2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

筛选
英文 中文
IoT Health care Monitoring and Tracking: A Survey 物联网医疗监测和跟踪:一项调查
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862763
S. Mishra, A. Rasool
{"title":"IoT Health care Monitoring and Tracking: A Survey","authors":"S. Mishra, A. Rasool","doi":"10.1109/ICOEI.2019.8862763","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862763","url":null,"abstract":"Hospitals all over the world are moving towards better and more advanced technologies. In the recent times, integration of the Internet of Things with the available medical technologies as well as with patients and their environment has given a new scope for data collection and better decisions. This survey paper focuses on various ways the IoT devices can be used to improve the health of people along with ensuring that there are no mistakes in the process of medication and medicine delivery. Here we have taken many examples of the devices that are being used and which are and can be used in the future for more advanced and secure health care.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Crime Analysis and Prediction Using Fuzzy C-Means Algorithm 基于模糊c均值算法的犯罪分析与预测
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862691
B. Sivanagaleela, S. Rajesh
{"title":"Crime Analysis and Prediction Using Fuzzy C-Means Algorithm","authors":"B. Sivanagaleela, S. Rajesh","doi":"10.1109/ICOEI.2019.8862691","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862691","url":null,"abstract":"Crime analysis is methodological approach for identify the crime areas. The crime areas are mainly based on the crime type these identified crime areas are helpful to reduce the crime rate. This can be very easy to identify the crime areas, based on this process the crime rate can be analyzed. With the increasing of computer systems the crime data analysts can help to the crime investigators to analyze the crime. Based on the clustering and preprocessing extract the crime areas from a structured data. The cause of occurrences of crimes like crime details of person and other factors we are focusing mainly on crime factors of previous years. This system is mainly focus on in which area the crime will occur, does not focus on the identify the criminal. In the existing system naive bayes classification was used In the present system, the fuzzy C-Means algorithm will be use to cluster the crime data for total cognizable crimes such as Kidnapping, murder, Theft, Burglary, cheating, crime against women, robbery and other such crimes.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Real-Time Monitoring and Control of Consumed Power for Household Appliances using Arduino Uno through Bluetooth and Android Application 基于蓝牙和Android应用的Arduino Uno家用电器耗电实时监测与控制
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862528
Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das
{"title":"Real-Time Monitoring and Control of Consumed Power for Household Appliances using Arduino Uno through Bluetooth and Android Application","authors":"Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das","doi":"10.1109/ICOEI.2019.8862528","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862528","url":null,"abstract":"In this work, Arduino Uno and Bluetooth controlled real time power measurement and control of household electrical appliances, was proposed. An android application was also been used to display the amount of real-time consumed power of each appliance separately and also to make the user aware the total billing amount. Along with measurement of total power consumed, this system also keeps a record of the total consumed electrical power in every hour and creates the load curve, which was used to estimate optimal billing amount based on two part tariff. The main focus in this work was imposed on reducing maximum demand power consumed by user so that total billing amount can be reduced. After estimation of load curve, system generates a time span within which all the appliances with relatively high power consumption capacity, should be used so that the average load curve becomes almost horizontal thus reducing maximum demand. The whole work was implemented on one tungsten bulb of 60 watt, two compact fluorescent light, each of 25 watt, one table fan of 40 watt and a DC electric motor of 1.2 HP. The optimal power consumption was displayed in an Android mobile phone through HC-05 Bluetooth module.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Biometric Personal Iris Recognition from an Image at Long Distance 远距离图像生物识别个人虹膜
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862640
Swati D. Shirke, C. Rajabhushnam
{"title":"Biometric Personal Iris Recognition from an Image at Long Distance","authors":"Swati D. Shirke, C. Rajabhushnam","doi":"10.1109/ICOEI.2019.8862640","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862640","url":null,"abstract":"Now a days, Iris recognition is mostly used in biometrics for personal identification. It is the most powerful tool for person identification. But in real time it is quite difficult to capture the better quality of iris images. The images obtained are more degraded due to the lack of texture, blur. In this paper, a simple high instability technique is presented also this process is more convenient to use. This super-resolution algorithm is applied to the pixels of iris images to select the best frame from the iris image. A segmentation algorithm that segments the input iris images. Spatial FCM used for segmentation testing purpose. Iris image is framing 600 x 600 in sequence to calculate vessel area in each framework using for pattern abstraction using loop descriptor. The Hough transforms cast-off de-noising the image. The experimental results show that this proposed system successfully recognizes the iris about 4 to 8 meters long distance of a person. This proposed work is developed on MATLAB for “reading” the profile also for completing the Hough transforms performance. The database used for this purpose is CASIA V4. The simulation results show that the stable extraction of iris recognition.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Practices in Military Applications 军事应用中的物联网实践
