{"title":"Distracted Driver Detection using Stacking Ensemble","authors":"Ketan Ramesh Dhakate, Ratnakar Dash","doi":"10.1109/SCEECS48394.2020.184","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.184","url":null,"abstract":"Distracted driving is one of the primary causes of car crashes. While driving the vehicle, drivers frequently perform secondary activities that distract driving. A decrease in driver distraction is a critical aspect of the smart transportation system. To decrease accidents and improve safety, this paper proposes a distracted driver detection system that classifies various types of distracted activities using ensemble techniques. Different convolutional networks had been trained on images by eliminating the final layer to get there feature vectors. By using the stacking ensemble technique, we stack all the feature vectors to train it on a convolutional network. This stacking technique, which is used to detect the distracted driver posture, achieves 97% accuracy. The study shows how models predict the desired classes. The model proposed in this paper can be used in a real- time environment to detect activities done by the driver.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Card For Various Application In Institution","authors":"Navin Jesani, Nishant Gupta, Somya Bhatt, Puja Singh, Ankit Saxena","doi":"10.1109/SCEECS48394.2020.26","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.26","url":null,"abstract":"For every different purpose a different card is present and at a time it becomes difficult to handle all these cards especially for the students, who just wish to carry a single card which can serve all the purposes. This paper aims to design a student card system for an institute using smart card technology that can be usable in the attendance, payment, and automation of class. The smart card will be used as a means for identification, automation, and payment. This paper proposed design multipurpose smart card to create identity card, payment transactions and automation of class. The smart card has a barcode that is unique for every card assigned to the student. The smart card does not save data directly in the smart card but in the server for the account-based system. This design would increase the transaction speed and also keep to secure the transaction process.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Chipless RFID tag using a Modified Swastik-shaped Resonator for UWB band Applications","authors":"Priyabrata Sethy, Durga Prasad Mishra, Tanmaya Kumar Das, S. Behera, Pransu Prakash Sahu, Mandipa Acharya","doi":"10.1109/SCEECS48394.2020.152","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.152","url":null,"abstract":"Chipless radio frequency identification (RFID) is one of the major technology in real-time wireless applications. In this paper, an approach has been taken to generate a specific band for the communication of various wireless sensors. The proposed chipless RFID tag is designed for 3.5 GHz and 7.9 GHz frequency bands owing to obtain wireless communication in ultrawideband (UWB) frequency range. In this work, we focused to improve the magnitude of radar cross section (RCS) by using a modified Swastik-shaped geometry. The proposed tag has an overall dimension of 19× 16× 1.6mm2 and is found to be suitable for UWB applications.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"55 34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Game Theory based Fault Tolerance Routing Scheme for Wireless Sensor Networks","authors":"Alpi Tomar, P. Chanak","doi":"10.1109/SCEECS48394.2020.132","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.132","url":null,"abstract":"Wireless sensor networks (WSNs) have become a key technology in numerous applications such as health monitoring, environmental monitoring, irrigation facilities management, underground communication, and monitoring systems. In this network, sensor nodes are likely to fail due to energy exhaustion, software failures, hardware malfunctions, etc. One of the main challenges in WSNs is fault tolerance. The present fault tolerance schemes either use additional energy to diagnose and recovery or need to use further resources. This paper proposes a game theory-based clustering method for fault tolerance in wireless sensor networks. In the proposed scheme, non-cluster head nodes pick a limited number of targets in the data transmission. Thus it expends less energy. The results obtained from the simulation show that the proposed scheme outperforms the existing solutions in terms of the dissipation of energy, the number of active nodes and the number of dead nodes.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Prajwal, P. Vaishali, Z. Payal, Dhapudkar Sumit
{"title":"Food Quality Detection and Monitoring System","authors":"A. Prajwal, P. Vaishali, Z. Payal, Dhapudkar Sumit","doi":"10.1109/SCEECS48394.2020.175","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.175","url":null,"abstract":"Food plays a very important role in our day to day life. With an increase in globalization quality of food decreases day by day. In most of the time various food processing is done to keep the food fresh. Various preservatives or the ingredients are added in the food so that it looks like fresh or tempting. Now most of the food is preserved with the chemicals which causes the food contamination. This contamination leads to various diseases which results that the consumer want healthy food. The people wants organic food for healthy lifestyle. So to avoid the problems associated with the food without human interpretation we need such a device which helps to determine the quality of food. There is a requirement of such a device which guide us about the hygienic food. Hence to fulfill this consumer demand we made a device that checks whether the quality of food is good or bad. This paper represents the use of various sensors in the field of the food industry. The sensors like pH sensor, gas sensor, temperature sensor help in identifying the condition of food. This system makes an effective presence in restaurants, households, small scale industries.