K. Aishwarya, M. Harish, S. Prathibhashree, K. Panimozhi
{"title":"Survey on Automated Aquponics Based Gardening Approaches","authors":"K. Aishwarya, M. Harish, S. Prathibhashree, K. Panimozhi","doi":"10.1109/ICICCT.2018.8473155","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473155","url":null,"abstract":"Aquaponics is a system which combines the aquaculture & hydroponics that grows fish and plants together in one system. It uses fish wastes to provide essential nutrients to the plants and in return the plants will purify the water and gives it back to the fishes. The purpose of this paper is to build an efficient system by implementing aquaponics system by using the technology of IOT (Internet of Things). By creating an automated System with the help of sensors interfaced with the Arduino board, it possible to automate fish feeding and water supply to the plants at the regular interval of time. Existing system that combines these technologies must overcome the fundamental issues like cost, food quality control and limited grow. In this paper we intend to propose a kit which contains all these features mentioned above, and that is helpful to provide the basic organic vegetation for the home.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prasad Birmole, M. Kamble, Sayali Naik, Anjali Sadamate, Heenali. V. Korgaonkar
{"title":"Designing and Implementation of Chemical Mixing and Filling Bottles Using PLC","authors":"Prasad Birmole, M. Kamble, Sayali Naik, Anjali Sadamate, Heenali. V. Korgaonkar","doi":"10.1109/ICICCT.2018.8473096","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473096","url":null,"abstract":"This project is about designing and Implementation of chemical mixing and filling bottles using PLC. This topic deals with operational cost is low, less power consumption, flexibility and accuracy to this project. It also reduces human effort and time. This proto type has been designed to fulfill various requirements regarding PLC. This paper has designed the ladder diagram of PLC. Application of this project is mixing of two different chemical and fill bottles without human effort with the help of PLC. For this process DELTA PLC is used it is the heart of the project. ISPSOFT 3.02 software is used for programming. No of electrical and electronics devices controlled and operated by using PLC as submersible motor, sensors, solenoid valves, conveyor belt. Applications of this system are chemical mixing industry, mineral water industry, milk industry etc.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134414923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shraddha Parekh, D. Parikh, Srushti Kotak, Prof Smita Sankhe
{"title":"A New Method for Detection of Phishing Websites: URL Detection","authors":"Shraddha Parekh, D. Parikh, Srushti Kotak, Prof Smita Sankhe","doi":"10.1109/ICICCT.2018.8473085","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473085","url":null,"abstract":"Phishing is an unlawful activity wherein people are misled into the wrong sites by using various fraudulent methods. The aim of these phishing websites is to confiscate personal information or other financial details for personal benefits or misuse. As technology advances, the phishing approaches used need to get progressed and there is a dire need for better security and better mechanisms to prevent as well as detect these phishing approaches. The primary focus of this paper is to put forth a model as a solution to detect phishing websites by using the URL detection method using Random Forest algorithm. There are 3 major phases such as Parsing, Heuristic Classification of data, Performance Analysis in this model and each phase makes use of a different technique or algorithm for processing of data to give better results.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Hand Gestures from Wearable IMUs using Deep Neural Network","authors":"Karush Suri, Rinki Gupta","doi":"10.1109/ICICCT.2018.8473301","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473301","url":null,"abstract":"IMUs are gaining significant importance in the field of hand gesture analysis, trajectory detection and kinematic functional study. An Inertial Measurement Unit (IMU) consists of tri-axial accelerometers and gyroscopes which can together be used for formation analysis. The paper presents a novel classification approach using a Deep Neural Network (DNN) for classifying hand gestures obtained from wearable IMU sensors. An optimization objective is set for the classifier in order to reduce correlation between the activities and fit the signal-set with best performance parameters. Training of the network is carried out by feed-forward computation of the input features followed by the back-propagation of errors. The predicted outputs are analyzed in the form of classification accuracies which are then compared to the conventional classification schemes of SVM and kNN. A 3-5% improvement in accuracies is observed in the case of DNN classification. Results are presented for the recorded accelerometer and gyroscope signals and the considered classification schemes.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121210866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Nagabushanam, S. Radha, Sushmita Selvadass, Kezia Kanishka Joseph
{"title":"Gabor filter based Image segmentation for Disease Detection using VHDL","authors":"P. Nagabushanam, S. Radha, Sushmita Selvadass, Kezia Kanishka Joseph","doi":"10.1109/ICICCT.2018.8473083","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473083","url":null,"abstract":"Diseases detected in early stage can be cured easily. Image segmentation is a process which segments an image and produces information to analyse tumor in an image. Existing segmentation methods consume more time to analyse the image and detect the tumor. In our paper we used Xilinx core IP generator along with MATLAB to simplify a complex image and extract useful information from an image to detect the tumor. By using Gabor filter with CORDIC algorithm, the storage memory reduces; speed of data rate increases and noise is removed from the image. By obtaining. coe file from Xilinx and applying to MATLAB will give the percentage of tumor in the image.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taohidul Islam, M. Sah, S. Baral, Rudra RoyChoudhury