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862559
V. Gotarane, Sandeep Raskar
{"title":"IoT Practices in Military Applications","authors":"V. Gotarane, Sandeep Raskar","doi":"10.1109/ICOEI.2019.8862559","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862559","url":null,"abstract":"Internet of Things (IoT) is very fast-growing technology leading to speedy and better communication. Use of IoT in Military application has become necessity of today's world as anti-military activities have increased and become threat to Nations. Lives of warfighters are priceless, so it is important to protect their lives to the maximum we can. Military ammunition control is also an important and integral part of military activities. Different IoT applications and methodologies for Military activities are discussed and analyzed in this paper. This paper also discusses the protocols and methods of implementation used and presented by people over the globe.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133218599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Approaches on Partial Face Recognition: A Literature Review 部分人脸识别方法:文献综述
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862783
M. Reshma, B. Kannan
{"title":"Approaches on Partial Face Recognition: A Literature Review","authors":"M. Reshma, B. Kannan","doi":"10.1109/ICOEI.2019.8862783","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862783","url":null,"abstract":"Face recognition technology has gained attention over past years owing to its broad applications. It is a potential research area in the scope of image analysis, computer vision and pattern recognition. The requirement of identifying an authentic user through different authentication mechanisms are increasing rapidly following the intense concerns about security, and rapid advancement in networking, communication, and mobility. Face recognition is an area which has attained attention over the last few decades. The traditional applications of face recognition system, especially those used for access control, authentication, and surveillance, usually need maximum information of face to attain exceptional performance in recognition. Occasionally it is difficult to get access of a full face under certain restricted situations. For example, a non-cooperative face can lead to face occlusion. For recognizing an arbitrary image captured in an unconstrained environment is a more challenging condition in video surveillance, handheld devices etc. Numerous methods have been devised for unconstrained face recognition with remarkable achievements. This paper provides an overview of different partial face recognition approaches proposed.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Machine Learning based Health Prediction System using IBM Cloud as PaaS 基于机器学习的健康预测系统,使用IBM云作为PaaS
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862754
A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni
{"title":"Machine Learning based Health Prediction System using IBM Cloud as PaaS","authors":"A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni","doi":"10.1109/ICOEI.2019.8862754","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862754","url":null,"abstract":"Adaptable Critical Patient Caring system is a key concern for hospitals in developing countries like Bangladesh. Most of the hospital in Bangladesh lack serving proper health service due to unavailability of appropriate, easy and scalable smart systems. The aim of this project is to build an adequate system for hospitals to serve critical patients with a real-time feedback method. In this paper, we propose a generic architecture, associated terminology and a classificatory model for observing critical patient's health condition with machine learning and IBM cloud computing as Platform as a service (PaaS). Machine Learning (ML) based health prediction of the patients is the key concept of this research. IBM Cloud, IBM Watson studio is the platform for this research to store and maintain our data and ml models. For our ml models, we have chosen the following Base Predictors: Naïve Bayes, Logistic Regression, KNeighbors Classifier, Decision Tree Classifier, Random Forest Classifier, Gradient Boosting Classifier, and MLP Classifier. For improving the accuracy of the model, the bagging method of ensemble learning has been used. The following algorithms are used for ensemble learning: Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC, and Bagging Ridge. We have developed a mobile application named “Critical Patient Management System - CPMS” for real-time data and information view. The system architecture is designed in such a way that the ml models can train and deploy in a real-time interval by retrieving the data from IBM Cloud and the cloud information can also be accessed through CPMS in a requested time interval. To help the doctors, the ml models will predict the condition of a patient. If the prediction based on the condition gets worse, the CPMS will send an SMS to the duty doctor and nurse for getting immediate attention to the patient. Combining with the ml models and mobile application, the project may serve as a smart healthcare solution for the hospitals.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Survey on Vulnerability Assessment & Penetration Testing for Secure Communication 安全通信漏洞评估与渗透测试研究综述