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Robot for Inventory Management in Libraries","authors":"Rushad Mehta, Abhay Sahu","doi":"10.1109/SCEECS48394.2020.18","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.18","url":null,"abstract":"This paper proposes an autonomous robot to reduce labor, increase the efficiency of existing inventory management systems and provide a solution to develop an automated inventory. Managing a college library comes under inventory management. Like an inventory management system, the library also faces problems with the availability of books. For example, when a book gets returned, the database gets updated and indicates that the book is available, but one cannot find the book in its location as it has not been placed there. The time and energy of the librarian are wasted as the books have to be placed back to its location. These problems are solved by designing an inventory management robot that is implemented in a library to put the returned books back to its location. The returned books are placed on the shelves of the robot. The robot scans the Radio Frequency Identification (RFID) tag of books to get the shelf location of the books and then navigates through the library to the location where the book should be and places the book on its shelf thus making the book available quickly. The innovation of this system is that since it works in a known environment, it does not run on complex SLAM techniques, thus reducing the complexity of the system while being relatively flexible. This implementation also does not require any significant changes to be made to its environment.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Mishra, D. Patel, Tamanna Singh, Abhijeet Singh, S. Gawre
{"title":"Garbage management with Smart trash using IoT","authors":"Ankit Mishra, D. Patel, Tamanna Singh, Abhijeet Singh, S. Gawre","doi":"10.1109/SCEECS48394.2020.98","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.98","url":null,"abstract":"The waste produced day to day seems to be unstoppable, from small scale to large scale it is increasing constantly. From different sources we come to know that we don’t have proper dumping and disposing mechanism. These are due to lack of technology usages and bad management towards waste disposal. People also do not take it seriously because either they are not aware or not taking responsibility regards it. To reform the current scenario, we have proposed model of Smart Trash. Here, we made system automatic so that human need not to put extra effort, except dumping garbage in the trash. Also, we proposed management system where if trash is full and it is not made empty on time, message will be delivered to concern authorities. In order to involve more participants, there is reward system i.e., if person use the trash properly such people will be benefited with some reward points that can be redeemed through the shop. This is not only the beauty of proposed model but it also attracts more people and create an effective waste management system. We have also installed display system where different type of advertisement can be displayed, that will generate revenue and spread message among users to use it frequently and positively.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Very Novel Design and Mutual Coupling Analysis of a Wideband, Tightly Arranged DP massive MIMO (32T and 32R) Antenna Array for 5G Base Station Application","authors":"Roja Vadlamudi, D. Sriram Kumar","doi":"10.1109/SCEECS48394.2020.174","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.174","url":null,"abstract":"A Wideband, Tightly Arranged DP Massive MIMO (32T and 32R) Aerial Array for 5 G Base Station Application is provided with Very Novel Architecture and Mutual Coupling Analysis. The dual polarization is achieved by placing two chamfered aerial bow-tie dipole elements in orthogonal orientation and being fed with two coaxial cables. The design consists of chamfering the two arms of bow-tie aerials that enhance port isolation to port. The pattern of unidirectional radiation is obtained by placing a metal ground plane at a distance of λ/4. The radiating components are designed for operation at 3.5 GHz. Simulated tests of the expected dual-polarized chamfered aerial bowtie show a sub-6GHz bandwidth (2.84.0 GHz) with VSWR < 1.5. Isolation between the two ports is-27dB and reciprocal coupling is around-25 dB and for both the polarization a gain of 9.1dBi is observed. The aerial overall height is 0.25λ0 and the design is simple and easy to manufacture. This Aerial is thus the most suitable for future 5G BTS implementations.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subhasish Pandav, T. K. Das, K. R. Samyuktha, S. Behera, G. Sadhukhan, Madhusmita Mohanty
{"title":"Design of Star-Shaped Fractal Antenna for Wideband Applications","authors":"Subhasish Pandav, T. K. Das, K. R. Samyuktha, S. Behera, G. Sadhukhan, Madhusmita Mohanty","doi":"10.1109/SCEECS48394.2020.140","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.140","url":null,"abstract":"A star-shaped modified fractal antenna has been investigated in this article. The proposed design with a wide operating bandwidth can be effective or S-band applications. The fractal design of iteration order 3 provides wide bandwidth in the frequency range of 1.87 GHz to 4.78 GHz. For the validation of the antenna performances prototype of the design has been fabricated. The simulated 2D radiation patterns exhibit omnidirectional characteristics throughout the wide operating band. A maximum realized gain of 3.5 dBi has been achieved at 4.4 GHz. The proposed design with an overall dimension of 70 40 1.6 mm3 can be suitable for wideband applications.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125618920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on the Authentication Techniques in Internet of Things","authors":"Shubham Agrawal, Priyanka Ahlawat","doi":"10.1109/SCEECS48394.2020.86","DOIUrl":"https://doi.org/10.1109/SCEECS48394.2020.86","url":null,"abstract":"The IoT plays a vital role in all aspects of our daily lives. WSN consists of tiny and compact devices, called as sensor nodes, which could be deployed in remote environment to monitor an event. These devices are used to gather data, sense data and process it. A sensor node has the capability to communicate with other sensor nodes through wireless channels. The major concern is the quality of service, which is required for correct data transmission at right time. Due to several attacks, secure transmission is a major concern in WSN application to gather reliable data. These attacks includes traffic analysis, fabrication, disclosure or content and transmission interruption, which are done through node capturing and routing attacks. The main challenge in WSN is to provide strong security along with less overhead to a sensor node. One method of providing security is Authentication. Authentication is the process of confirming that, the information received is correct. The purpose of this chapter is to survey various authentication protocols proposed over different years and analyse them to present a comparative analysis. We shall discuss some of the classification, which includes public-key based, symmetric key based, and dynamic user authentication, lightweight efficient and multi-factor Authentication schemes.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}