{"title":"Automated Technique for Segmentation of Brain Tumor in MR Images","authors":"Rakshanda M. Mapari, H. G. Virani","doi":"10.1109/ICOEI.2019.8862531","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862531","url":null,"abstract":"Cerebrum Tumor is the unusual or unrestrained cell division within the brain. The remedial problems are serious if tumors are not diagnosed at early stage inevitably most timely examination is necessary. This paper deals with detection of tumor region by Morphological Operators based segmentation approach. It contains upgrade, partition and positioning stages. To extract the tumor region the images are partitioned and order by categorizing them into Benign and Malignant. In case if there are more number of images, doctors could save time by using this approach.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115523087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Data Security Using a Novel Cryptographic Algorithm","authors":"Deep Chhowala","doi":"10.1109/ICOEI.2019.8862523","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862523","url":null,"abstract":"Cryptography is a very good area for R&D today. With each and every new cryptographic algorithm being developed, ways to crack those algorithms are also being developed at a very fast pace. In this paper, I have developed a new cryptographic algorithm, in which a matrix based on the length of words is generated, few operations are performed on this matrix and the resultant matrix obtained, is used for encryption and decryption. Everything in the plain text, including full stops, apostrophe, comma and all the special symbols which have ASCII value from 33 to 126 will be encrypted.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prahlad, Radha Anil Kandakatla, M. Prasanna, Abhinandan Ajit Jugale, Mohammed Riyaz Ahmed
{"title":"Microstrip Patch Slot Antenna Design for WiMAX and WLAN Applications","authors":"Prahlad, Radha Anil Kandakatla, M. Prasanna, Abhinandan Ajit Jugale, Mohammed Riyaz Ahmed","doi":"10.1109/ICOEI.2019.8862578","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862578","url":null,"abstract":"In the world of socially active people, the need for connectivity is growing day by day. Internet which was a luxury few decades ago has now become an obligation. As the idea of shrinking the world with connectivity is intensively being realized, antennas with wider bandwidth and decreased dimensions are extensively required. In this paper, we design a microstrip patch antenna with infinite-loop slot for Wimax and WLAN applications. The antenna works in Super High Frequency (SHF) range and fits in IEEE 802.16 or Fixed WiMAX standard of communication. The infinite loop-slot has been added to increase the band of operation. Coaxial probe feeding technique has been adapted. The antenna is designed and simulated in Ansoft HFFS v.13.0 simulator. A substrate material of RogersRO4350(tm) has been used. The obtained results are verified to suit the requirements and are discussed for various applications.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Counting and Turning Fraction Estimation using Vehicle-to-UAV Co-operative communication","authors":"S. Sreenath, M. Panda","doi":"10.1109/ICOEI.2019.8862725","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862725","url":null,"abstract":"The current roads and supporting infrastructure are often found to be incapable of handling the rapid increase in traffic, leading to congestion and incidents. The availability of accurate and real-time information about the traffic demands may go a long way in designing better traffic control and management systems. Two important quantities of interest for traffic control are the ‘traffic count’ on road segments between junctions and ‘turning fractions’ at the junctions. Together, these two quantities can determine the traffic flow requirements over the road network. The aims of the paper are to investigate the performance of the Vehicle-to-UAV (V2U) communication method for traffic counting and turning fraction estimation using vehicular network simulations and compare with the performance of Bluetooth and loop detectors.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Idris, A. Aibinu, Gokhan Koyunlu, Jaafaru Sanusi
{"title":"A Survey of Modulation Schemes in Visible Light Communications","authors":"S. Idris, A. Aibinu, Gokhan Koyunlu, Jaafaru Sanusi","doi":"10.1109/ICOEI.2019.8862538","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862538","url":null,"abstract":"As the number of internet users continues to increase, the demand for more wireless frequency spectrum has grown significantly over the years. Given the limitations in Wireless Fidelity (WiFi) networks, it becomes evident that the current frequency allocation schemes cannot meet the needs of increasing higher data rate devices. Visible Light Communication (VLC) has emerged as one of the promising technologies to address the spectrum crunch and other anomalies associated with WiFi networks. VLC provide high-speed, secure and reliable data communication using Light Emitting Diode (LED). This paper reviews the various modulation schemes suitable for VLC networks. Furthermore, performance analysis of these schemes in terms of normalized power requirement, Signal to Noise Ratio (SNR), spectral efficiency, dimming factor and Bit Error Rate (BER) are discussed. Finally, applications of VLC are presented.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection Using Machine Learning approaches: A systematic Review","authors":"Syed Ishfaq Manzoor, Jimmy Singla, Nikita","doi":"10.1109/ICOEI.2019.8862770","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862770","url":null,"abstract":"The easy access and exponential growth of the information available on social media networks has made it intricate to distinguish between false and true information. The easy dissemination of information by way of sharing has added to exponential growth of its falsification. The credibility of social media networks is also at stake where the spreading of fake information is prevalent. Thus, it has become a research challenge to automatically check the information viz a viz its source, content and publisher for categorizing it as false or true. Machine learning has played a vital role in classification of the information although with some limitations. This paper reviews various Machine learning approaches in detection of fake and fabricated news. The limitation of such and approaches and improvisation by way of implementing deep learning is also reviewed.