2020 Global Conference on Wireless and Optical Technologies (GCWOT)最新文献

筛选
英文 中文
IoT Based Technique for Household Rainwater Harvesting 基于物联网的家庭雨水收集技术
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391634
Gaurav Verma, Shubhangi Gupta, Rohan Gupta
{"title":"IoT Based Technique for Household Rainwater Harvesting","authors":"Gaurav Verma, Shubhangi Gupta, Rohan Gupta","doi":"10.1109/GCWOT49901.2020.9391634","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391634","url":null,"abstract":"In this paper, a more efficient way of rainwater harvesting is proposed. Due to vast globalization, urbanization and modernization the quality of our surroundings is degraded, which in turn, affects the natural phenomenon of rains too. The burning of fossil fuels at a vast level, the fumes from the exhaust of automobiles and oil refineries lead to the formation of toxic gases like sulphur dioxide, carbon monoxide, nitrogen dioxide etc. These gases get transported by air and wind currents. Sulphur dioxide and nitrogen dioxide mixes with water and other material to form sulphuric acid and nitric acid and cause acid rain. The problem in harvesting rainwater arises here as this water is not suitable for use and storing it in the same reservoir in which the water of slightly better quality get stored, can lead to degradation of that water too. Using technological enhancements this problem can be dealt with. As we know the filtration processes is quite expensive, so if we can check the quality of water before storing it into reservoir or sending it to ground water table. It would be easier to decide for what purpose we can use the harvested water and also we can save the groundwater from getting polluted by the acid rainwater.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Statistical and Similarity Features Based Recognition of Offline Characters 基于统计和相似特征的离线字符识别
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391614
Deval Verma, Gaurav Verma, C. Tan, Wisetsri, Yannakorn Toprayoon, Thanyanant Chansongpol
{"title":"Statistical and Similarity Features Based Recognition of Offline Characters","authors":"Deval Verma, Gaurav Verma, C. Tan, Wisetsri, Yannakorn Toprayoon, Thanyanant Chansongpol","doi":"10.1109/GCWOT49901.2020.9391614","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391614","url":null,"abstract":"This paper uses a blend of similarity and statistical based features for the recognition of offline alphabetic characters in noisy and noiseless environment. The complete representation of the characters is based on the combination of these two different families of features and recognition by different classifiers. The main strategy is to extract complementary similarity measure (CSM) as a feature vector and combined with grey level co-occurrence matrix (GLCM) features. A standard dataset is taken into consideration and recognition is done by artificial neural network (ANN), support vector machine (SVM), Naïve Bayes (NB) classifier and random forest (RF) classifier. The highest average recognition accuracy of all characters is recorded as 94.05% using RF in noiseless environment. In noisy environment, the highest accuracy is recorded as 75.8% by neural network. The analysis proves that the combination of feature works on various types of printed characters in noisy and noiseless environment irrespective of the font of characters.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125822358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing of three regions de-blocking filters in BDCT coded images at low bit rate 低比特率BDCT编码图像中三个区域去块滤波器的设计
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391623
Anudeep Gandam, J. S. Sidhu
{"title":"Designing of three regions de-blocking filters in BDCT coded images at low bit rate","authors":"Anudeep Gandam, J. S. Sidhu","doi":"10.1109/GCWOT49901.2020.9391623","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391623","url":null,"abstract":"Compression of images and video frames at a low bit rate significantly degrades the visual quality decoded with JPEG and MPEG standards. This paper focuses on an efficient pre and post-processing technique to address and rectify the blocking artifact. This method differentiates the blocked images or frames into different regions based upon the activity function. It efficiently removes the artifacts while preserving the edge details with the help of different adaptive filters. The proposed technique is implemented on various images and videos and results are compared with multiple existing methods using performance metrics like SSIM and GBIM. The simulation results show significant improvement in subjective quality for different images and video frames. It outperforms existing de-blocking methods","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"26 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Encryption Scheme Based On Adaptive System 基于自适应系统的数据加密方案
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391622
Shaheryar Najam, Mujeeb ur Rehman, Jameel Ahmed
