{"title":"Automated coconut tree climber","authors":"S. Maheswaran, S. Sathesh, G. Saran, B. Vivek","doi":"10.1109/I2C2.2017.8321858","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321858","url":null,"abstract":"Agriculture, the prime sector is the backbone of India. Last few decades has witnessed a rapid development in robotic technology. Different kind of intelligent machines which facilitate various tasks in industry environment are becoming popular. India's contribution in coconut production in worldwide third place. All conventional techniques used for harvesting of coconuts was done manually and even if they developed any device it also required a human labor. Safety of the worker and the increased labor charges are the primary concerns of the coconut farm owners now. The factors such as height and coconut tree being branch less increased the difficult of climbing the tress. Only a professional climber having proper training could only be able to climb coconut tree. The risk involved in coconut tree climbing has reduced the people's count who come forward to climb the trees. The lack of professional climbers also stands as a reason for over charging by the existing professionals from the owner and as the educational background of Indian youth has increased the people now are hesitating to come into this type of profession. Today living in 21st century, still we have only manual coconut harvesting machines in handy. This in turn increases man power, cost of operation and time consumption for production. Thus, to overcome cons of manual harvesting process and to empower the agriculture in this domain an attempt has been made in designing a prototype of automated coconut harvesting machine. Considering this scenario, it will be very much helpful for the people if there is device which will help the user to climb a coconut tree. These kinds of devices will encourage more people to come forward into the agricultural sector. This project focuses in the design of a tree climbing robot which is automated, and thus this it does not require any human labor except to control it from the ground using a remote control. The device is a circular with a movable all sides and consists of four wheels. Four springs that are fixed to the wheel helps in adjusting to the variation in the tree's diameter. All the fixed wheels are having a DC motor geared with high torque for driving it. The four motors are driven in the bidirectional way using the four L293D drivers which are placed on the device's frame. The control signs for the driver is provided using a RF transmitter/receiver unit. A 12V 3000mah battery pack which is rechargeable is used. An arm with a rotary blade at its end is fixed to the track which is placed on the rim setup of this device so that arm can rotate on the rim in all direction for the coconuts harvest.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for real time hand gesture recognition and generating text description using histogram techniques","authors":"Vivek D. Lad, R. Kagalkar","doi":"10.1109/I2C2.2017.8321779","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321779","url":null,"abstract":"Communication via gestures is a method for communicating with your non-verbal communication, where all of ones expressions, objectives, or estimations are passed on by physical practices, for instance, outward appearances, body position, movements, eye developments, touch and the use of space. Non-verbal correspondence exists in both animals and individuals, yet this article focuses on explanations of human non-verbal or gesture based communication translation into English literary expression. The proposed technique for usage uses the image processing techniques and engineered knowledge systems to get the objective of sign video acknowledgment. To complete the proposed assignment execution it utilizes image processing techniques like outline investigating based on edge recognition, wavelet change, disintegration, widening, obscure disposal, commotion end, on training dataset. It likewise utilizes Histogram Orientation Gradient called HOG for shape highlight extraction and most vital part investigation for list of capabilities streamlining and diminishment. For result investigation, this paper utilizes diverse classification recordings such as day situation, family information, official information, relations and so on. Database of removed results are contrasted with the video encouraged with the framework as a contribution of the underwriter by a prepared indistinct derivation framework.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of SPWM And SVPWM cascaded h-bridge multilevel inverter","authors":"A. S. Kale, A. V. Tamhane, A. Kalage","doi":"10.1109/I2C2.2017.8321785","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321785","url":null,"abstract":"Large electric drives and utility applications require modern power electronics converter like cascaded H-bridge multilevel inverter (CHB) with separated DC sources is clearly the most practical topology for use as a power converter for medium & high power applications due to their modularization and extensibility. The H-bridge inverter eliminates the large number of bulky transformers, clamping diodes and flying capacitors. Cascaded multilevel inverter (MLI) is contemplated to be suitable for medium & high power applications. There are many pulse-width modulation (PWM) techniques developed for controlling multilevel inverter, among these, SVM is the most popular one due to its simplicity both in hardware and software. But the SVM becomes very difficult to achieve when the levels increases. To simplify the SVM at high level, several improved methods have been proposed in many literatures. In this report, SPWM and SVPWM controlled cascaded H-bridge multilevel inverter for large motor drives is designed, analysed and compared with conventional inverter, by simulating in MATLAB simulink software.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT enabled API for secure transfer of medical data","authors":"S. Sonune, D. Kalbande","doi":"10.1109/I2C2.2017.8321934","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321934","url":null,"abstract":"Internet of Things devices (IoT-D) have limited resource capacity. But these devices can share resources. Hence, they are being used in variety of applications in various fields including smart city, smart energy, healthcare etc. Traditional practice of medicine and healthcare is mostly heuristic driven. There exist big gaps in our understanding of human body, disease and health. We can use upcoming digital revolution to turn healthcare upside down with data-driven medical science. Various healthcare companies now provide remote healthcare services. Healthcare professionals are also adapting remote healthcare monitoring practices so as to monitor patients who are either hospitalized or executing their normal lifestyle activities at remote locations. Wearable devices available in the market calculate different health parameters and corresponding applications pass the information to server through their proprietary platforms. However, these devices or applications cannot directly communicate or share the data. So, there needs an API to access health and wellness data from different wearable medical devices and applications. This paper proposes and demonstrates an API to connect different wearable healthcare devices and transfer patient personal information securely to the doctor or health provider.