Saurabh B. Jarad, Vishal D. Lohar, Shubham P. Choukate, S. Mangate
{"title":"Automatic Optimization and Control of Power Factor, Reactive Power and Reduction of THD for Linear and Nonlinear Load by Using Arduino UNO","authors":"Saurabh B. Jarad, Vishal D. Lohar, Shubham P. Choukate, S. Mangate","doi":"10.1109/ICICCT.2018.8473191","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473191","url":null,"abstract":"Aim of this paper is to discuss about power quality of the AC system, which has become a great concern due to the rapidly increased use of inductive loads, electronic equipment (Linear and Non linear load). We are wasting a part of the electrical energy everyday due to the lagging power factor in the inductive loads which is used in the system. Hence, there is an urgent need to avoid this wastage of energy, lower power factor and reactive power results in poor reliability, safety problems and high energy cost. The power factor of power system is continuously changing due to differences in the size and number of the equipment being used at a time. This makes it challenging to balance the inductive and capacitive loads continuously. Many control methods for the Power Factor Correction (PFC) were proposed. This paper presents a computationally accurate technique to design and development of a single phase as well as three phase power factor correction, reactive power and THD compensation using Arduino Uno micro-controlling chip. The hardware implementation is developed by using Arduino Uno board.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Fuzzy Logic Approach for Calculation of Health Index of Power Transformer","authors":"Arun Chantola, Manisha Sharma, A. Saini","doi":"10.1109/ICICCT.2018.8473316","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473316","url":null,"abstract":"The calculation of health index is a very useful tool for maintenance prediction of transformer. The overall health condition of a transformer is directly evaluated by diagnostic test performed in the insulation of the transformer. Then results of these tests are used for timely health evaluation and remnant life estimation. This shows the insulation degradation in transformer with the help of different transformer parameters. These parameters mostly act at the same time and due to these reasons transformer health index evaluation would be difficult. In this paper different parameter like DGA, SFRA, water content IFT, UV Spectrophotometry and hot spot temperature of transformer are used to create a fuzzy sub-models for assessment of the respective critical conditions of the transformer. Overall fuzzy model is developed by integrating fuzzy sub models. This fuzzy model provides the facility to identify the insulation condition and its criticality level. The integrated fuzzy sub model approach decreases the complexity in the evaluation of health index and life estimation. The health index helps us to know about condition of transformer so that necessary actions can be taken at appropriate time.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121160097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fractional order OTA -C current-mode all-pass filter","authors":"D. Kamath, S. Navya, N. Soubhagyaseetha","doi":"10.1109/ICICCT.2018.8473097","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473097","url":null,"abstract":"In this paper, an operational transconductance amplifier (OTA) based fractional order all pass filter (FOAPF) of order $boldsymbol{alpha} [0 < boldsymbol{alpha} < 1]$ is presented. The FOAPF uses two DO-OTAs (dual output OTAs) and single fractional order capacitor (FC) of non-integer order $boldsymbol{alpha}$. A value of $boldsymbol{alpha}$ as 0.5 and 0.3 is taken for FC in our investigation. The proposed FOAPF is verified using PSPICE tool. Simulated AC responses are found to be in good agreement with theory.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122974032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mohan Sai, K. Naresh, S. Rajkumar, Mohan Sai Ganesh, Lok Sai, A. Nav
{"title":"An Infrared Image Detecting System Model to Monitor Human with Weapon for Controlling Smuggling of Sandalwood Trees","authors":"S. Mohan Sai, K. Naresh, S. Rajkumar, Mohan Sai Ganesh, Lok Sai, A. Nav","doi":"10.1109/ICICCT.2018.8473140","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473140","url":null,"abstract":"Sandalwood is one of the most valuable trees in the world. Sandalwood robberies are increasing day by day as there isn't enough security being provided for them. Eventually they are getting one of the most endangered trees in our country. So, to protect the trees, in this paper proposed a method using inception-v3 model. The main objective is to detect if there is any person in the forest particularly in the restricted time. The importance of infrared images are that these can be visible even in the night time (i.e. even if no light). The main role is to create a classifier which detects the type of weapon hold by the person. This paper is based on Inception-v3 model of tensorflow. We use the technique transfer learning to retrain the infrared images. The implementation is done based on benchmark dataset OTCBVS under “Terravic Weapon Infrared Database”. This paper propose a model with the 99% accuracy.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstrating Different Phishing Attacks Using Fuzzy Logic","authors":"Shweta Shirsat","doi":"10.1109/ICICCT.2018.8473309","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473309","url":null,"abstract":"Phishing has increased tremendously over last few years and it has become a serious threat to global security and economy. Existing literature dealing with the problem of phishing is scarce. Phishing is a deception technique that uses a combination of technology and social engineering to acquire sensitive information such as online banking passwords, credit card or bank account details [2]. Phishing can be done through emails and websites to collect confidential information. Phishers design fraudulent websites which look similar to the legitimate websites and lure the user to visit the malicious website. Therefore, the users must be aware of malicious websites to protect their sensitive data [1]. But it is very difficult to distinguish between legitimate and fake website especially for nontechnical users [4]. Moreover, phishing sites are growing rapidly. The aim of this paper is to demonstrate phishing detection using fuzzy logic and interpreting results using different defuzzification methods.