{"title":"A Review on Clustering Protocols with Energy heterogeneity in Wireless Sensor Networks","authors":"G. K. Reddy, L. Devi","doi":"10.1109/IC3IOT.2018.8668186","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668186","url":null,"abstract":"In the field of wireless sensor networks (WSNs), several researchers have motivated in the past couple of years because of their potential applications and related challenges, which contain numerous sensor nodes deployed randomly within the field of significance having power constrained. These sensors report data which is sensed from the deployed field to the sink that necessitie high energy usage. The efficient usage of the network energy may be gone by arranging the sensors into sets, called clusters. Cluster Head (CH) and several members of sensor nodes are present in each Cluster but it is more appropriate and economical only when sensor nodes with different energy levels are used. In this paper, we discriminate DEEC, DDEEC, EDEEC, TDEEC, BEENISH, Level-5 and Level-6 protocols on the basis of stability period, network lifetime and throughput of nodes alive during in various level heterogeneous networks.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rawat, Shivam Jindal, Ram Shankar Moorti, Yash Mangal, N. Saxena
{"title":"Change in IT world with the evolution of social media using Big Data","authors":"S. Rawat, Shivam Jindal, Ram Shankar Moorti, Yash Mangal, N. Saxena","doi":"10.1109/IC3IOT.2018.8668165","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668165","url":null,"abstract":"Social media has come to change the way we perceived digital marketing, CRM, SEO and various other fields of IT. From hiring policies to crowd-sourcing campaigns, social media has become very influential. Corporates have also shown keen interest in using social media to achieve their business objectives, since it saves a lot of time, money, manpower and training and resources to handle consumer relations. This paper aims at optimizing the use of social media and analyze the recent trends to recommend the best course of action to manage social media and to use it to achieve corporate goals involving customer interaction.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gitanjali Behera, Saroj Kumar Panigrahy, A. K. Turuk
{"title":"A Biometric based Anonymous User Authentication Technique in Wireless Body Area Networks","authors":"Gitanjali Behera, Saroj Kumar Panigrahy, A. K. Turuk","doi":"10.1109/IC3IOT.2018.8668193","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668193","url":null,"abstract":"The sensor nodes used in wireless body area networks are resource constrained, having limited battery power and memory capacity. Hence, they are not capable of running more complex algorithm to ensure the security. Therefore, designing a light-weight protocol for wireless body area networks which aims to provide maximum security with resource-constrained devices is a tough challenge. In this paper, we propose a light weight biometric-based anonymous authentication technique between the user and the application server in WBAN which preserves the patient’s privacy as well as achieves mutual authentication. In addition, we have given an informal cryptanalysis which ensures that the proposed technique resists different well known attacks.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Firefly Algorithm for Optimizing Hexagonal Antenna Arrays","authors":"K. Kundu, N. Pathak","doi":"10.1109/IC3IOT.2018.8668124","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668124","url":null,"abstract":"The main motive of this paper is to describe the performance of Hexagonal Array (HA) made of isotropic antennas which are uniformly excited and generates directive beam that is of lowest side lobe level (SLL). The firefly algorithm provides an efficient method of optimizing the composite signal of an antenna array. In the present paper algorithm named firefly algorithm is utilized to find best possible excitation in 12-element & 18 element hexagonal array with uniformly distributed antenna elements, such that side-lobe levels (SLL) and first null bandwidth (FNBW) are minimized compared to an antenna configuration with uniform excitation.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Conformal Antenna for Wireless Capsule","authors":"S. Preethiba, S. Brindha","doi":"10.1109/IC3IOT.2018.8668181","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668181","url":null,"abstract":"Ingestible antenna wireless capsule endoscopy is one of the painless, efficient, diagnostic technologies for inspecting the gastrointestinal tract for diagnosing various diseases such as gastrointestinal bleeding, tumors, cancer etc. This wireless capsule can provide a better solution for diagnosing the above diseases. wireless capsule shaped conformal ingestible antenna is designed and simulated. The antenna characteristics such as return loss, gain and directivity with operating at frequency of 2.4GHz has been studied.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133979404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Irrigation System for Agriculture","authors":"S. Rajendrakumar, V. Parvati, Rajashekarappa","doi":"10.1109/ic3iot.2018.8668206","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668206","url":null,"abstract":"The wastage of water without proper knowledge of having irrigation to the crops or plants then we need infrastructure to carry water and even money is also wasted. Automated agricultural watering system saves water by delivering quantity of water requires for the area to irrigate. It also helps to keep the plants in a healthy manner without wastage of water which also saves money. The proposed method helps to protect our community water supply for future generation by using water in an efficient way. In this paper the efforts is to minimize the drawback of traditional agriculture, and to get advanced with the technology which utilizes the water for the production of the crops. To save the important resource which is water, Automated Agricultural Irrigation method is developed using IOT principles. This system makes an attempt to save budget of a farmer by using low cost sensors. The great advantage of smart irrigation is it minimizes the needs for infrastructure which is used for storage to carry water.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. N. D. Duvvuri, Venkata Rajini Kanth Thatiparti, Mounika Kakollu, Sowjanya Swathi Nambhatla, Ravi Vemagiri, Girish Varma Vegesna