{"title":"Data Encryption Scheme Based On Adaptive System","authors":"Shaheryar Najam, Mujeeb ur Rehman, Jameel Ahmed","doi":"10.1109/GCWOT49901.2020.9391622","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391622","url":null,"abstract":"World has evolved into digital hub, lots of digital data such as images, videos, text and audio signal are transmitted over the internet. Due to increase in this multimedia communication, there has been a rapid increase in requirement of encryption of these data. Various encryption scheme has been proposed to make these multimedia communications more and more secure. In this paper, a new approach of adaptive system has been presented. Adaptive system previously used for prediction, noise removal and system identification has been deployed to encrypt data and results have shown, adaptive system can be used to encrypt signal with high rate of randomness in encrypted signal. Furthermore, randomness can be enhanced by changing the desire signal.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Collection and Analysis of Manufacturing Test Sites Data for Electronic Products 电子产品制造试验场数据的收集与分析方法
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391597
Atif Siddiqui, P. Otero, Muhammad Yousuf Irfan Zia, J. Poncela
{"title":"An Approach for Collection and Analysis of Manufacturing Test Sites Data for Electronic Products","authors":"Atif Siddiqui, P. Otero, Muhammad Yousuf Irfan Zia, J. Poncela","doi":"10.1109/GCWOT49901.2020.9391597","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391597","url":null,"abstract":"Manufacturing industry plays an important role in the development of a country by providing employment to its skilled and semi-skilled workforce. Companies focus on maintaining a good standard of their products which can be achieved through manufacturing test. In order to compete with similar companies, the manufacturing companies need to have an optimized electronic product testing system. Products are tested for manufacturing faults and functionality to maintain quality control which is a continuous process. It can be achieved through a process where manufacturing test data is collected and analyzed. In this paper a LabVIEW based application is presented for collection and analysis of manufacturing test site data. The data collected is for low and mid volume batch-size for a month, where a weekly analysis is normally done. The application provides a standard approach based on graphical analysis to review data trends and provide recommendations to the manufacturing organizations for cost reduction, increased first time yield, training requirements for the operators etc. Initial results obtained using the application show that the proposed approach is efficient and reliable for test site data collection and analysis of variety of products.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Key Management and Lightweight Cryptography for IoT 物联网密钥管理和轻量级加密技术综述
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391613
Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan
{"title":"A Review on Key Management and Lightweight Cryptography for IoT","authors":"Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan","doi":"10.1109/GCWOT49901.2020.9391613","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391613","url":null,"abstract":"Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Smart Projector with Wireless Mouse 带无线鼠标的智能投影仪
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391606
Dur-e-Jabeen, A. Haseeb, Aashir Ali, Hamza Saleem
{"title":"Smart Projector with Wireless Mouse","authors":"Dur-e-Jabeen, A. Haseeb, Aashir Ali, Hamza Saleem","doi":"10.1109/GCWOT49901.2020.9391606","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391606","url":null,"abstract":"This work is based on image processing using Raspberry pi 3 through Python programming that is interfaced with OpenCV tool and the processed image captured by camera. Haar cascade algorithm is available in OpenCV. It is used to process the image with Haar classifier that creates black spot on presenter face by considering distance and position to safe eyes by picking the coordinates as breadth, width, length and height. This black spot prevents the eyes from high intensity light beam of projector. The size of the black spots varies and continuously generated as presenter moves in front of projector. This does not affect the information displayed on projector screen. If two (or more) presenters are sharing the same projector, the eye protecting black spots are generated accordingly. Moreover wireless air mouse is incorporated in this project to detect the mouse movement using image processing. Cursor will move through laser device and click status will transmit to Raspberry pi via Bluetooth. Presenter can easily use the wireless mouse from the distance for presentation. It will be considered that this project prevent the eyes of presenter as well as reduce the size and power consumption from relatively available projectors attached with PC because of this project is embedded on Raspberry pi.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks 水下传感器网络的地理和协作机会路由协议
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391632
Sarang Karim, F. Shaikh, B. S. Chowdhry, P. Otero
