2017 International Conference on Intelligent Computing and Control (I2C2)最新文献

筛选
英文 中文
Automated coconut tree climber 椰树自动爬升器
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321858
S. Maheswaran, S. Sathesh, G. Saran, B. Vivek
{"title":"Automated coconut tree climber","authors":"S. Maheswaran, S. Sathesh, G. Saran, B. Vivek","doi":"10.1109/I2C2.2017.8321858","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321858","url":null,"abstract":"Agriculture, the prime sector is the backbone of India. Last few decades has witnessed a rapid development in robotic technology. Different kind of intelligent machines which facilitate various tasks in industry environment are becoming popular. India's contribution in coconut production in worldwide third place. All conventional techniques used for harvesting of coconuts was done manually and even if they developed any device it also required a human labor. Safety of the worker and the increased labor charges are the primary concerns of the coconut farm owners now. The factors such as height and coconut tree being branch less increased the difficult of climbing the tress. Only a professional climber having proper training could only be able to climb coconut tree. The risk involved in coconut tree climbing has reduced the people's count who come forward to climb the trees. The lack of professional climbers also stands as a reason for over charging by the existing professionals from the owner and as the educational background of Indian youth has increased the people now are hesitating to come into this type of profession. Today living in 21st century, still we have only manual coconut harvesting machines in handy. This in turn increases man power, cost of operation and time consumption for production. Thus, to overcome cons of manual harvesting process and to empower the agriculture in this domain an attempt has been made in designing a prototype of automated coconut harvesting machine. Considering this scenario, it will be very much helpful for the people if there is device which will help the user to climb a coconut tree. These kinds of devices will encourage more people to come forward into the agricultural sector. This project focuses in the design of a tree climbing robot which is automated, and thus this it does not require any human labor except to control it from the ground using a remote control. The device is a circular with a movable all sides and consists of four wheels. Four springs that are fixed to the wheel helps in adjusting to the variation in the tree's diameter. All the fixed wheels are having a DC motor geared with high torque for driving it. The four motors are driven in the bidirectional way using the four L293D drivers which are placed on the device's frame. The control signs for the driver is provided using a RF transmitter/receiver unit. A 12V 3000mah battery pack which is rechargeable is used. An arm with a rotary blade at its end is fixed to the track which is placed on the rim setup of this device so that arm can rotate on the rim in all direction for the coconuts harvest.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Methodology for real time hand gesture recognition and generating text description using histogram techniques 实时手势识别和使用直方图技术生成文本描述的方法
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321779
Vivek D. Lad, R. Kagalkar
{"title":"Methodology for real time hand gesture recognition and generating text description using histogram techniques","authors":"Vivek D. Lad, R. Kagalkar","doi":"10.1109/I2C2.2017.8321779","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321779","url":null,"abstract":"Communication via gestures is a method for communicating with your non-verbal communication, where all of ones expressions, objectives, or estimations are passed on by physical practices, for instance, outward appearances, body position, movements, eye developments, touch and the use of space. Non-verbal correspondence exists in both animals and individuals, yet this article focuses on explanations of human non-verbal or gesture based communication translation into English literary expression. The proposed technique for usage uses the image processing techniques and engineered knowledge systems to get the objective of sign video acknowledgment. To complete the proposed assignment execution it utilizes image processing techniques like outline investigating based on edge recognition, wavelet change, disintegration, widening, obscure disposal, commotion end, on training dataset. It likewise utilizes Histogram Orientation Gradient called HOG for shape highlight extraction and most vital part investigation for list of capabilities streamlining and diminishment. For result investigation, this paper utilizes diverse classification recordings such as day situation, family information, official information, relations and so on. Database of removed results are contrasted with the video encouraged with the framework as a contribution of the underwriter by a prepared indistinct derivation framework.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative study of SPWM And SVPWM cascaded h-bridge multilevel inverter SPWM与SVPWM级联h桥多电平逆变器的比较研究
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321785
A. S. Kale, A. V. Tamhane, A. Kalage
