{"title":"A Survey on Reliability and Environmental Analysis of Tamil Nadu Power Sector","authors":"S. Prakash, P. Dhal","doi":"10.1109/ICOEI48184.2020.9142932","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142932","url":null,"abstract":"The reliability of the power stations is main factor in the power sector field in order to understand the performance of the system. It gives the measure of how much power supplied to the customers without any failure.The pollutants which are came from the thermal power plants for the year 2018 was calculated. Reliability is impotant in Generation Expansion Planning. The datas are collected for this study based on the progress report of 2018 which was issued by Southern Regional Committee. This study is considered as Tamil Nadu State power supply system in India. For Environment aspect, the pollutions emitted by thermal plants of Tamil Nadu power sector and reliability indices like Expected Energy Not Served (EENS) for the year 2018 is calculated by the LEAP software (Long Range Energy Alternative Planning).","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of object by using the Kalman filter","authors":"S. Fulari","doi":"10.1109/ICOEI48184.2020.9142944","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142944","url":null,"abstract":"In our previous work, a light description on Kalman filter is mentioned for object detection and computer vision. In this paper, a deep understanding on Kalman filter for detecting moving objects is discussed. Research has to go in a golden line not in a very high phase and then low phase for achieving best results in the long run.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115457948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Vehicle Detection using C-OFDM Based RADAR for Advanced Collision Warning","authors":"A. Guchhait, B. Maji, D. Kandar","doi":"10.1109/ICOEI48184.2020.9143058","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143058","url":null,"abstract":"This paper proposes the use of Coded- Orthogonal Frequency Division Multiplexing (C-OFDM) to detect a large number of vehicles on the road. The C-OFDM technique enables a high doppler tolerance over the conventional radar. It is very important to determine the moving vehicle and road-side parked vehicle to take the proper reaction according to the diverse traffic situation. Day-by-day growing vehicular speed and traffic congestion make the task more difficult to detect a large number of surrounding cars on road. More number of the vehicles lined up in a row also makes the situation challenging, as it creates a blind zone in a lane over the road. Various remote sensing systems are being evaluated in the present road traffic scenario. Authors have successfully developed the model to get the desired performance by utilizing the concept of coded-OFDM technology in RADAR signal processing. It also combats the interference while detecting multiple vehicles.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114378722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anisotropic Smoothing for Illumination Invariant Face Anti-spoofing","authors":"R. J, R. Kunte","doi":"10.1109/ICOEI48184.2020.9142948","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142948","url":null,"abstract":"Presently, in various biometric-based access systems face recognition has been used. But few of the systems have the facility to discriminate real and spoof faces. Moreover, plenty of researchers on face live detection primarily concentrated on intrusive approaches, which are non-user approachable in nature. An innovative non-intrusive face spoofing detection technique based on HOG and ELTP descriptors is proposed in this paper. More precisely, this approach adopts anisotropic smoothing for normalizing the illumination of a given image. The effectiveness of the proposed method has been evaluated by different types of experiments on the NUAA dataset.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127162741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing for Security Weakness of Web Applications using Ethical Hacking","authors":"R. S. Devi, M. M. Kumar","doi":"10.1109/ICOEI48184.2020.9143018","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143018","url":null,"abstract":"In the digital world, everything gets connected through the network, and when various services are provided by web applications people are susceptible to hacking. According to the 2019 internet security threat report by Symantec's, an average of 4, 800 websites are vulnerable to digital information theft (form jacking) attack. The main intent of this paper is to recognize openness and flaws in networks and web applications using penetration testing to protect the institutions from cyber threats. There are many scanning methods suggested by many authors to identify the weakness. But in our research, vulnerability analysis and assessment are done by the Nikto tool, [open web application security project] OWASP's Zed attack proxy tool, Netcraft, Sparta and network mapper (Nmap) have been tested through kali Linux platform and search engine. ZAP and Nikto tools are demonstrated in ten different domains to identify the security weakness. From the analysis medium, low-level attacks have been discovered by the ZAP tool. From the result comparison of the Nikto and zap tool, the Nikto tool identified more venerability than ZAP.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126677200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Trend Hybrid Pattern Generation in Fabrics using Machine Learning","authors":"S. Viswanath, N. Rajathi","doi":"10.1109/ICOEI48184.2020.9143057","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143057","url":null,"abstract":"In recent years, there has been an immense demand for unique designs across creative industries. This demand for designs is significantly fueled by social media trends, innovations in technology, industry and consumer psychology. Most of the designs patterns from the industry are curetted by designers. Therefore, there is an increased need for designers to create unique patterns based on user preferences in the shortest time possible. The proposed system described in this paper is intended to build a artificial neural network with three fully connected hidden layer to generate unique hybrid design patterns with the help of an input image from the user. The designs that are created through this network of neurons are called as hybrid designs because these patterns are generated by specialized algorithms having image transformation techniques like pencil sketch, watercolor and pattern merge. Thus the generated images ends up being ranked by the user making the model learn with updated weights every time the preferences are changed. The primary goal of utilizing this network is to improve deal through insightful automation in designing patterns.