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Job Scheduling in Fog Computing","authors":"R. Elavarasi, S. Silas","doi":"10.1109/ICOEI.2019.8862651","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862651","url":null,"abstract":"The evolution of the Internet of things(IoT) has led to a massive number of intelligent devices. The tremendous increase in the IoT devices has also led to a huge amount of data transfer to the cloud that in turn increased location awareness, lack of mobility support and latency. Latency plays an important part in critical applications using cloud computing that led to a significant amount of degradation in performance. To overcome the issues due to the increase in data, fog computing was introduced. Fog computing is also called edge computing, which can address certain challenges like security, reliability, resource management, programming models, and job scheduling. This survey paper starts with the definition of fog computing followed by fog applications, prevailing issues as well as research on fog computing and also shed some light on how useful are these in the future of fog computing.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126853603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Fractional Order based Super Twisting Algorithm for BLDC motor","authors":"G. Venu, S. Kalyani","doi":"10.1109/ICOEI.2019.8862677","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862677","url":null,"abstract":"This paper presents a chattering free fractional order sliding mode controller known as Fractional Order based Super Twisting Algorithm (FOSTA) proposed for BLDC motor. An analysis of second-order sliding-mode algorithms, specially of super-twisting algorithm is performed. Simulations are performed under various operating modes and performance of the controller tested on the dynamic model of BLDC motor using matlab-simulink. The performance of the FSOSMC compared to conventional PI controller.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127188456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding Sensitive Association Rules Using Modified Genetic Algorithm: Subtitle as needed (paper subtitle)","authors":"Janki Patel, Priyanka J. Shah","doi":"10.1109/ICOEI.2019.8862644","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862644","url":null,"abstract":"Association Rule Hiding is the Data Mining method which is used for extracting hidden information from huge dataset. In our paper, Two approaches are introduced. In first approach FP Growth Algorithm is being presented that generate association rules efficiently and it reduces time of forming frequent item sets every time. In second approach we have tried to hide sensitive association rules by Genetic Algorithm. Generally from large databases frequent items are extracted by applying different algorithms. In this paper, we compare all the algorithms for extracting frequent items which are Association Rule Mining, Apriori Algorithm and FP growth Algorithm. We also compare Fuzzy Logic Algorithms and Genetic Algorithm for hiding sensitive association rules.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Raj, Saksham Sehrawet, Nikhil Patwari, K. Sathiya
{"title":"IoT based model of automated agricultural system in India","authors":"S. Raj, Saksham Sehrawet, Nikhil Patwari, K. Sathiya","doi":"10.1109/ICOEI.2019.8862749","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862749","url":null,"abstract":"Agriculture has always been the backbone of human civilization and something which has helped us flourish as a species since the beginning. Along with this, agriculture and the associated sectors have always had a major contribution towards India's GDP (Gross Domestic Product). As of 2017, they serve about 17.3 percent of the total GDP of India. Agriculture has also been the largest source of livelihood, for decades, in over 58 percent of the rural households of the country. Over the years, agriculture has seen many technological advancements. Despite this, agricultural practices in India are still largely traditional and are dependent on human involvement in a major way. India has a net sown area of around 14 crore hectares out of which only 47 percent of the land is under irrigation and still majorly depends majorly on good monsoon to fulfil the water requirements. Irrigation aside, farmers also need to know a lot of other problems like not getting enough value for their crops, producing more crops than the demand for that crop and spending excess amount of money in transporting the crops to the market. All this can be avoided if we introduce the technology that has been theoretically present for quite some time but has not been implemented at the ground level, yet. We are talking about IoT (Internet of Things) which is basically a network of objects enabled by internet coupled with the web services that helps in interact with these objects. The IoT network would include three subsystems which would each aim to solve the three major problems stated above. The first would solve the supply-demand anomaly, the next would solve the irrigation problem but would also perform data acquisition using the different sensor nodes. The last subsystem would be aimed at designing such a model that would reduce the transportation costs of the farmers considerably by enabling a pool system wherein every farmer would benefit and reduce their expense.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}