{"title":"IoT based Post Crash Assistance System","authors":"Neel Desai, P. Kulkarni, L. Joy, Prachi Raut","doi":"10.1109/ICOEI48184.2020.9142894","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142894","url":null,"abstract":"Road accidents are often fatal and result into major losses to families and nations. Precious lives can be saved if medical help is made available to the victims at the earliest. Several systems were proposed which provide automated accident detection and notification facility. However, majority of these systems depend on user's smartphones and applications. This paper presents an IoT based Post Crash Assistance system which used a vehicle's in-built hardware hence eliminating dependency on the smartphone. Also, the system is able to differentiate between various crash intensities and is able to respond accordingly. After exhaustive testing, it was determined that this system gives 98.33% accuracy and response time of 16.24s.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate Primary User Emulation Attack (PUEA) Detection in Cognitive Radio Network using KNN and ANN Classifier","authors":"Mohammad Azharuddin Inamdar, H. V. Kumaraswamy","doi":"10.1109/ICOEI48184.2020.9143015","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143015","url":null,"abstract":"Performance of a cognitive radio network (CRN) can be degraded by a primary user emulation attack (PUEA). Cognitive Radio (CR) is a potential answer for radio spectrum inefficiency issue. Primary user emulation (PUE) assault is a genuine risk to cognitive radio systems. This problem can be eliminated by disconnecting malicious user from base station after classification process. In this work, K nearest neighbor classifier (KNN) is used to classify the malicious users. KNN is trained by using parameters such data rate, distance, power, frequency of request etc. Also, proposed work is compared with artificial neural network (ANN) which is trained by the same parameters used for KNN training. Security of the network is improved by using Elliptical Curve Cryptography (ECC) as data encryption. Trained classifier can detect the emulating users with high accuracy due to significant parameter selection. To validate the performance, accuracy and sensitivity analysis are carried out, simulation results show that the proposed work performs better in terms of accuracy as compared to that of conventional PUEA classification techniques.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning based anomaly detection for IoT Network: (Anomaly detection in IoT Network)","authors":"N. K. Sahu, I. Mukherjee","doi":"10.1109/ICOEI48184.2020.9142921","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142921","url":null,"abstract":"As the world is leading towards having everything smart, like smart home, smart grid smart irrigation, there is the major concern of attack and anomaly detection in the Internet of Things (IoT) domain. There is an exponential increase in the use of IoT infrastructure in every field leads to an increase in threats and attacks too. There can be many types of possible attacks and anomaly that can affect the IoT system which can lead to failure of the IoT system. In this paper, different anomalies are predicted based on a different feature in the data set. Two machine learning classification models are used and comparisons between the performance of these used models are shown. Logistic regression and artificial neural network classification algorithms are applied. Since there are more than 3.5 lakh data set, two different approaches are experimented. In the first case, the classification algorithm stated above is applied on the whole 3.5 lakh dataset, and in the second case, all the classification algorithms are applied after omitting the feature “value” having data as 0 and 1. Data is divided into two sets, training and test set where the training set is 75% of total data available and the rest are test set, 99.4% accuracy is obtained for ANN for the first case while 99.99% accuracy is obtained for the algorithm stated above for the second case. This work can be used for identifying threats and anomaly occurring in a smart device and IoT solutions and prevent attacks.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sayyad, Shaily Parmar, Mrinalini Jadhav, Karan Khadayate
{"title":"Real-Time Garbage, Potholes and Manholes Monitoring System using Deep Learning Techniques","authors":"S. Sayyad, Shaily Parmar, Mrinalini Jadhav, Karan Khadayate","doi":"10.1109/ICOEI48184.2020.9143030","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143030","url":null,"abstract":"A major challenge in urban cities is waste management, as the pace of urbanization is growing rapidly sustainable urban development strategies are therefore required. One of the main concerns with our environment has been improper garbage containment, unrepaired potholes, open manholes, and stagnant water which are harmful to the well-being of the residents. Since the idea of smart cities is very trendy these days and without a smart waste management system, smart cities can't be complete. Traditional manual monitoring is a cumbersome process and utilizes more effort, time, and cost which can easily be assisted with present technologies. Monitoring such tasks using IoT is one such solution, but incorporating IoT deals with the use of sensitive electronic devices which are difficult to maintain and hence add on some additional costs. Hence this paper describes the development of a system using deep learning techniques which can cut down huge costs in effectively monitoring the surroundings and lend a helping hand for a better, safer present and future.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pareek, S. Shrivastava, Sonal Jhala, J. Siddiqui, Savitanandan Patidar
{"title":"IoT and Image Processing based Forest Monitoring and Counteracting System","authors":"S. Pareek, S. Shrivastava, Sonal Jhala, J. Siddiqui, Savitanandan Patidar","doi":"10.1109/ICOEI48184.2020.9142996","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142996","url":null,"abstract":"Forests are the indispensable resource of our life as they cover one third of the land on earth. They provide us with plenty of amenities required to sustain our life. However, for the past few decades, the forest area has been degrading immensely. Recently forest fire has become the greatest menace to our planet. In 2019 Amazon rainforest wildfire destroyed thousands hectors of forest. To get a control over it, a well-organized forest monitoring system is created. This system is based on the emerging technology of IoT and image processing. In our system, these technologies are utilized with the Wireless Sensor Network (WSN). This system provides a continuous live data of the forest environmental conditions. Utilizing this in our work helps us to detect fire intensity which enables water discharge for extinguishing fire when the conditions become unfavourable. This process will be helpful for controlling the wildfire.