{"title":"Modeling and designing of solar photovoltaic system with 3 phase grid connected inverter","authors":"D. Sarkar, H. Dalvi","doi":"10.1109/I2CT.2017.8226283","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226283","url":null,"abstract":"This paper is proposed to convert the Solar PV DC voltage into AC voltage by using 3 phase inverter and getting sinusoidal AC output voltage. To convert solar PV which is in DC needs to be converted into AC by using the devices like 3 phase inverter and boost converter. The solar PV is a variable DC that is to be converted into pure DC for which will convert variable DC to pure DC. The MPPT is designed and is applied to boost converter which increases the solar PV's efficiency. Then the output of boost converter which is DC voltage is given to 3 phase inverter. The 3 phase inverter which is connected to output of boost converter will convert the DC voltage into AC and we get sinusoidal AC. Finally all the devices are simulated and synchronized together and we have got appropriate output.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temperature distribution in cylindrical regions of human body incorporating effect of age","authors":"Sonia Shivhare, Y. Shukla, N. Khan","doi":"10.1109/I2CT.2017.8226276","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226276","url":null,"abstract":"The drive of the current study is to present a mathematical model about the effect of age on temperature distribution in cylindrical regions of Human body. The model has been developed for one dimensional steady state case. The model includes other processes contributing significantly towards thermo-regulation which include perfusion of blood from body core to the peripheral tissues and the tissue metabolic heat generation. The superficial surface of the body is assumed to be exposed to the environment and heat loss takes place by conduction, convection, radiation, and evaporation. Appropriate boundary conditions have been outlined. The finite element method is used to find the results and conclusion.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cbica: Correlation based incremental clustering algorithm, a new approach","authors":"Kaustubh Shinde, Preeti Mulay","doi":"10.1109/I2CT.2017.8226138","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226138","url":null,"abstract":"With progress in the area of computer science, it is achievable to read, process, store and generate information out of the available data. Humongous amount of data is generated, which is of mixed type, including time-series, Boolean, spatial-temporal and alpha-numeric data. This data is generated at a very giant speed and volume, which makes difficult for the traditional clustering algorithms to create and maintain the desired clusters. Thus, the proposed system encourages incremental clustering using a non-probability based similarity measure. The experimental results, of Correlation Based Incremental Clustering Algorithm (CBICA), which are obtained using the Pearson's coefficient of correlation, are compared with the experimental results of the Closeness-Factor Based Algorithm (CFBA), which uses the probability based similarity measures. The threshold computation is done to decide the cluster members in the post clustering phase, to adapt influx of new data. Wherein the new data is accommodated in the available clusters or new clusters are formed, depending upon the threshold values.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel modeling and analysis with mineralogy based spectroscopic dielectric model in wireless underground sensor networks","authors":"K. A. Nethravathi, S. Shankar","doi":"10.1109/I2CT.2017.8226112","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226112","url":null,"abstract":"This paper develops, a channel model forpropagation in Wireless Underground Sensor Network (WUSN) under three different communication scenarios viz: UG-UG, UG-AG and AG-UG, using Mineralogy Based Spectroscopic Dielectric Model (MBSDM). This is preferred over the Peplinski Soil Dielectric model for calculating the values of Complex Dielectric Constant (CDC) for a given soil type based on various parameters inherent to the soil. The path loss captures the effects of environment parameters such as sand or clay content, horizontal distance between two sensor nodes under consideration, burial depth and Volumetric Water Content (VWC) of the soil sample, including system parameters such as the operating frequency of the transmitted signal. This study allows us to realize the path loss and received power varies with the given set of parameters. The propagation characteristics between the sensor nodes are investigated in MATLAB environment.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115050414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android malicious application detection using permission vector and network traffic analysis","authors":"Satish Kandukuru, R. Sharma","doi":"10.1109/I2CT.2017.8226303","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226303","url":null,"abstract":"In this technology world, smartphones are greatly adopted by people due to the need of personal communication, Internet and many more requirements. Users are attracted to use the android operating system due its availability for low-cost and millions of freely available applications. The popularity of android operating system is also welcomes the attackers. Statistics have shown that, the growth of android malware is becomes double by every year. Hence android platform is more vulnerable to malwares. Researchers are proposed various models. Some of these models are completely fail to detect unseen variants of malware, while remaining models are inefficient to detect new malware families. In this paper, we briefly explain about android architecture, structure of android application and also characterized android malware based on their installation, activation and payloads types. We proposed a hybrid model to detect the malware based on permission bit-vector and network traffic. We constructed a decision tree classifier to detect the android malware. Our results show that combination of permission bit-vector and network traffic analysis is highly efficient by achieved 95.56% of detection accuracy.