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secured IoT Based Webcare Healthcare Controlling System using BSN","authors":"S. S. Kale, D. Bhagwat","doi":"10.1109/ICICCT.2018.8473248","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473248","url":null,"abstract":"It is essential to screen different therapeutic parameters and post operational information. To get to the patient's restorative parameters in nearby and remote range, medicinal services correspondence utilizing Internet of Things (IoT) technique is adjusted. The principle target of this venture is to transmitting the patient's health observing parameters through remote correspondence. These info information are transferred in cloud server and transmitted to the PC and portable for family and specialist's reference. Progresses in data and correspondence advances have lead to the rise of Internet of Things (IoT). Nowadays utilisation of IoT innovations have arranged doctors and patients for connecting them to different restorative regions in medicinal services environment (for example, ongoing observing, quiet data administration, and social insurance administration). The body sensor arrange (BSN) innovation is one of the centre advances of IoT developments in social insurance framework, where a patient is observed utilizing a collecting of tiny powered and lightweight remote sensor hubs. Be that as it may, the improvement of this new innovation in social insurance applications without considering security makes understanding protection powerless. In this project, at to start with, we highlight the significant security prerequisites in BSN-based advanced medicinal services framework. In this way, we propose a safe IoT-based human services framework utilizing BSN, called BSN-Care, which can productively finish those prerequisites.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Personal Healthcare IoT System model using Raspberry Pi 3","authors":"Soumya Yattinahalli, R. M. Savithramma","doi":"10.1109/ICICCT.2018.8473184","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473184","url":null,"abstract":"Information and communication technologies are growing rapidly with the emergence of new technology called Internet of things (IoT). Communication network helps IoT devices to connect physically. Various devices in IoT systems interacts with each other and share information directly and can be sent to cloud, this will collect, record and analyze information more quickly and accurately. Internet of Things and Cloud Computing can be bought together to improve the performance capabilities and utilization of resources. Security challenges such as Authentication, confidentiality, Privacy, Trust, Integrity are analyzed these will affect the IoT performance, so various algorithms are used to overcome security issues. Trust within IoT devices plays a vital role in Health IoT systems. This paper describes about the novel proposed Healthcare IoT system model, aims at providing the information of current health status of the patient. The technology helps him to get an immediate response about nearby hospitals and availability of physicians using Raspberry Pi 3. The paper provides solution to the particular patient using technology when he/she enters into the worst location because of some unavoidable situations even though patient knows that the particular location has worst condition which is not suitable for his/her health condition.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. NithyaPriya, C. Gowrishankara, U. N. Vasanthakumari
{"title":"Testing of Advanced Features of High Throughput Satellites","authors":"V. NithyaPriya, C. Gowrishankara, U. N. Vasanthakumari","doi":"10.1109/ICICCT.2018.8473261","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473261","url":null,"abstract":"High Throughput Satellites (HTS) are built in ISRO with new technological elements and advanced features. These advanced features are implemented with intelligence of auto system reconfiguration and this reduces manual intervention in spacecraft operations from ground stations. Checkout team has major contribution in realising the spacecraft in terms of testing. Checkout team participate right from design review of subsystem till launch. Responsibility of Checkout includes study of spacecraft configuration, preparation of test plan and procedures, execution of test procedures during various test phases and generation of Anomaly Report if any deviation is observed in spacecraft performance. This paper briefs on the advanced features available in HTS, contribution of Checkout Team in generation of test plan and procedure for these features and execution of test during various IST (Integrated Satellite Test) phases on ground.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129759037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Document Sharing and Access Control on Cloud for Corporate User","authors":"Kanchan S. Gajghate, R. Mante","doi":"10.1109/ICICCT.2018.8473095","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473095","url":null,"abstract":"Cloud document outsourcing is a very popular trend for small scale companies to maintain their documents online. To share data with intended user, this technique provide better technical management. Providing data confidentially is a challenge against curious cloud service provider. Fine-grained data access control is current research topic in public cloud. In TAFC model, they combined time and attribute factor for cloud storage. In this paper, we embedding time release encryption into ABE (Attribute-based Encryption). We propose new advanced ABE techniques to overcome the drawbacks of CP-ABE & KP-ABE. To make the system attacks free and two factor authentication system in which first factor is traditional user id and password authentication and second factor is mobile based authentication. Further We design an efficient approach for time-sensitive data to give fine-grained access control. In existing system, in CP-ABE technique, the access policy attribute will be stored in secret key. Also if user wants to update or remove attributes, he/she have delete or decrypt existing document and again encrypt it. To overcome this problem we will store the access policy attributes separately in meta-data file. The meta- data file secret key and original document file secret keys are dependent on each other. In our proposed system, to change or update attributes any time without document decryption. When a user is update or remove their attribute. By using our system cipher text size will remain constant.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133060409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Homera Durani, Mitul Sheth, Madhuri V. Vaghasia, Shyam Kotech
{"title":"Smart Automated Home Application using IoT with Blynk App","authors":"Homera Durani, Mitul Sheth, Madhuri V. Vaghasia, Shyam Kotech","doi":"10.1109/ICICCT.2018.8473224","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473224","url":null,"abstract":"By the virtue of blooming automation industry and wireless connectivity, all the devices within the home can be connected. Today's World is moving to digitalization where everything is made easy and comfortable for people i.e. Young youth as well as senior citizen. Smart Automated House Application using IOT (Internet of Thing)is a system where basic house facility can be handled by device from any place such as ON and Off of Light, Fan, AC, Water pump, Gardening of Water. One can handle all this things with help of device NodeMCU ESP8266 [1], Android Application, Internet Connection. This paper include functionality of node esp8266 are connected with either of above given house application like fan, light, water pump, gardening with help of coding and hosting online with web server. All the functionality is handled by Mobile App created in android application, from which house application are controlled with help of internet. This paper is clarifying that monitoring of circuit devices through wireless using Node MCU and controlling using App Blynk. According to requirement of need one can connect multiple device like sensors, appliance and many more till 8.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132217604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}