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"8-Bit ALU Design using m-GDI Technique","authors":"Shubham Sarkar, Hijal Chatterjee, Pritam Saha, Manoj Biswas","doi":"10.1109/ICOEI48184.2020.9142881","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142881","url":null,"abstract":"In this paper, the design of an 8-bit Arithmetic Logic Unit (ALU) using Gate Diffusion Input (GDI) technique is proposed. Implementing the GDI technique in designing the ALU results in low power consumption and the number of transistors it requires is much less. Which result in reduced chip-area and power consumption - two of the most important parameters in digital VLSI design. In this design, 3T XOR is used in the full adder. Moreover, a novel 1-to-8 demultiplexer circuit has been used in the design as well. A considerable number of research papers are studied and compared various logic families and then finally designed an 8-bit ALU which can perform 8 different operations. The design is validated using the schematic editor-DHCH 3.5 and the simulation have been carried out using Xilinx ISE 14.7.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sultana, Shireen Fatima, Hajara Mubeen, R. Begum, Khan Sohelrana, Ahsan Jameel
{"title":"A Review on Smart IoT based Gesture Controlled Grass Cutting Vehicle","authors":"A. Sultana, Shireen Fatima, Hajara Mubeen, R. Begum, Khan Sohelrana, Ahsan Jameel","doi":"10.1109/ICOEI48184.2020.9142981","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142981","url":null,"abstract":"This paper explains the solar grass cutter using hand gesture, solar powered robotic grass cutting machine that eliminates the obstacles and could be accessed from every direction by utilizing hand gesture through remote camera which is introduced to the highest point of the motor-vehicle to communicate remote gushing to the users end. The system uses a 6v batteries to drive both the motor vehicle movement and the grass cutter engine. The system also uses solar panels to charge the battery, so that no additional battery is required. The grass cutter and vehicle motors are interfaced with a microcontroller's family which controls all the motors running. It is also interfaced with ultrasonic sensor to track the object. There are essentially three parts of the framework; the transmitter; the receiver and the live gushing area.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131953862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Characteristics and Its role in 5G Communication","authors":"Pawan C T, Shivaraj S H, Manjunath R. Kounte","doi":"10.1109/ICOEI48184.2020.9142873","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142873","url":null,"abstract":"Radio Frequency (RF) waves are the part of electromagnetic radiation and best known for their use in communication domain such as mobile phones, television etc. As technology advanced and created a device called RFID (Radio Frequency Identification) which uses tags to identify and track the targeted object. Tracking allows better coordination and control in the production cycle. Keeping the track of an object is challenging and can successfully be handled by using RFID. RFID which works according to IoT based methodology is economical compared to other tracking devices. At present, RFID is visualized as the worthy replacement for barcodes. RFID chips find its use in large organization such as defense sector to small businesses. Recent years there has been an internet revolution, industries and consumers demand for high and constant speed, having less lag time that allow them to compile, compute and share the data in less time. 5G is welcomed as a new intelligence than a cellular technology which is a total shift from the older LTE. RFID will play a key role in taking 5G to the expected level in the areas of IoT, blockchain etc. This paper have summarized the evolution of RFID followed by detailed description of RFID and its characteristics. Then, a few comparisons on different parameters of RFID technologies are also highlighted. Finally, the role of RFID in 5G communication is described.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. K. Reddy, Abilash Kv, S. S, Pappa M, S. N, Sateesh A
{"title":"Development of Non Invasive cardiovascular risk diagnosing system","authors":"K. K. Reddy, Abilash Kv, S. S, Pappa M, S. N, Sateesh A","doi":"10.1109/ICOEI48184.2020.9142904","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142904","url":null,"abstract":"This paper mainly focuses on the function of echo-cardiogram to monitor Heart remotely or in a diagnostic centre.The proposed method enables us to fetch the ECG data from the patient in a non-invasive manner by the use of ECG electrodes and predicting their cardiac load and condition from derived parameters like BPM & QRS complex remotely.BPM/Heart rate is calculated through the Continues Wavelet Transform method. The QRS complex is depicted through the QRS wave interval of heart data. which is then compared with the typical interval to produce a conclusion on heart function. To use and assess accurately the information obtained the data is presented in a collaborative report format so that any cardiac-risk analysis is viable for the doctor and the patient to have a complete idea about the patient's present condition which can help diagnosis prior to the disease taking effect.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"2 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}