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862767
Keyur Patel
{"title":"A Survey on Vulnerability Assessment & Penetration Testing for Secure Communication","authors":"Keyur Patel","doi":"10.1109/ICOEI.2019.8862767","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862767","url":null,"abstract":"As the technology is growing rapidly, the development of systems and software are becoming more complex. For this reason, the security of software and web applications become more vulnerable. In the last two decades, the use of internet application and security hacking activities are on top of the glance. The organizations are having the biggest challenge that how to secure their web applications from the rapidly increasing cyber threats because the organization can't compromise the security of their sensitive information. Vulnerability Assessment and Penetration Testing techniques may help organizations to find security loopholes. The weakness can be the asset for the attacker if the organizations are not aware of this. Vulnerability Assessment and Penetration Testing helps an organization to cover the security loopholes and determine their security arrangements are working as per defined policies or not. To cover the tracks and mitigate the threats it is necessary to install security patches. This paper includes the survey on the current vulnerabilities, determination of those vulnerabilities, the methodology used for determination, tools used to determine the vulnerabilities to secure the organizations from cyber threat.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient and Opportunistic Routing in MANET using Link Lifetime Prediction 基于链路寿命预测的MANET高效机会路由
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862658
S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh
{"title":"Efficient and Opportunistic Routing in MANET using Link Lifetime Prediction","authors":"S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh","doi":"10.1109/ICOEI.2019.8862658","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862658","url":null,"abstract":"For improving the transmission of data between the cross layers, we propose an efficient Opportunistic routing in Mobile Adhoc Network (MANET) using Cross Layer Reliable Opportunistic Routing (CBRT) Algorithm and Link Lifetime prediction, in which the fuzzy logic topologies are used. We use the fuzzy logics to regenerate the dead nodes using, if-then rule. Using this, we will reactivate the dead nodes for transmission. For the increased reliability and reduced cost of control, we propose a method of finding degree of node sensing, which senses the degree of the node which helps in sensing the shortest path of the highest lifetime node. Additionally, we propose the link lifetime prediction algorithm which finds the lifetime of the node so that the shortest path can be maintained with the source node and the highest lifetime node. Processing this method will reduce the data loss and balance the efficiency of transmission. Link lifetime prediction algorithm also takes the moving speed and moving direction. Then finally LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is added which consumes less energy during the transmission.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor air quality monitors using IOT sensors and LPWAN 使用物联网传感器和LPWAN的室内空气质量监视器
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862647
Jithina Jose, T. Sasipraba
{"title":"Indoor air quality monitors using IOT sensors and LPWAN","authors":"Jithina Jose, T. Sasipraba","doi":"10.1109/ICOEI.2019.8862647","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862647","url":null,"abstract":"The effect of air quality on wellbeing and on life comfort is entrenched. Indoor air quality parameters are critical to make a gainful and sound indoor condition anyway by and large the air quality parameters are altogether different from those characterized as solid qualities. Taking into account that we spend about 90% of our lives inside, it is critical to screen the indoor air quality progressively to distinguish issues in the nature of air and plan intercessions in the building, or in the ventilation frameworks so as to enhance air quality. In this paper we are identifying the indoor air quality with the help of internet of things by using the sensors BME680 from bosch, SGP30 and CCS811 and low power wide area network (LPWAN) for the data transfer. Here we are separating the gases CO2 equivalent, Ethanol, TVoC and so on. For transmitting this IOT information, we require high vitality productive sensor hubs that can impart crosswise over long separation. This propels the improvement of some Low-Power Wide Area Networks (LPWAN) advances, for example, LoRa, to satisfy these requirements. The reports are exhibiting the destructiveness of air that we are taking in step by step. Here we are trying to give a social awareness by using this paper.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134341930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信