{"title":"HOMER Based Optimization of Solar-Wind-Diesel Hybrid System for Electrification in a Rural Village","authors":"Suresh Vendoti, M. Muralidhar, R. Kiranmayi","doi":"10.1109/ICCCI.2018.8441517","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441517","url":null,"abstract":"Electrification of rural and remote areas with limited or no access to grid connection is one of the most challenging issues in developing countries like India. As a result of the recent issues regarding the global climatic change and reduce fuel costs, finding out reliable, ecological friendly renewable energy sources to satisfy the rising energy demands has become important. The government of India initiated a large number of schemes for encouragement of renewable energy for power generation and to create energy options like coal, oil etc. Keeping these initiatives in mind, the present study is focused on optimization of hybrid (solar-wind-diesel) renewable energy systems in rural remote village Indiganatha in Chamarajanagar District of Karnataka State, India. The objective of the study is to minimize the total net present cost of generation and cost of energy using HOMER pro software. Sensitivity analysis is also carried out that helps to assess the effect of uncertainty or changes within the variables and finding the most optimal solution for hybrid energy system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123525668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity and SNR Analysis of a Millimeter Wave Cellular Network with Phased Antenna Array","authors":"G. Aruna, Sabyasachi Bhattacharyya","doi":"10.1109/ICCCI.2018.8441248","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441248","url":null,"abstract":"Channel capacity of a Millimeter(MM) wave cellular network employing phased antenna array (uniform linear antenna array) and the array output signal to noise ratio is analyzed. Millimeter wave as the name indicates working on a very high frequency band 28, 38, and 72 GHz bands results in antenna size in millimeter. Therefore the antennas are integrated on chip and they are also steerable to achieve very high capacity. In millimeter wave directional antennas are used with beam steering to achieve high data rate and high capacity. The data rate increases 40 times more than the off chip or external antennas. In this paper channel capacity is analyzed for a uniform linear array and a planar array antenna structure with beamforming and beamsteering.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129697518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Physical Layer Attack in Cognitive Radio - A New Approach","authors":"J. Avila, S. Prem, R. Sneha, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441214","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441214","url":null,"abstract":"With the improvement in technology and with the increase in the use of wireless devices there is deficiency of radio spectrum. Cognitive radio is considered as the solution for this problem. Cognitive radio is capable to detect which communication channels are in use and which are free, and immediately move into free channels while avoiding the used ones. This increases the usage of radio frequency spectrum. Any wireless system is prone to attack. Likewise, the main two attacks in the physical layer of cognitive radio are Primary User Emulation Attack (PUEA) and replay attack. This paper focusses on mitigating these two attacks with the aid of authentication tag and distance calculation. Mitigation of these attacks results in error free transmission which in turn fallouts in efficient dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Jayarajan, S. Thenmozhi, R. Maheswar, S. Malathy, Udaiyakumar Ramamoorthy
{"title":"Smart Cloud Enabled E-Waste Management System","authors":"P. Jayarajan, S. Thenmozhi, R. Maheswar, S. Malathy, Udaiyakumar Ramamoorthy","doi":"10.1109/ICCCI.2018.8441476","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441476","url":null,"abstract":"Electronic waste (E-waste) comprises waste electronics/electrical goods that are useless. This includes computers, servers, monitors, and so on. E-waste contains toxic substances, such as lead and cadmium in circuit boards, lead oxide and cadmium in monitor (CRTs), mercury in switches which are highly hazardous. In this paper, we propose a monitoring system for e-waste dump yards through smart phones. This is an initiative to do things for the wide scope e-waste management. We use the morphological operations in image processing to determine the area covered by e-wastes, which can be monitored by the end user through the dedicated android application.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132881472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Babu, R. H. Kumar, P. Sampath, P. Bhuvaneshwari, M. Dharanya
