{"title":"LitUp-A Wireless Lighting System using IOT","authors":"A. Joshi, Akshaykumar Athani, K. Tangod","doi":"10.1109/ICGCIOT.2018.8753055","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753055","url":null,"abstract":"The world is focalizing towards smart technologies through wireless communication channel and at the same time facing energy crisis. This article implements the working of RGB color model which is essentially an automated eccentric lighting system which works using the ESP8266. We have named this model as LitUP. This proposed article includes client-server mechanism which instructs ESP8266 via a mobile application or website. MQTT protocol is used which is secured form of TCP/IP. This proposed model controls the intensity, brightness and hue of the lighting system easily with the app or website which has user friendly interface which provides choice for different types light depending on the aura. By default the white light will be switched on when the person enters the room as detected by the PIR sensor.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu
{"title":"Smart Security System for Businesses using Internet of Things (IoT)","authors":"Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu","doi":"10.1109/ICGCIOT.2018.8753101","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753101","url":null,"abstract":"There is a sudden exponential use of security systems in our day to day life. For example, security in a business space, organisation, or bank locker is important to every individual now. Lately, security cameras are being utilized in order to build safe and secure places in organisations. However, this technology needs a person regularly to detect any problem in the frame taken from the camera. The main aim of this paper is to enhance the traditional security system. The security system based on the IoT platform has the potential of interacting real-time with the device. The system consists of a camera, voice sensor/microphone, motion/activity sensor and an LTE/Wi-Fi module which is interfaced with the heart of the system, processor. This entire economic system using IoT in real-time will allow mobile devices and computers to remotely track the activities occurring at the location where the IoT device is placed and records all the activities, which will be saved on one’s cloud storage account. The IoT based security system helps in added protection of the user/customer property. Security systems are designed to perform certain tasks when a secured zone is breached. In this paper, notification is sent to the concerned person as an alert where the user can take necessary actions. The main advantage of this system is the ability to remotely manage one’s property 24/7. With this IoT based smart locker, one can monitor, get alerts, notify in case of emergency from anywhere in the world using mobile application via cloud connectivity 24/7. To be specific, we aim to design a light-weight, low cost, extensible, flexible wireless smart security system using IoT which employs the integration of various latest technologies. The combination of the various technologies can be used synergistically as a smart security to control a system in a house/organisation (lock or unlock a system with the help of SMS/app) from remote locations. The complete system is designed considering all types of door locks and lockers by providing a simple, effective ease of installation, to provide homes/organisations extreme security and our system will be a means for preventing, detecting and counter-measuring robbery or burglary.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Sentiments for Sports data using RapidMiner","authors":"Tanuj Pawar, Parul Kalra, D. Mehrotra","doi":"10.1109/ICGCIOT.2018.8752989","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752989","url":null,"abstract":"Sentiment analysis basically consist of determining and categorizing opinions expressed on the basis of computational text. It helps us to determine user’s attitude towards a specific topic on the basis of positive, neutral and negative. Social media acts as one of the biggest platforms where people express their feelings on variety of issues by writing on websites, blogs, public forums or online groups. Sports nowadays have also become one of the major topics that people discuss on social media. People’s opinions are basically positive, neutral or negative, so only looking at each opinion and coming to a result is very difficult and time consuming. In this research paper, an overall process of feature based sentiment analysis is showcased and opinions of people are analyzed regarding cricket matches using RapidMiner.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126804832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant
{"title":"Use Of Telecom Applications For The Cure Of Alzheimer’s Disease","authors":"Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant","doi":"10.1109/ICGCIOT.2018.8753006","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753006","url":null,"abstract":"Alzheimer’s disease is one of the major disease for which will still do not have complete cure. There are many people who are suffering Alzheimer’s and do not have any idea about dealing it in a better way. They are just helpless. This disease is commonly seen in elderly people. Here in this paper, study and survey has been provided about use of telecom applications for the cure of Alzheimer’s disease (AD). Going from very basics about the disease and it causes, introduction about the advance technologies of telecom industry for the treatment and betterment of patients suffering from the disease has been made. It also provides the knowledge about the use of applications in making of required devices and the need of transmission system for the patient to provide a better understanding of the subject. The motive is to provide some light on the connection between the medical system with telecom applications which can lead to new technologies in the field of medical science and help patients to get treated in a better way. We have also discusses about the treatment and curing methods for Alzheimer’s in which it can possibly cured or treated.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar
