control and monitor the systems from cyber attacks for smart grid environments.
In [5], the author has done a survey on smart grid cyber security communications
which elaborates the threats and vulnerabilities, solution proposed to these prob-
lems and relies on the system to make smart grid communication secured.
In [7], the authors have proposed a power theft monitoring system using GSM
module and integrated the part used for the project and discussed about it briefly;
the components used to implement for the projects such as sensors, circuits, etc., are
discussed.
3 Proposed Method
Smart grid technologies are the future power grid that functions with the renewable
energy, sensors, and smart meters to provide an efficient power usage and perfor-
mance management [6, 8, 9]. Energy power resource has the highest priority in
every field and thus it makes it as a huge resource and we provide a framework to
manage it and identify the theft in the field of line as shown in Fig. 1.
Energy Theft Identification in Smart Grid 11
This meter has the GSM module which has unique ID given for the customer and
unique GSM number also, which is attached with Arduino board and the board is
connected to the meter and communicates with sensors and sends signal from the
house to the power distributing grid, the meter sends the power consumption level
to power distributing grid in a particular interval of time (for example, every 1 h)
and these values are stored in the server and to get processed, these values are
indexed in the table on the customer id, every usage based on time is stored
separately in another database table. In this way, we know how much power the
customer consumes in a particular interval of time and monitor the power activity of
customer Fig. 2.
Smart line meter which will be placed in the line post of the house where the
connection coming from the line to house is through smart line meter and this meter
communicates to the power distributing grid in the same interval of time as smart
household meter[10, 11]. This SLM will consist of a number of sockets to get input
from the line and output sockets to provide connection to the house, the line number
denotes the customer connected to the concerned port which will be stored in the
server (for example, 1 means the index will be stored), such that all the sockets
readings will be communicated to the Arduino, Arduino will send signal to the
GSM module and the power distributing grid will receive it and store it in database.
3.3 Arduino
The power distributing grid which receives the signal from the SHHM and SLM
stores the power values of the customers such that each power distributing grid
support is providing the service to customer and the data from the smart household
meters (SHHM) and smart line meters (SLM) are indexed in the server to process.
Here, the comparison is done between the received data of SHHM and SLM in
which the line not equalized will be identified and forwarded to the admin where
the line will be easily identified and theft can be prevented.
We have stimulated the GSM module in omnet++ by slotted aloha overload method
and slotted aloha optimal method. While sending the packets to the server which is
the local power distributing grid, the processing and sending time is calculated and
derived in Fig. 5.
Dopo le notizie quasi disperate sul conto della salute del re,
cominciò a spargersi nel campo la notizia della sua convalescenza, e
siccome egli aveva molta fretta di giungere in persona all'assedio, si
diceva che tosto avesse potuto rimontare a cavallo, si sarebbe messo
in viaggio.
In questo tempo, Monsieur, che sapeva che da un momento
all'altro sarebbe stato surrogato nel comando, sia dal duca
d'Angoulème, sia da Bassompierre, o da Schömberg, che si
disputavano il comando supremo, faceva poche cose, perdeva le sue
giornate in tentativi, senza arrischiare qualche grande intrapresa per
scacciare gl'Inglesi dall'isola Re, ove assediavano la cittadella di S.
Martino, e il forte della Prée, nel mentre che dal canto loro i Francesi
assediavano la Rochelle.
D'Artagnan, lo abbiamo detto, era ritornato più tranquillo come
accade sempre dopo un pericolo passato, e quando il pericolo
sembra svanito. Non gli rimaneva che una sola inquietudine, ed era
quella di non ricevere alcuna notizia dei suoi amici.
Ma un bel mattino gli venne tutto spiegato mediante questa lettera
datata da Villeroy.
«Sig. d'Artagnan.
«I signori Athos, Porthos ed Aramis, dopo aver fatta una
buona partita in casa mia, e dopo essersi ben ben rallegrati,
hanno cagionato così gran fracasso, che il preposto del
castello, uomo rigidissimo, li ha messi in consegna per alcuni
giorni. Eseguisco gli ordini che essi mi hanno dati inviandovi
dodici bottiglie del mio vino d'Anjou, di cui mi hanno fatto
grande elogio; essi vogliono che beviate alla loro salute col
loro vino favorito.
«Io l'ho fatto; e sono, signore, con un gran rispetto, vostro
umilissimo, ed obbedientissimo servitore.
godeau.
Albergatore dei signori tre moschettieri.»