{"title":"Comparative study of SPWM And SVPWM cascaded h-bridge multilevel inverter","authors":"A. S. Kale, A. V. Tamhane, A. Kalage","doi":"10.1109/I2C2.2017.8321785","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321785","url":null,"abstract":"Large electric drives and utility applications require modern power electronics converter like cascaded H-bridge multilevel inverter (CHB) with separated DC sources is clearly the most practical topology for use as a power converter for medium & high power applications due to their modularization and extensibility. The H-bridge inverter eliminates the large number of bulky transformers, clamping diodes and flying capacitors. Cascaded multilevel inverter (MLI) is contemplated to be suitable for medium & high power applications. There are many pulse-width modulation (PWM) techniques developed for controlling multilevel inverter, among these, SVM is the most popular one due to its simplicity both in hardware and software. But the SVM becomes very difficult to achieve when the levels increases. To simplify the SVM at high level, several improved methods have been proposed in many literatures. In this report, SPWM and SVPWM controlled cascaded H-bridge multilevel inverter for large motor drives is designed, analysed and compared with conventional inverter, by simulating in MATLAB simulink software.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
IoT enabled API for secure transfer of medical data 支持物联网的API,用于安全传输医疗数据
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321934
S. Sonune, D. Kalbande
{"title":"IoT enabled API for secure transfer of medical data","authors":"S. Sonune, D. Kalbande","doi":"10.1109/I2C2.2017.8321934","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321934","url":null,"abstract":"Internet of Things devices (IoT-D) have limited resource capacity. But these devices can share resources. Hence, they are being used in variety of applications in various fields including smart city, smart energy, healthcare etc. Traditional practice of medicine and healthcare is mostly heuristic driven. There exist big gaps in our understanding of human body, disease and health. We can use upcoming digital revolution to turn healthcare upside down with data-driven medical science. Various healthcare companies now provide remote healthcare services. Healthcare professionals are also adapting remote healthcare monitoring practices so as to monitor patients who are either hospitalized or executing their normal lifestyle activities at remote locations. Wearable devices available in the market calculate different health parameters and corresponding applications pass the information to server through their proprietary platforms. However, these devices or applications cannot directly communicate or share the data. So, there needs an API to access health and wellness data from different wearable medical devices and applications. This paper proposes and demonstrates an API to connect different wearable healthcare devices and transfer patient personal information securely to the doctor or health provider.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing the complexity of matrix multiplication algorithm 优化矩阵乘法算法的复杂度
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321772
P. Rathod, Ankit Vartak, Neha Kunte
{"title":"Optimizing the complexity of matrix multiplication algorithm","authors":"P. Rathod, Ankit Vartak, Neha Kunte","doi":"10.1109/I2C2.2017.8321772","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321772","url":null,"abstract":"With the bird's eye view of many analyst's attentions in the last few years to know how companies are collecting and transmitting enormous amounts of information. As there are problems in transmitting large amount of data. This is a need of an hour to overcome the problems. The data can be compress such as word file or image file etc. to send the data efficiently. Compression must be done in such a way that loss of data is minimum (i.e. 0%). Image compression helps to overcome the problem of sending large images. In this Discrete Cosine Transformation (DCT) plays a crucial role. In DCT, for compression of JPEG images we have techniques of Quantization and encoding. In this whole work, we have used Custom matrix multiplication algorithm (CMM) for reducing the complexity of matrix multiplication (MM) problem. The results from the experiment when comparing with Naïve matrix multiplication and Strassen's matrix multiplication shows increase in the performance of DCT. As the performance have increased due to the less time and space complexity of Strassen's as compared to Naïve. As CMM is having less time and space complexity as compared to Strassen's algorithm we are expecting to have more increase in performance. The time required for compression and the size of the files after compression with different algorithms for different images helps to differentiate between the performances.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impacts of machine learning and artificial intelligence on mankind 机器学习和人工智能对人类的影响
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321908
Arpita Nayak, Kaustubh Dutta
{"title":"Impacts of machine learning and artificial intelligence on mankind","authors":"Arpita Nayak, Kaustubh Dutta","doi":"10.1109/I2C2.2017.8321908","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321908","url":null,"abstract":"With each passing day and gradually as we move into future, smart or intelligent machines will slowly replace and enhance human capabilities in many areas. The intelligence exhibited by machines or softwares are often termed as “Artificial Intelligence” which is a subfleld of computer science. Artificial intelligence along with machine learning is now a potential game changer in the history of computing backed with strong data analytics. Study in this area of artificial intelligence has rapidly influenced the emergence of smart technologies that has a huge impact on our daily lives. The field of science, engineering, business and medicine has become smarter with prediction capabilities to smoothen our lives in our daily activities. The areas employing artificial intelligence has seen an increase in the quality and efficiency which has been illustrated in this paper.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Man-in-the-middle attack in HTTP/2 HTTP/2中的中间人攻击
