D. Mahato, Sangeeta Yadav, G. Saxena, Amit Pundir, Rajshekhar Mukherjee
{"title":"Image Processing and IoT Based Innovative Energy Conservation Technique","authors":"D. Mahato, Sangeeta Yadav, G. Saxena, Amit Pundir, Rajshekhar Mukherjee","doi":"10.1109/CIACT.2018.8480089","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480089","url":null,"abstract":"This paper illustrates an innovative, real-time, energy monitoring system in educational institutions, using MATLAB, image acquisition and processing mechanism. Smart Innovative Method for Energy (E-SIM) conservation proposed here, designs, deploys and evaluates energy consumption patterns of laboratories, lecture theaters and halls in institutions. Specially designed hardware is used to monitor energy consumption pattern of each laboratory or lecture hall. The data is then matched with the time-table and occupancy level of that laboratory or lecture hall using cloud based data analytics and IoT (Internet of Things) in real time. If the energy consumption doesn’t match the time-table or the occupancy level, an alert is generated for further investigation and action. Matching energy consumption patterns with the time-table of laboratories and lecture halls in an educational institution over a period of time can result in significant energy saving. The E-SIM may help institutes design cost-effective recommendations to address energy inefficiencies and implement new initiatives. The complete design includes energy infrastructure (metered laboratories and lecture theaters), energy routing within institutes, web applications and data analytics. The E-SIM helps monitor the utilization of energy in organizations resulting in efficient energy management by them thereby reducing their environmental impact. By monitoring plug loads in each laboratory or lecture theatre, the number of devices using energy, the number of occupants and the actual energy use can be better managed. This is the vital information required to take actions and policy decisions for saving energy and it may, in future, provide the real time on-line digital ability to on-off control at each plug.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lossless and Robust Digital Watermarking Scheme for Retinal Images","authors":"Abhilasha Singh, M. Dutta","doi":"10.1109/CIACT.2018.8480151","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480151","url":null,"abstract":"Medical images are watermarked with patient details to maintain patient’s privacy and to address other security issues during transmission and process of storage in large distributed databases. Conventional watermarking does not suit the different requirements of medical imaging as it brings in some modifications which is not at all acceptable in case of medical images. This paper presents a Wavelet transform-Singular Value Decomposition based robust zero-watermarking technique for medical images to address the privacy and security issues. Unlike conventional watermarking, the proposed method conserves the reliability of the cover image without bringing any artifacts and without any change in the critical information contained in the medical image. The performance of the scheme is assessed with tele-ophthalmological images. The simulation results reveal the robustness of the proposed technique against various image processing attacks and indicate its suitability for safe exchange of medical images among remote medical practitioners.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection of Optimal Method of Software Release Time Incorporating Imperfect Debugging","authors":"Shubhra Gautam, Deepak Kumar, L. Patnaik","doi":"10.1109/CIACT.2018.8480133","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480133","url":null,"abstract":"The demand of highly reliable software systems has resulted in rigorous testing of the software. A major part of the software development cost is assigned to the testing phase. The optimal release time prediction is the biggest challenge for software developers these days. In the literature a number of models have been proposed and lot of study is done towards assessment of software release time. The work carried out in the literature for determination of Software release time problem focuses on the crisp optimization problem and fuzzy optimization problem. This paper discusses the release time problem using neural network. A Fuzzy release time problem is formulated considering maximization of cost and reliability taken as a constraint. The problem is solved with neural network approach and the results are compared with crisp and fuzzy optimized results. The result is also validated on real time data set.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Accuracy based Video Surveillance system by Local Mean-Based K-Nearest Centroid Neighbour Algorithm","authors":"Ruchikakaushik, A. Sharma","doi":"10.1109/CIACT.2018.8480389","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480389","url":null,"abstract":"In recent times, there has been a tremendous increase in criminal and terrorist activities around the globe. Therefore in light of the increasing number of such events, there has arisen a need for a 24*7 surveillance system that is governed by computerized monitoring. These systems work on the basis of machine learning that recognizes harmful activities or movements on the basis of the database that has been given to it. Automatically, when the system recognizes such activities it activates the alarm system. Here, we have implemented LMKNCN (Local Mean-Based K-Nearest Centroid Neighbour) through MATLAB.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohan Mishra, A. Bhattacharya, Anushikha Singh, M. Dutta