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing a New Intrusion Detection System Using Ensemble Methods and Deep Neural Network","authors":"A. Rai","doi":"10.1109/ICOEI48184.2020.9143028","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143028","url":null,"abstract":"In the previous, not many years, digital assaults have become a significant issue in cybersecurity. Researchers are taking a shot at the intrusion detection framework from the most recent couple of decades and numerous methodologies have been developed. Yet at the same time, these methodologies won't be adequate for the intrusion detection framework in the up and coming days. Along these lines, in light of headways in innovation, the current framework has to be refreshed with another one. In this paper, ensemble learning strategies have been examined for the intrusion detection system were boosting and bagging methods like Distributed Random Forest (DRF), Gradient Boosting Machine (GBM) and XGBoost are implemented using python library H2O for the new Intrusion identification framework. The Deep Neural Network (DNN) is likewise executed using the H2O library and found that our model beats the past aftereffect of Deep Neural Network (DNN) after utilizing the feature selection method genetic algorithm. Our outcomes outperform the numerous old-style machine learning models too.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christy Mary Jacob, Nikhil George, Amul Lal, Roshan Jacob George, Merin Antony, Jineeth Joseph
{"title":"An IoT based Smart Monitoring System for Vehicles","authors":"Christy Mary Jacob, Nikhil George, Amul Lal, Roshan Jacob George, Merin Antony, Jineeth Joseph","doi":"10.1109/ICOEI48184.2020.9142936","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142936","url":null,"abstract":"There is increased adoption of penalty and fine for traffic rule violators in the public sector but there is a tendency for people to evade from those imposed fines and restrictions for their own safety. Our system will completely monitor all the traffic violations namely over speeding, rash driving, drunken driving, driving without a seat belt, and so on right from the starting of the car. There is an increasing demand to develop a system to check passengers without coming out of the vehicle. A new system for the police force to check the vehicle's details with a smart device placed in the vehicle. The device is equipped with speed monitoring, Alcohol detection, Seat belt checking, etc. If any violation is detected the controller sends an emergency data to the cloud, thus the vehicle is in continuous monitoring mode, and RTO will get updates about the vehicles which are violating rules. Alcoholic breath sensor will continuously monitor the driver's breath, speed sensor will be connected with the speedometer and checks for over speeding, Seat belt sensor will warn the driver if he/she is not using the seat belt, vehicle details including license, pollution details, insurance, etc. will be uploaded to the server or cloud. If any of the above things are violated, automatically defaulter will be imposed fines and the details will be sent to the Motor vehicle department.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121770660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Skimming of Web Pages on a Single click Efficiently","authors":"Arnab Dey, Sudhanshu Jain","doi":"10.1109/ICOEI48184.2020.9143003","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143003","url":null,"abstract":"In today's world, access to information through websites is sought to be the most convenient. The research on efficient skimming on websites was done to further ease the information accessible to the users of the internet through a button automatically. The button named as “quick info” makes it easy for visitors of the website to traverse through the pages after every three seconds automatically to the next page without any user action after initiating the process that means after clicking on the button. People are becoming busier nowadays and have less time to view every web page minutely, so our paper will make it easier for the user to automatically view the web pages. Recommendation of skimming can be implemented on websites that are to be viewed on mobile and other devices. It is important to have a web page with general guidelines followed such that titles, headings are visible to make skimming in three seconds successfully.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble learning-based approach for crack detection using CNN","authors":"Vibhu Kailkhura, S. Aravindh, S. Jha, N. Jayanthi","doi":"10.1109/ICOEI48184.2020.9143035","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143035","url":null,"abstract":"Crack detection is of pivotal importance in civil engineering and other related applications. Traditional methods of human inspection are tedious and severely limited. Automated crack detection by conventional image processing techniques is challenging due to their inability to discriminate crack features from background noise. Inhomogeneous lighting, shadows, and surface finish hinder the performance of digital image processing methods. The use of convolutional neural networks has helped achieve remarkably better results in the field of computer vision. Ensemble learning is an approach to aggregate the results of a number of individual models for classification or regression. Ensemble learning for crack detection has been implemented using deep convolutional neural networks (DCNN) in this paper. The models are evaluated on a number of performance metrics, namely-(i) accuracy, (ii) precision, (iii) recall (iv) Matthews correlation coefficient (MCC), (v) AUROC, and (vi) F1 score. Experimental results show the robustness of the ensembling method and offer promising scope in crack detection. They outperform the current best performance on open source concrete crack dataset. The ensemble models achieved much better performance than their individual counterparts with the best ensemble achieving a validation accuracy of 99.67%.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"22 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of 2X2 MIMO Reconfigurable Testbed Communication System","authors":"Khushi Meherwan Asudaria, B. Venkateshulu","doi":"10.1109/ICOEI48184.2020.9142969","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142969","url":null,"abstract":"The main reason for shifting to 5G is to handle the increasing data traffic demands, by using reconfigurable testbed systems in a real-world deployment scenario. Due to advancement in embedded technology cheaper, smaller, lighter and more flexible devices are available in the market, one among them is USRP. In this research work, a 2X2 MIMO-QAM system is simulated, implemented and comparative analysis is done using the SDR test-bed. Further, this paper extends to a 2X2 MIMO-OFDM system and the best sequence for training is obtained based on various parameters such as SNR(dB); BER; delay(µ sec); Error Statistics; Estimated Offset for different training sequences.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}