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321787
Parth Patni, K. Iyer, Rohan Sarode, Amitkumar R. Mali, Anant V. Nimkar
{"title":"Man-in-the-middle attack in HTTP/2","authors":"Parth Patni, K. Iyer, Rohan Sarode, Amitkumar R. Mali, Anant V. Nimkar","doi":"10.1109/I2C2.2017.8321787","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321787","url":null,"abstract":"Hyper Text Transfer Protocol Version 2 (HTTP/2) is the upgrade to the popularly used HTTP/1.1. This protocol has been created to enhance the already existing services and applications based on the older protocol with few modifications and rewriting. Thus, this has opened up to new possible vulnerabilities and attacks on them. HTTP/2 relies on Transport Layer Security (TLS) for its security. This paper intends to carry out Man-in-the-Middle (MITM) attack in an HTTP/2 environment by exploiting a known vulnerability of TLS. To the best of our knowledge, no study has been done on how MITM attacks can be launched against HTTP/2 services.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sentiment analysis of customer product reviews using machine learning 使用机器学习对客户产品评论进行情感分析
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321910
Zeenia Singla, Sukhchandan Randhawa, Sushma Jain
{"title":"Sentiment analysis of customer product reviews using machine learning","authors":"Zeenia Singla, Sukhchandan Randhawa, Sushma Jain","doi":"10.1109/I2C2.2017.8321910","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321910","url":null,"abstract":"Today, digital reviews play a pivotal role in enhancing global communications among consumers and influencing consumer buying patterns. E-commerce giants like Amazon, Flipkart, etc. provide a platform to consumers to share their experience and provide real insights about the performance of the product to future buyers. In order to extract valuable insights from a large set of reviews, classification of reviews into positive and negative sentiment is required. Sentiment Analysis is a computational study to extract subjective information from the text. In the proposed work, over 4,000,00 reviews have been classified into positive and negative sentiments using Sentiment Analysis. Out of the various classification models, Naïve Bayes, Support Vector Machine (SVM) and Decision Tree have been employed for classification of reviews. The evaluation of models is done using 10 Fold Cross Validation.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Enhancing pattern recognition in social networking dataset by using bisecting KMean 基于分割KMean的社交网络数据集模式识别方法研究
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321776
Shilpa V. Gajbhiye, Gaurav B. Malode
{"title":"Enhancing pattern recognition in social networking dataset by using bisecting KMean","authors":"Shilpa V. Gajbhiye, Gaurav B. Malode","doi":"10.1109/I2C2.2017.8321776","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321776","url":null,"abstract":"Databases today can range in size more than terabytes. Within these masses of data lies hidden information of strategic importance. So when there are lots of trees, how to find conclusions about the forest? The newest answer is mining of data, which is being used to increase revenues. Data mining is a process that uses a variety of data analysis tools to discover patterns and relationships in data that may be used to make valid predictions. This research uses social networking data set for pattern recognition, because it is one of the emerging application areas in data mining. We used Facebook 100 dataset and applied Bisecting KMeans algorithm on it, so that we would get better clustering outputs. Bisecting KMeans first bisects the data into 2 parts and selects the part with greater number of elements, then apply clustering on it again. This goes on till we have N Number of clusters. We would apply this to our dataset to get desired results. With this we are going to compare Bisecting K Mean algorithm with other data mining algorithm. And finally we are going to find out different pattern from social networking dataset.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117326181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel fault monitoring mechanism on overhead transmission line in power grid 一种新型的电网架空输电线路故障监测机制
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-23 DOI: 10.1109/I2C2.2017.8321832
N. Korde, Narendra Bhagat
{"title":"A novel fault monitoring mechanism on overhead transmission line in power grid","authors":"N. Korde, Narendra Bhagat","doi":"10.1109/I2C2.2017.8321832","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321832","url":null,"abstract":"Renewable energy based distributed generators (DGs) play an important part for generation of electricity. Distributed generation is supported by wind, solar energy, fuel cells and micro turbines using mini hydro, can provide significant momentum in future. A micro grid is distribution level network which includes many loads and DG source that operates as one combination load or generation supply. Micro grids operate at normal condition as well as faulty condition. We are using MATLAB Simulink's in this paper for controlling and monitoring the fault location of small portion of distribution network. In Smart Grid AC and DC both sources are used. We used both sources in model. If fault occurs in AC line, DC can give desired output. Here we simulate two major faults on transmission line and rectify it by using different electrical equipment. Here we analyze the fault current and voltage and protect the line by using breakers and transformer. The test results of the given simulation prove the usability of the system in terms of the parameters like voltage across the line and current through the line.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信