{"title":"IoT Based Automated Weather Report Generation and Prediction Using Machine Learning","authors":"Anubha Parashar","doi":"10.1109/ICCT46177.2019.8968782","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968782","url":null,"abstract":"The weather can have great impact on lives. Weather changes can influence wide range of human activities and affect agriculture and transportation. The main aim of this paper is to monitor and report weather conditions so that one is informed beforehand and necessary actions can be taken to reduce the damage by any calamity by forecasting it. Here we are using various sensors in order to collect the data and previous data is used in order to train the system and with current data collection we do the prediction. We will be analyzing temperature, pollutants, humidity and pressure and will predict the weather. Existing models are expensive in contrast to ours and hence it will make monitoring local area feasible as it will be cheaper.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin
{"title":"Smart Forklift to Reduce Accidents","authors":"P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin","doi":"10.1109/ICCT46177.2019.8969024","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969024","url":null,"abstract":"This paper is to design a Smart Forklift model which reduces accident rates. Forklift is a powered industrial truck used to lift and move material over short distance. It is one of the most used machines employed for several types of tasks. Forklift is used on small as well as large scale on multiple locations. Various forklifts are available according to load capacity. Forklifts for general load purpose have capacity from 1 to 5 tons, and that of for heavier loads it has capacity of 50 tons. It has major drawback of severe accidents because of less safety features. To avoid these unwanted accidents, Smart Forklift is introduced, with arduino, gyro sensor, which decreases the rate of accidents and increases the safety of driver as well as vehicle. This design includes a small model which will detect problem whenever Forklift is in danger mode and a security threat indication is sent through a buzzer and light indication to driver.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Distribution of Local Intensity Gradient Technique for View Invariant Gait Recognition","authors":"Tejas.K. Rayangoudar, H. Nagaraj","doi":"10.1109/ICCT46177.2019.8968784","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968784","url":null,"abstract":"The proposed paper investigates the effectiveness of view invariance in gait recognition by implementing HOG behavioral feature extraction technique on CASIA-B and CMU MoBo gait database in which standard HOG (RHOG), circular HOG and MHOG are considered for feature extraction. The effectiveness of each feature is analyzed and compared using SVM based classifier on gait detection of the subject for changing view angle. 25 subjects are considered with 10 different view angles for each subject. Classification is done based on the influence of individual and combination of above mentioned features. In spatial domain, although the RHOG gives better precision in finding the gait with normal view angle, but when the view angles are changed with respect to binning angles of histograms, the CHOG feature gives up to 97% better and consistent classification rate against RHOG. Further MHOG feature analysis is considered to improve classification results up to 100%, thus addressing the rotational invariance problem. The work carried out shows better gait recognition results than the previous researchers for all the view angles.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra
{"title":"Novel Approach to Reduce the Replication of Information and to Increase the Reliability of End to End Data Transmission in WSN","authors":"Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra","doi":"10.1109/ICCT46177.2019.8968785","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968785","url":null,"abstract":"Presently, WSN (Wireless Sensor Network) is the most standard administrations utilized in business and mechanical applications, due to its specialized advancement in a processor, correspondence, and low-control utilization of implanted registering gadgets. As of late a proficient plan of a Wireless Sensor Network has turned into a main zone of research. A Sensor is a gadget that reacts and recognizes some sort of contribution from both the physical or ecological conditions, for example, weight, heat, light, and so on. The output of the sensor nodes is commonly used as an electrical flag that is transmitted to a controller for further handling. Challenging task in WSN configuration is the means by which to spare node energy while keeping up the required network behavior. Any WSN can just satisfy its central goal as long as it is considered alive (till the sensor nodes are alive or battery control exhaustion) however not after that. Once any of the sensor nodes is declared dead, it will not involve in further data transmission process.In this paper a novel approach has been discussed to reduce the replication of information shared by the sensor nodes and to increase the reliability of end to end data transmission.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sensor based Secured Health Monitoring and Alert Technique using IoMT","authors":"Surabhi Joshi, S. Joshi","doi":"10.1109/ICCT46177.2019.8969047","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969047","url":null,"abstract":"A reliable health monitoring system essentially requires real time and continuous monitoring of critical health parameters of the patient and a prognostic approach to generate and send an alert during medical emergency. This paper proposes a sensor based health monitoring technique with adequate security features using Huffman Compression Coding and Rivest Shamir Adleman (RSA) encryption technique. Further, based on a prognostic approach an alert mechanism is developed with embedded software and internet of things. This proposed system is an improved version of existing systems and can be useful for patients on move or in intensive care unit.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar
{"title":"Online CAPTCHA Replacement through Face Detection","authors":"Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar","doi":"10.1109/ICCT46177.2019.8969072","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969072","url":null,"abstract":"The sensitive information stored on the internet should not be easily accessible by any unauthorized personnel, it should be readily available only to the authorized people. Thus integrity, security and confidentiality need to be maintained. There needs to be a security check before any kind of access is granted to any kind of sensitive information. CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a popular way for authenticating a user. The main goal of any technique is to recognize whether it is a human who is accessing the content or a robot via some recognition techniques. The advancement in recognition technologies has enabled humans to develop bots which can now bypass common authentication techniques which have been in use for a long time. CAPTCHA has been in use since a very long time and has some serious drawbacks. Facial recognition alongside with artificial intelligence can overcome drawbacks like difficulty in solving, ambiguity, and sometimes easy prey for trained bots of CAPTCHA and can easily replace it.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur
{"title":"A Survey of Botnet in Cyber Security","authors":"Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur","doi":"10.1109/ICCT46177.2019.8969048","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969048","url":null,"abstract":"Botnets is one of the most critical cyber security threats that confronted by organizations day by day. Botnet has used distinctive strategies, topologies and communication protocol in specific levels in their life cycle. Identifying of botnets has emerged as a very challenging topic, particularly for the reason that they can improve their method at any time. Nowadays, most of the recent botnet detection techniques cannot locate modern botnets in an early stage. Mainly, botnets follow command and control infrastructure. Nowadays, botnet is an interesting and very vital research topic for researchers in our cyber security. This Paper represents a completely comprehensive evaluation that extensively discusses the botnet problem; this survey classifies all of the possible botnet detection methods, also summarizes previously published studies and recent works.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Object Classification and Detection Methods to Mitigate Power Utilization","authors":"S. Talokar, Gajrajsingh Narde, Mohit Chaudhari","doi":"10.1109/ICCT46177.2019.8969025","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969025","url":null,"abstract":"Now a day’s computing technology being grows rapidly so that object detection or identification is crucial in industry. The object detection is a technology related to computer perception and image processing for detecting samples of items to certain shapes in digital images and videos. The ultimate aim of object detection is segmenting the area of notified from a moving spot and to detecting of its motion, place and blockage. The Pattern recognition and classification introduced the pace for recognition of an object in sequence of images. This paper describes the different object detection, object classification methods including the analysis and comparative investigation of various methods and techniques useful for tracking the objects. Along with these the paper gives short idea about energy saving in industry by having application if image or video processing.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Design and Simulation Model of Coherent Optical DQPSK Modulation Technique for Long-Haul Communication","authors":"Naresh Sothuku, V. A., Hemavathy Muthusamy","doi":"10.1109/ICCT46177.2019.8969026","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969026","url":null,"abstract":"Coherent communication technologies extensively is used for high speed optical communications because it is tolerant to many dispersions like polarization mode dispersion (PMD) tolerance, chromatic dispersion (CD) mitigation, and provide high spectral efficiency. Coherent detection technique has the nature of preserving the phase information of the received optical signal. In DQPSK (Differential Quadrature Phase-Shift-Keying) format modulation, each symbol transmits 2 bits so that the symbol rate is half the bit rate, with reduced complexity of the system compared to QPSK. The biggest advantage of this coherent optical modulation DQPSK compared to QPSK is that it requires no optical phase lock loop at the receiver as the information is encoded in the differential phase. However, the transmitter requires an extra precoder component to map information in the differential phase. In this paper, the digital coherent DQPSK working principles and typical system design of optical communications is been explained and the simulation experiment shows the feasibility to transmit 20-Gb/s DQPSK signals with channel bandwidth of 10 GHz over more than 100 km. With that spectral efficiency improved by 2 bps/Hz. Also, this paper discusses about detailed simulation set up and various results of 20Gbps coherent DQPSK generated through simulation software.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication","authors":"Nisha Vishwakarma, Vinod Patel","doi":"10.1109/ICCT46177.2019.8969040","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969040","url":null,"abstract":"Recognition of iris is basically a technique used by taking out the mathematical forms biometrically over any video-based images either of the eyes that consists of complex pattern which are exclusive and static in nature. Iris is a favoured biometric feature equated to supplementary biometrics due to its specificity and constancy characteristics. The first developed systems are often relied on bad edge recognition methods and filters. Various Recognition methods like Canny Edge Detection, Huff Transform, Gabor Filters, Dagman’s Operator Iris, are often utilized in the arena. There are some confines in the form of complex computational tactics, lack of precision for the images that contains complex noise, impediment due to lens, lashes of eyes and reflection observed in pre-work. The structure proposes a recognition of an iris or a validation system utilizing the method of Sobel Age Detection for the extraction of Iris feature. The tactic also evidences that the figurative depiction efficiently handles noise and declines, considering low resolutions, specular reflections and features that creates obstacle in the eye. The proposed system delivers improved safety results with the exact feature extraction here.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}