{"title":"Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks","authors":"Sarang Karim, F. Shaikh, B. S. Chowdhry, P. Otero","doi":"10.1109/GCWOT49901.2020.9391632","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391632","url":null,"abstract":"Underwater Sensor Networks (UWSNs) are capable to explore the many unrevealed natural resources beneath the water, such as lakes, ponds, rivers, seas, and oceans. But there are so many challenges to be faced during the design of UWSN system due to the random nature of water waves. But, perhaps the most significant challenge in UWSNs is how to relay packets efficiently with minimum energy cost to the surface sink. This can be achieved by employing geographic and opportunistic routing schemes to transfer the packets at the surface sink reliably in cooperation with relay nodes. Considering these issues, we design a new routing protocol, called the Geographic and Cooperative Opportunistic Routing Protocol (GCORP), where data packets are routed from source node to the surface sink with the aid of relay nodes. In GCORP protocol, initially, a relay forwarding set is being determined by the source node on basis of depth data, then we use a weighting scheme to choose the best relay node from the relay forwarding set. The weight calculation is performed on normalized energy, packet delivery probability, and normalized distance of the forwarding node to the known surface sink. The main purpose of developing the GCORP protocol is to provide an effective solution for UWSN routing by improving the network metrics. We perform extensive simulations in NS-3 to validate the outcomes of GCORP protocol and compared them with other routing schemes with respect to packet delivery ratio, end-2-end delay, network lifetime, and energy consumption. The simulation results reveal that the GCORP protocol outperforms the existing approaches.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IOT Based Real Time Health Monitoring System 基于物联网的实时健康监测系统
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391589
Khan Abdul Moid, P. Otero
{"title":"IOT Based Real Time Health Monitoring System","authors":"Khan Abdul Moid, P. Otero","doi":"10.1109/GCWOT49901.2020.9391589","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391589","url":null,"abstract":"Our daily life is tough and full of problems, one of the most difficult task for this generation is to stay healthy. This can be achieved by inducting state of the art health monitoring system. Our aim is to provide affordable and effective solution of monitoring patient's health from anywhere in the world. In this paper, Raspberry Pi and Internet of Things (IoT) are used. Raspberry Pi is interfaced with multiple sensory sources that provide continuous data and limits the human error. The acquired data is transmitted and acquired by the data center, where it can be stored for later use and updates regularly. It also alerts the concerned physician or doctor for any kind of abnormality if it occurs. The aim of the proposed system is to monitor all patients located anywhere on the globe, which can easily be achieved by making the data available on a website. The propose system is inexpensive and provide an effective solution for the health monitoring tasks, it also reduces the communication gap between the doctor and the patient","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Crop Disease Diagnosis using Deep Learning Models 利用深度学习模型进行作物病害诊断
2020 Global Conference on Wireless and Optical Technologies (GCWOT) Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391605
Waleej Haider, Aqeel Ur Rehman, Ahmed Maqsood, Syed Zurain Javed
{"title":"Crop Disease Diagnosis using Deep Learning Models","authors":"Waleej Haider, Aqeel Ur Rehman, Ahmed Maqsood, Syed Zurain Javed","doi":"10.1109/GCWOT49901.2020.9391605","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391605","url":null,"abstract":"Diseases and pesticides are the most common problems of wheat being faced by the farmers. These are commonly formed due to improper land preparation, unconditional rains, variable climate conditions, and irregular watering. The impact of these factors on the wheat crop could ultimately affect the economy of the country. Timely detection of the diseases could avoid many financial and time-based losses and help in applying relevant disease management methods. The old manual methods of detecting the diseases are based on personal observations. These have not much contributed due to: a) High frequency of errors, b) Time consuming, c) In case of detecting the large area of the crop by the humans, the observation may not be accurate, d) Risk of spreading disease while applying manual methods. User-friendly applications with self-learning ability are primarily required to help the farmers to deal with the disease problems. In this paper, an effective and efficient approach has been presented for the timely diagnosis of wheat disease and to provide relevant management methods. This user-friendly application facilitates various types of users in the management of crop diseases. The data set has been obtained from online sources and Convolutional Neural Network (CNN) has been used to train the data. The proposed approach has gained significant accuracy in the detection of diseases.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信