{"title":"A Faster Technique on Rice Disease Detectionusing Image Processing of Affected Area in Agro-Field","authors":"Taohidul Islam, M. Sah, S. Baral, Rudra RoyChoudhury","doi":"10.1109/ICICCT.2018.8473322","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473322","url":null,"abstract":"Plant disease is defined as an abnormal physiological process that distorts the plant's normal structure, growth and function. Disease reduces quality as well as quantity of the crops which in turn affects the economy of country like Bangladesh where agriculture is the main occupation. Since Rice is the major crop, classification of disease in paddy is very important as it prevents the losses in the yields and quantity. Classification of rice disease includes visually observable patterns and color of the affected portion. Manual observation of patterns and colors to classify the diseases require excessive work and appears to be less useful while dealing with non-native diseases. This paper presents a new technique to detect and classify the diseases based on percentage of RGB value of the affected portion using image processing. Once the percentage of RGB from the affected region is extracted and grouped into various classes, they are fed to a simple classifier called Naive Bayes which classifies the disease into various categories. This technique has successfully detected and identified three rice diseases namely rice brown spot, rice bacterial blight, and rice blast. This technique is efficient and faster because it uses only one feature i.e. RGB values of the affected portion which requires minimum computation time to identify and classify the diseases. Rather than processing the whole leaf, this technique even successfully detects the diseases using only a small sample of leaf containing the affected portion for rice disease.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116956246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rohan Vaidya, D. Trivedi, Sagar Satra, Prof. Mrunalini Pimpale
{"title":"Handwritten Character Recognition Using Deep-Learning","authors":"Rohan Vaidya, D. Trivedi, Sagar Satra, Prof. Mrunalini Pimpale","doi":"10.1109/ICICCT.2018.8473291","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473291","url":null,"abstract":"In this paper we present an innovative method for offline handwritten character detection using deep neural networks. In today world it has become easier to train deep neural networks because of availability of huge amount of data and various Algorithmic innovations which are taking place. Now-a-days the amount of computational power needed to train a neural network has increased due to the availability of GPU's and other cloud based services like Google Cloud platform and Amazon Web Services which provide resources to train a Neural network on the cloud. We have designed a image segmentation based Handwritten character recognition system. In our system we have made use of OpenCV for performing Image processing and have used Tensorflow for training a the neural Network. We have developed this system using python programming language.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Engdaw Ayalew Tessfaw, Mr. Bhupendra Ramani, Mr. Tadesse Kebede Bahiru
{"title":"Ethiopian Banknote Recognition and Fake Detection Using Support Vector Machine","authors":"Mr. Engdaw Ayalew Tessfaw, Mr. Bhupendra Ramani, Mr. Tadesse Kebede Bahiru","doi":"10.1109/ICICCT.2018.8473013","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473013","url":null,"abstract":"Currency recognition is an important task in numerous automated payment services and used to categorize the banknotes of different nation. The importance of automatic methods for currency recognition has been increasing in the time being because of circulation of fake notes is increased in today's economy. This recognition system contains basic image processing techniques such like image acquisition, image preprocesses, extract features and classification using support vector machine. Basically camera or scanner used for image acquisition. The images of currency processed using a variety of preprocessing techniques and different features of the image extracted using local binary pattern technique, once the features are extracted it is important to recognize the currency using effective classifier called Support vector machine and Finally a prototype able to recognize Ethiopian paper currency with accuracy of 98% shows high performance classification model for paper currency recognition and also verify the validity of given banknotes with average accuracy of 93% rate.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114677357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Enhanced Medical Data Server for Cardiac Arrest Care Analysis Using DNSSEC","authors":"M. Shobeetha, A. Shaik Abdul Khadir","doi":"10.1109/ICICCT.2018.8473330","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473330","url":null,"abstract":"In cardiac arrest risk is still a main cause of death in worldwide. It affects mostly the elderly patients in earlier but nowadays it attacks even the low aged peoples. The cardiac attack analysis will reduce the cause of death and makes the people aware about the disease. The data mining techniques are used to make the proper analysis from the medical patient historical data obtained from the data servers of specialized hospitals. The medical data servers are kept most their data in more secure through the encryption algorithms. Here we implement the data security through the DNSSEC cryptography algorithm. In existing DNS Security, ECC with RSA may implement for data security. In this proposed work, new framework has been designed to implement the cryptographic algorithms through the DNSSEC implementation which is more secure from the IP fragmentation and Denial of Service attacks. We extend our work with cryptographic feature in the data mining analysis mechanism proposed.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125107212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization of News Feed Data using Lexicon-based Approach","authors":"Pujitha Appasani, M. Latha","doi":"10.1109/ICICCT.2018.8473244","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473244","url":null,"abstract":"Presently these days people enjoy reading online news articles. The news articles come from long range informal communication destinations. The issue with the news articles in the online networking sites is that we can't decide whether the news is genuine or counterfeit. We apply different techniques to determine the extremity of the news article. The extremity of the article is calculated using the lexicon-based approaches. We utilize the assumption score to decide the extremity and arrange the news articles as genuine, phony or nonpartisan. Thusly, opinion examination of online networking substance might be of enthusiasm for various associations, particularly in security and law implementation segments. This paper displays another dictionary based notion investigation calculation that has been planned with the fundamental spotlight on-going Twitter content examination.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}