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing virtual machine images of cloud by encryption through Kerberos","authors":"S. Islam, M. Rahman","doi":"10.1109/I2CT.2017.8226293","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226293","url":null,"abstract":"The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VM) images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115997270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tools of ict in teaching and learning at public and private universities of yemen: A comparative study","authors":"Kamal Abdulraqeb Al-Sobaihi, Preeti Agrawal","doi":"10.1109/I2CT.2017.8226203","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226203","url":null,"abstract":"This is an exhaustive study on the use of ICT tools in teaching and learning in the public and private universities in Yemen. The purpose of this study was to ascertain the scope of ICT usage among students; and to assess the problems and challenges they have to address in utilizing this facility. The researcher prepared a questionnaire to gather data from a group of 360 students from six private universities and 360 students from three public universities of Yemen. This was to obtain answers for four important questions. The data were collected, analyzed, sorted and tabulated and found a disparity in the usage of ICT tools by students of Public and Private Universities. Apart from this, aversion towards acclimatizing with new technologies is one of the factors causing this inadequacy.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring differential evolution algorithm for content based image retreival system","authors":"Prandya Vikhar, P. Karde","doi":"10.1109/I2CT.2017.8226320","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226320","url":null,"abstract":"Content Based Image Retrieval (CBIR) system receives paramount importance now days. This is because of its wide applicability found in many areas including medical, science, security, Bioinformatics and entertainments. It has emerged as one of the growing field of research in engineering and the sciences. CBIR system searches large image database based on the contents of the images. The recent work carried out in this field is focused to achieve efficiency and accuracy in the image retrieval process. The major limitations encountered during review of the literature are an effective representation of image by extracting visual contents, mismatches found due to semantic gap between image representation and user's interpretation of the image and high dimensional feature vectors. This paper mainly focuses on two problems, feature extraction techniques to effectively represent the image and semantic gap. To attenuate the problems identified, the paper presents a proposal of the novel framework to optimize Content Based Image Retrieval system using Differential Evolution approach. In addition, it presents the concept of relevance feedback to reduce the semantic gap to improve the result. Besides this a complete background which is essential to understand and develop the concept of CBIR system is discussed.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114740436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invitro cytotoxic study of aloe vera whole leaf extract on PBMC and breast cancer cell line","authors":"Piyali Basak, Samrat Paul, Ranabir Majumder","doi":"10.1109/I2CT.2017.8226106","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226106","url":null,"abstract":"Many anticancer drugs currently used have an origin from natural sources. It is reported that in between 1981 and 2006, 47.1% of the 155 clinically approved anti-cancer drugs, were unmodified natural products or their semi-synthetic derivatives or even synthesized molecules based on natural models [4]. Aloe vera is one of the oldest known medicinal plants. Studies show that the Aloe vera leaf extract is effective on various cancers like colon cancer, neuroectodermal cancer [1,2] but there is very less sufficient data on breast cancer. Therefore, we evaluate the effect of Aloe leaf extract on breast cancer cell. Phytochemical test of the extract confirms presence of Alkaloids, Phenolic compounds. The antioxidant activity of such phytochemicals are very useful to inhibit cancer [3,4,19]. MTT Assay was performed on PBMC and MCF-7 cell line with aloe vera extract. Experimental data suggest that Aloe vera whole leaf extract significantly increases the cytotoxic effect on human breast cancer cell compare to normal cell (PBMC). Our study evaluated specific cytotoxic effect of Aloe vera extract on human breast cancer cell and further study is required to develop Aloe vera extract base drug for the treatment of breast cancer.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123373787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient technique for subpixel accuracy using integrated feature based image registration","authors":"Kinjal Parmar, Dippal Israni, Arpita Shah","doi":"10.1109/I2CT.2017.8226134","DOIUrl":"https://doi.org/10.1109/I2CT.2017.8226134","url":null,"abstract":"Image registration which is frequently required in Medical, Computer vision and remote sensing field is used to align two images geometrically. This paper presents efficient method for providing speedup and more accuracy in compared to current state of the art existing methods. This paper focuses on Feature detection using Harris detector which gives best result based on performance and has firm invariance to scale, rotation angle, illuminance and noise compare to other feature detection algorithms. Also Feature vector is generated for each detected interest point using Histogram of gradient. Generated feature vector are matched in both image using Best bin first (BBF) to generate accurate Interest point pair and to align the sense image. An additive step is applied to remove outliers and to improve registration accuracy. An experimental result shows that the present method using Harris detector, Hog descriptor, BBF and RANSAC provides higher precision and also it is more robust.","PeriodicalId":343232,"journal":{"name":"2017 2nd International Conference for Convergence in Technology (I2CT)","volume":"88 423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125000761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}