{"title":"A Lossless Model for Generation of Unique Digital Code for Identification of Biometric Images","authors":"Mohan Mishra, A. Bhattacharya, Anushikha Singh, M. Dutta","doi":"10.1109/CIACT.2018.8480297","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480297","url":null,"abstract":"Security of biometric data is a common problem in this modern era during transmission and storage of biometric data. This paper proposes zero-watermarking scheme that resolves the problem of biometric data security without tempering the biometric data. The biometric pattern of iris is employed to create digital binary code for iris images. This created binary pattern is combined with watermark which is identity of associated person to create a unique ID. This unique ID is completely uninformative which does not reveal the biometric information as well as person’s identity. At the receiver end, person ID can be recovered by the certmed personnel only on permission of the created unique ID. Experiments are done on the openly accessible CASIA dataset available on iris images and achieved results which are motivating in the path of biometric image identification and certmcation. The proposed work is a novel method which can be used in biometric security applications and can be very helpful to detect identity fraud.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing the Output Power and Efficiency of Solar Panel by Using Concentrator Photovoltaic (CPV) and Low Cost Solar Tracker","authors":"D. Rana, G. Kumar, A. Gupta","doi":"10.1109/CIACT.2018.8480199","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480199","url":null,"abstract":"Research shows that the total solar energy received within one hour on the earth exceeds the total energy spent in a whole year. Photo-voltaic (PV) is one the most adopted mode of converting solar energy into electrical energy but due to high cost and low efficiency, it has shown low acceptance in developing countries especially in Africa. Therefore, there is a need to improve the efficiency and reduce the cost per unit output by improving the performance of PV module system. Various researches have been done on this matter but none is focusing on making this technology available in developing countries due the cost of solutions being offered. In this research work, it focuses on providing a cheap and efficiency solution by using low cost mirrors, lens, light focusing concentrators and a light tracking system.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"35 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message Level Security Enhancement For Service Oriented Architecture","authors":"Anurag Shashwat, Deepak Kumar, Lovneesh Chanana","doi":"10.1109/CIACT.2018.8480347","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480347","url":null,"abstract":"Service-oriented architecture (SOA) is a technique to develop application by assembling different services. It is an approach to make applications more responsive to meet the requirement of changing business environment. As per SOA, services are repeatable business task which combines in a series to meet the consumer demand. This series of the services are called as business application. Securing all these services of an application is difficult task. Security requirements should be managed when an application is used locally or in conventional closed systems so that security can be applied to corresponding message. Service oriented architectural project uses different services to build an application. These services are independent of the implementation which causes different security configuration for the services within an application. In this case, Message level security can be used for end to end security implementation. Many techniques have been already provided by different researchers to increase security using message level security implementation. To implement end to end security for an application, the author(s) explored the possibilities of Message level security using authorization and authentication of users from the message when it crosses through different services. The Proposed model tries to secure all services within an application. The author(s) suggest security handling and data protection at different levels in service oriented architecture. The proposed model also maintains the service level agreement for the services within an application. This paper focus on the enhancement of existing message level security so that security, reliability, service performance can be increased.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127376041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3-D modelling of multidimensional & disparate data in visual analytics","authors":"Oshin Rawlley, D. S. Singh","doi":"10.1109/CIACT.2018.8480096","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480096","url":null,"abstract":"Great amount of emerging data is creating many opportunities with data analysis, visual analytics etc on the top. Here I have explored the angle of how can we put big data into use. Big data can turn into trash if no significant information can be extracted out. So it needs to be presented & visualized in a manner that visuals can milk out most of it. Already in my previous accepted paper, I have discussed the conventional & novel approaches of data visualization & also the future scope of it. In this paper I am going to work upon the future scope proposed by me in my previous paper i.e. “interactive visualization’’. Only blindly showing a diagram sometimes may not be useful as it doesn’t reveal much of the facts. A proper analyzable pattern or an insight can be concluded if the visuals interact with the user. Also it is important that one should choose the right chart to the data to be analyzed. A set of right visualizations therefore helps in seeing various angles of the same topic & hence deriving various trends & results unknown to us. So a set of visuals used commonly & in latest corporate world has also been shown in this paper. An attempt has been made to propose a new feature of storytelling in this paper which is discussed in brief.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Big Data in the Media andEntertainment Industry","authors":"M. Suri, S. Singh","doi":"10.1109/ciact.2018.8480403","DOIUrl":"https://doi.org/10.1109/ciact.2018.8480403","url":null,"abstract":"Media and entertainment industries are advancing at an unprecedented speed every day, governed by dual requirements to minimize costs while at the same time generating more revenues from a highly competitive and uncertain market. Media companies are among the first to adopt the great bigdata technology, enabling them to increase digital transformation, leveraging not only the data already available but also new data sources both in and out of the organization. This paper is a synthesis of the art of great data analysis in the media and entertainment industry and of the essential role that big data plays in this sector of the world market. Finally, the research is distilled into a full set of future big data issues in the next generation to support the media and entertainment industry and help them keep their customers happy.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}