{"title":"Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm","authors":"J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar","doi":"10.1109/ICGCIOT.2018.8752988","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752988","url":null,"abstract":"The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiband Circularly Polarized Microstrip Reader Antenna for RFID Applications","authors":"P. M, R. V, Mohammed Riyaz Ahmed","doi":"10.1109/ICGCIOT.2018.8753027","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753027","url":null,"abstract":"The ability of a thing (in the Internet of Things) to identify itself wirelessly, using Radio Frequency waves makes them Ubiquitous. The ease of Tracking, Monitoring, Identifying and Data capturing can be owed to Radio Frequency IDentification (RFID) Systems. An RFID system consists of Reader and Tag, where they use antennas for transmitting an interrogation signal and identification data respectively. Here we propose a compact microstrip patch antenna for Ultra High Frequency (UHF) and Super High Frequency (SHF). The antenna is triband and operates at 926 MHz of UHF while at 2.48 GHz and 5.8 GHz in Microwave (another name for SHF) band. Beyond RFID applications the microwave band is defined to be used for WLAN applications by IEEE 802.11b and 802.11a standards. The performance analysis of the proposed antenna design shows that it well meets the requirements of the RFID mobile reader.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan
{"title":"Genuine ratings for mobile apps with the support of authenticated users’ reviews","authors":"K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan","doi":"10.1109/ICGCIOT.2018.8753068","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753068","url":null,"abstract":"Ranking fraud on the mobile app market refers liable to mislead activities which have a purpose of bumping up the apps in popularity list. Because of this, app users have no facility to express their views. This is the same technique in ratings also. It ends up bringing increasing number of visits for application engineers to build the spreading of their application deals or application appraisals to submit the positioning extortion. It mainly provides a view of reviews to impact on the mobile apps or products and also detects the fake review list by the users. There are mainly three evidences to end up plainly mindful of the fraud in the mobile apps, i.e., positioning-based confirmations, rating-based confirmations, and finally review-based evidences. Compared to the remaining two evidences, review-based evidences are most helpful to the users who are trying to download new apps. Here, the main concern is the reviews of the authenticated users, that is, the users who already have an account in that field. And review-based evidences are very crucial. We precisely find the positioning extortion by mining dynamic periods in particular driving sessions for mobile apps and also discuss how the reviews are most useful for the new clients.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar
{"title":"Iot Based Smart Shopping Mall","authors":"A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar","doi":"10.1109/ICGCIOT.2018.8752971","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752971","url":null,"abstract":"In present area, going to supermarkets for shopping is increasing rapidly. In the Shopping mall, people get their daily essential products like consumer goods, clothes, and foodstuff. At the time of festivals and offers, there is a huge rush in the shopping mall. In shopping mall or supermarket, they are using barcode technique for billing the products. It takes lot of time and customer has to wait till all products get scanned to generate the bill. To avoid this situation, we proposed IoT based smart shopping mall. It consists of RFID tag, LCD display, android application, Wi-Fi and cloud. All products present in the shopping mall will be tagged with RFID. Customer’s required products will be put in the trolley, where its code will be detected using RFID and name of the product and cost will be displayed on the LCD. Data is pushed to the amazon cloud using Wi-Fi module ESP8266 and the data is sent to Android App of the Customers. Total billing is done by wireless modules. We are providing a searching option for the customers to know the availability and unavailability of products in the shopping mall.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pavan Manjunath, Rajashree Soman, Dr. Pritam Gajkumar Shah
{"title":"IoT and Block Chain driven Intelligent Transportation System","authors":"Pavan Manjunath, Rajashree Soman, Dr. Pritam Gajkumar Shah","doi":"10.1109/ICGCIOT.2018.8753007","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753007","url":null,"abstract":"As the technology dependencies are increasing day by day in human work-life culture and the advancement in the number of electronic home appliances devices, auto companies and number of other platforms and applications are connected to the Internet of Things (IoT) and becoming more and more rapid increase in data consumption and the security and privacy of customer data cannot be comprised and the block chain domain perfectly allows to secure the customer data and it can be easily overlaps with the Internet of Things (IoT). This paper will focus the Internet of Things (IoT) and block chain architecture and platforms and how effectively it can be integrated into automotive industries and other use cases. We conclude that the Internet of Things (IoT) and block chain combination is a good combination and can cause most key revolutions across different industries and effective management, security and privacy of the customer confidential information also providing helpful guidance and reference for future research works.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pavan Manjunath, M. Prakruthi, Pritam Gajkumar Shah
{"title":"IoT Driven with Big Data Analytics and Block Chain Application Scenarios","authors":"Pavan Manjunath, M. Prakruthi, Pritam Gajkumar Shah","doi":"10.1109/ICGCIOT.2018.8752973","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752973","url":null,"abstract":"The Big Data, Block chain and the Internet of Things (IoT) are the key names in the technology development of these eras. There are undoubtedly differences between the three technologies, but there are also firm relationships that increase the system operations, practicability, and adoptability. As the domain Block chain and the Internet of Things (IoT) are just infant domain and, still it’s undergoing more and further development events, and the Internet of Things(IoT) is producing a larger set of the data and adopted across the different industries such as healthcare, smart cities development, retail, banking and public administration and real time application forecasting, the well-analyzed data is tremendously valuable the Big Data Analytics will suffice this needs, and on the other side the Block chain will provide more secured transaction of the data, and it provides contracts, and more other applications plus integration and Big Data Analytics can be integrated on top of it. In this paper will focus on the incorporation of the all three technologies or domain, such as Big Data Analytics, Block chain and the Internet of Things (IoT). We concluded that all the three technology Big Data Analytics, Block chain and the Internet of Things (IoT) would play a vital role in resolving each other constraints. Based on our analysis and case studies it will help for future work research.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}