{"title":"Analysis of Conscious Alert System from EEG data using LabView","authors":"C. Babu, R. H. Kumar, P. Sampath, P. Bhuvaneshwari, M. Dharanya","doi":"10.1109/ICCCI.2018.8441260","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441260","url":null,"abstract":"The major causes of road accidents are driver drowsiness and driver inattention. There is a need for a system that can alert the driver on time, whenever he is drowsy or inattentive. This paper presents an analysis of Conscious Alert System (CAS) to find out classification in alert or non-alert system using Electroencephalogram (EEG) data. Monitoring and analyzing driver behavior are needed for safe driving. In this work, we aim to develop a system that can detect alert system based on the False Negative and False Positive using LabVIEW.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for Student Data Privacy and Consent","authors":"Shlok Gilda, Maanav Mehrotra","doi":"10.1109/ICCCI.2018.8441445","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441445","url":null,"abstract":"Current methods for obtaining data consent from legal guardians are limited to paper forms and human data entry. While this classic method of granting consent is familiar to the parties involved, it involves little accountability or ongoing access oversight. Parents are asked to sign multiple permission forms, but are not given an efficient manner by which they can differentiate between fields for consent nor keep track of usage. Blockchain technology represents a promising approach for developing ‘smart contracts', digital promises to be executed without reliance upon a legal intermediary. Utilizing Hyperledger Fabric and Hyperledger Composer, we propose a framework of nested authorization, allowing a public school data administrator the ability to grant authorization rights to a third party afterschool intervention program and their volunteers, who meet with parents and obtain consent for data access rights relying on smart contracts. These data consent signatures allow researchers the ability to design targeted inventions, meeting the needs of the community.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantification of Serum Protein using 2D Electrophoresis Image","authors":"Shanmuga Sundari Natesan, Perumalraja Rengaraju","doi":"10.1109/ICCCI.2018.8441249","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441249","url":null,"abstract":"Serum Protein Electrophoresis is a widely used test to identify the presence of various Serum proteins such us, Albumin, Alpha, Beta and Gamma. In electrophoresis testing, charged protein molecules are moved in an electric field according to their size and weight. When a unique gel component is added with serum as a color die that generates an image on a glass plate. This electrophoresis image is used to quantify as well as analyze the various proteins using image processing technique. We propose an image processing framework to detect the various protein bands and length, also quantification of each band. The software was fully developed in MATLAB, which consists of three stages. In the first pre-processing stage, un-sharpening filter is used to enhance the frequency components of image. Next, Multidimensional filter is used in second stage for edge correction. Savitzky-Golay filter is used in third stage to smooth out the noisy signal. Finally, quantification of each protein band is done by manually. Obtained total protein and albumin of various Serum samples are compared with traditional test results, where they are very closer or the same.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sweta V Parvati, K. Thenmozhi, P. Praveenkumar, S. Sathish, Rengarajan Amirtharajan
{"title":"IoT Accelerated Wi-Fi Bot controlled via Node MCU","authors":"Sweta V Parvati, K. Thenmozhi, P. Praveenkumar, S. Sathish, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441215","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441215","url":null,"abstract":"Internet of Things (IOT) is the next industrial revolution which is used to automate simple tasks and reduce man power. A Wi-fi Bot is designed using node Microcontroller Unit (MCU). Data in the form of string will be transferred through Internet protocol (IP) address. Arduino Integrated Development Environment (IDE) is used to program the node MCU. Five devices can access control this node MCU at the same time. Message Authentication Code Identity (MAC ID) of the connected devices is displayed in the display device. This device can be used to control the vacuum cleaner, carry goods in airports and patients can access their wheel chair without aids.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pyramid-based Image Interpolation","authors":"R. Sujee, S. Padmavathi","doi":"10.1109/ICCCI.2018.8441313","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441313","url":null,"abstract":"A technique for better reconstruction of a distorted region in an image using Pyramid-based image interpolation is presented in this paper. The central idea is to construct the image pyramid, so that the apex of the pyramid has a minimized distorted region. The reconstruction of the original image starts from the apex of the pyramid. Each time, the pixels in the distorted region are recovered using bilinear interpolation technique. Since the distorted pixels in the image at the apex of the pyramid have maximal undistorted neighbors, the accuracy of reconstruction is enhanced. Thus the bottom-up approach proposed by this paper results in improved image reconstruction when compared to top-down technique due to the above mentioned higher availability of un distorted pixels in the neighborhood of a distorted pixel.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis Technique to Detect Ransomware Threat","authors":"S. Mukesh","doi":"10.1109/ICCCI.2018.8441502","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441502","url":null,"abstract":"The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123192254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}