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the complexity of matrix multiplication algorithm","authors":"P. Rathod, Ankit Vartak, Neha Kunte","doi":"10.1109/I2C2.2017.8321772","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321772","url":null,"abstract":"With the bird's eye view of many analyst's attentions in the last few years to know how companies are collecting and transmitting enormous amounts of information. As there are problems in transmitting large amount of data. This is a need of an hour to overcome the problems. The data can be compress such as word file or image file etc. to send the data efficiently. Compression must be done in such a way that loss of data is minimum (i.e. 0%). Image compression helps to overcome the problem of sending large images. In this Discrete Cosine Transformation (DCT) plays a crucial role. In DCT, for compression of JPEG images we have techniques of Quantization and encoding. In this whole work, we have used Custom matrix multiplication algorithm (CMM) for reducing the complexity of matrix multiplication (MM) problem. The results from the experiment when comparing with Naïve matrix multiplication and Strassen's matrix multiplication shows increase in the performance of DCT. As the performance have increased due to the less time and space complexity of Strassen's as compared to Naïve. As CMM is having less time and space complexity as compared to Strassen's algorithm we are expecting to have more increase in performance. The time required for compression and the size of the files after compression with different algorithms for different images helps to differentiate between the performances.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impacts of machine learning and artificial intelligence on mankind","authors":"Arpita Nayak, Kaustubh Dutta","doi":"10.1109/I2C2.2017.8321908","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321908","url":null,"abstract":"With each passing day and gradually as we move into future, smart or intelligent machines will slowly replace and enhance human capabilities in many areas. The intelligence exhibited by machines or softwares are often termed as “Artificial Intelligence” which is a subfleld of computer science. Artificial intelligence along with machine learning is now a potential game changer in the history of computing backed with strong data analytics. Study in this area of artificial intelligence has rapidly influenced the emergence of smart technologies that has a huge impact on our daily lives. The field of science, engineering, business and medicine has become smarter with prediction capabilities to smoothen our lives in our daily activities. The areas employing artificial intelligence has seen an increase in the quality and efficiency which has been illustrated in this paper.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parth Patni, K. Iyer, Rohan Sarode, Amitkumar R. Mali, Anant V. Nimkar
{"title":"Man-in-the-middle attack in HTTP/2","authors":"Parth Patni, K. Iyer, Rohan Sarode, Amitkumar R. Mali, Anant V. Nimkar","doi":"10.1109/I2C2.2017.8321787","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321787","url":null,"abstract":"Hyper Text Transfer Protocol Version 2 (HTTP/2) is the upgrade to the popularly used HTTP/1.1. This protocol has been created to enhance the already existing services and applications based on the older protocol with few modifications and rewriting. Thus, this has opened up to new possible vulnerabilities and attacks on them. HTTP/2 relies on Transport Layer Security (TLS) for its security. This paper intends to carry out Man-in-the-Middle (MITM) attack in an HTTP/2 environment by exploiting a known vulnerability of TLS. To the best of our knowledge, no study has been done on how MITM attacks can be launched against HTTP/2 services.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment analysis of customer product reviews using machine learning","authors":"Zeenia Singla, Sukhchandan Randhawa, Sushma Jain","doi":"10.1109/I2C2.2017.8321910","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321910","url":null,"abstract":"Today, digital reviews play a pivotal role in enhancing global communications among consumers and influencing consumer buying patterns. E-commerce giants like Amazon, Flipkart, etc. provide a platform to consumers to share their experience and provide real insights about the performance of the product to future buyers. In order to extract valuable insights from a large set of reviews, classification of reviews into positive and negative sentiment is required. Sentiment Analysis is a computational study to extract subjective information from the text. In the proposed work, over 4,000,00 reviews have been classified into positive and negative sentiments using Sentiment Analysis. Out of the various classification models, Naïve Bayes, Support Vector Machine (SVM) and Decision Tree have been employed for classification of reviews. The evaluation of models is done using 10 Fold Cross Validation.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing pattern recognition in social networking dataset by using bisecting KMean","authors":"Shilpa V. Gajbhiye, Gaurav B. Malode","doi":"10.1109/I2C2.2017.8321776","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321776","url":null,"abstract":"Databases today can range in size more than terabytes. Within these masses of data lies hidden information of strategic importance. So when there are lots of trees, how to find conclusions about the forest? The newest answer is mining of data, which is being used to increase revenues. Data mining is a process that uses a variety of data analysis tools to discover patterns and relationships in data that may be used to make valid predictions. This research uses social networking data set for pattern recognition, because it is one of the emerging application areas in data mining. We used Facebook 100 dataset and applied Bisecting KMeans algorithm on it, so that we would get better clustering outputs. Bisecting KMeans first bisects the data into 2 parts and selects the part with greater number of elements, then apply clustering on it again. This goes on till we have N Number of clusters. We would apply this to our dataset to get desired results. With this we are going to compare Bisecting K Mean algorithm with other data mining algorithm. And finally we are going to find out different pattern from social networking dataset.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117326181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel fault monitoring mechanism on overhead transmission line in power grid","authors":"N. Korde, Narendra Bhagat","doi":"10.1109/I2C2.2017.8321832","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321832","url":null,"abstract":"Renewable energy based distributed generators (DGs) play an important part for generation of electricity. Distributed generation is supported by wind, solar energy, fuel cells and micro turbines using mini hydro, can provide significant momentum in future. A micro grid is distribution level network which includes many loads and DG source that operates as one combination load or generation supply. Micro grids operate at normal condition as well as faulty condition. We are using MATLAB Simulink's in this paper for controlling and monitoring the fault location of small portion of distribution network. In Smart Grid AC and DC both sources are used. We used both sources in model. If fault occurs in AC line, DC can give desired output. Here we simulate two major faults on transmission line and rectify it by using different electrical equipment. Here we analyze the fault current and voltage and protect the line by using breakers and transformer. The test results of the given simulation prove the usability of the system in terms of the parameters like voltage across the line and current through the line.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}