{"title":"An Efficient Combined Approach for Sentiment Analysis using SVM and HARN Algorithms","authors":"V. N. D. Duvvuri, Venkata Rajini Kanth Thatiparti, Mounika Kakollu, Sowjanya Swathi Nambhatla, Ravi Vemagiri, Girish Varma Vegesna","doi":"10.1109/IC3IOT.2018.8668196","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668196","url":null,"abstract":"In olden days only MNC companies used to formulate the data and make use of it. But nowadays each and every individual is creating a bulk amount of data and using such a huge data. For example, we have numerous products available in one of the reputed websites viz. Amazon website in which most of the people are buying a vast amount of products and readily provide their esteemed reviews on that particular product. Data is generated as explained above. Google will produce more than 20PB of data, while Facebook generates more than 5PB of messages and so on. Analyzing that huge amount of data is troublesome to humans. To solve this challenging task, sentiment analysis comes into consideration. In our analysis, we have developed an innovative way for finding sentiment analysis at document level by using SVM and HARN’s algorithm. It is proved to be one of the best ways to analyze customer’s opinion on a product at the document level.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sayma Shammi, Sayeed Islam, Hafiz Abdur Rahman, Hasan U. Zaman
{"title":"An Automated Way of Vehicle Theft Detection in Parking Facilities by Identifying Moving Vehicles in CCTV Video Stream","authors":"Sayma Shammi, Sayeed Islam, Hafiz Abdur Rahman, Hasan U. Zaman","doi":"10.1109/IC3IOT.2018.8668135","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668135","url":null,"abstract":"Security of parked cars against theft is a long existing concern where image and video processing can offer solutions. The car owners or parking lot operators are worried about having the vehicles stolen from parking lots, so they use CCTV cameras in parking lots to detect theft. The increased use of CCTV and video surveillance indicates their success as theft deterrents but a major drawback of the system is that non-automated human monitoring of vehicles can have human errors or lapses due to human fatigue. This paper presents an automated way of detecting vehicle theft as it happens. This procedure is based on moving object detection using Canny Edge Detection method and eventually notifying the security personnel or the parking lot operator about the movement. The first step is to detect the edges through Canny method and then finding the edge change ratio to finally determine a movement. Canny is one of the modern Edge detection techniques and choosing this one over other methods is because of the double thresholding and its better performance, which makes the method described in this paper efficient and useful. This paper proves the effectiveness of the described method.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Optimization in Wireless Sensor Network based on Magneto Tactic Bacteria Optimization Algorithm","authors":"E. S. RajaRajeswari, B. Kalpana","doi":"10.1109/IC3IOT.2018.8668126","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668126","url":null,"abstract":"Recent years has witnessed a great development in the application of Wireless Sensor Networks in various sectors. In spite of the numerous advantages exhibited by Wireless Sensor Networks, there are limitations due to the low processing power and limited lifetime. The major challenge is related to the energy expended by sensor nodes. Therefore, energy optimization is a key challenge in this area. In this paper, the Magnetotactic Bacteria Algorithm is used to regulate the cell moment and thereby keep the energy consumption at a minimum in the wireless sensor networks. Experimental results show that such an optimization applied to the routing algorithm results in the better performance when compared with other techniques.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twitter Sentiment for Analysing Different Types of Crimes","authors":"B. Prathap, K. Ramesha","doi":"10.1109/IC3IOT.2018.8668140","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668140","url":null,"abstract":"Online social media like a twitter play a vital role as it helps to track the Spatial-temporal on social media data with respect crime rate. With the very fast evolving of users in social media, sentimental analysis has become an excellent source of information in decision making. Twitter is one of the most popular social networking site for communication and a primary source of information. More than 150 million users publish above 500 million 140 character TWEETS each day. Tweets have become a basis for product recommendation using sentimental analysis. This paper explains the approach for analyzing the sentiments of the users about a particular crime event tweets posted by the active users. The results so obtained will let you know about the change in the public opinion about the crime events whether it’s positive or negative and to find out emotions on different types of crimes.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}