Mohammad Hanif, Bijoy Harun, M. Islam, N. Mohammad, K. Ahmmed
{"title":"Comparison of Sacrificial Anode and Impressed Current Cathodic Protection Methods using Electric Resistance of Mild Steel","authors":"Mohammad Hanif, Bijoy Harun, M. Islam, N. Mohammad, K. Ahmmed","doi":"10.1109/IC4ME247184.2019.9036510","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036510","url":null,"abstract":"Corrosion is a universal process occurring due to chemical reactions between metal and the environment. Corrosion of the metal can be controlled by numerous methods, and among many controlling methods cathodic protection is noteworthy. Cathodic protection of metal consists of two methods namely impressed current method and sacrificial anode method. Both methods deal with the transportation of electrons either receiving or donating from or to the metal or to the environment. Again, the electric resistance of a metal piece is inversely proportional to this cross-sectional area. If a metal bar corrodes fast, then its cross-sectional area reduces rapidly and its electric resistance increases highly. So, the relation between corrosion and electrical resistance of the metal is a helpful parameter to determine the corrosion rate. In this paper, we determine the corrosion behavior of mild steel exposed to different concentrations of ionic liquid to compare the possible variations in the corrosion protection techniques for the mild steel used.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126141258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. I. Borshon, A. Nafis, A. S. M. Badruduzza, M. K. Kundu, M. Sarkar
{"title":"Enhancing Wireless Security Over Weibull Fading Multicast Channel","authors":"Z. I. Borshon, A. Nafis, A. S. M. Badruduzza, M. K. Kundu, M. Sarkar","doi":"10.1109/IC4ME247184.2019.9036690","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036690","url":null,"abstract":"This paper aims to the study of security in wireless transmission system through Weibull fading single-input multiple-output multicast channels considering multiple receivers and eavesdroppers. At first, the analytical expressions for the probability of non-zero secrecy multicast capacity and the ergodic secrecy multicast capacity are derived in closed-form to illustrate the numerical results. Then the closed-form expression for the secure outage probability is obtained to examine the secure outage behaviour. Finally, a comparison between Weibull and Rayleigh fading channel is presented to demonstrate the impact of Weibull fading parameter on the secrecy performance of the proposed scenario.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent Based Dynamic Knowledge Profile Framework","authors":"K. H. Robin, S. Uddin, T. Chowdhury","doi":"10.1109/IC4ME247184.2019.9036544","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036544","url":null,"abstract":"In this research, A Conceptual Framework of the Intelligent Agent-Based Knowledge Profile designed to help people become aware of their skills. It will also analyze their skills, tools, and practices helping them to identify skill gaps if there is any. This is a web-based platform design. Where full mechanisms and functions controlled by automatic bots or intelligent agent through an algorithm specifically designed to meet the purpose. During this study, very few research has found so far related to dynamic Knowledge Profile. The number of research papers, information, and data regarding relevant research is difficult to find. We also have found a similarity between Knowledge profile and Graduate profile. A theoretical framework and structural design have proposed in this research. Also, an algorithm has proposed for comparing data. Basically, this framework raised on some specific components. The user, Intelligent Bot, and Algorithm, these three components are the main pillars of this framework. It is expected that this framework can be used to identify Knowledge Gap in a particular context. This dynamic knowledge profile has been designed in the presence of Intelligent agents. The Intelligent Agent will automatically collect data from a user and provide their Knowledge Status. This dynamic knowledge profile provides positive feedback after the Dataset and Algorithm Experiments on many occasions.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129699304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Tariqul Islam, Romana Rahman Ema, Md. Riadul Islam, Tajul Islam
{"title":"A Lossless Bit Isolation Algorithm for Data Compression by Using Static Dictionary","authors":"Md. Tariqul Islam, Romana Rahman Ema, Md. Riadul Islam, Tajul Islam","doi":"10.1109/IC4ME247184.2019.9036662","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036662","url":null,"abstract":"Data compression is the reduction of bit or actual size of data by eliminating the repetition of identical sets of data bits to achieve fewer bits than the primary one. Character encryption is a famous time period of statistics compression that includes an everyday sample of records individual with a few affable encoding formulations. This encoding is a pastime of corresponding encoding approach that encompasses character characters, dolled up with extraordinary sorts of data and emblems. Data compressions expand over a large field of citation including data storage, database technology, and data transmission. In this paper, a statistics compression method denoted as Lossless Bit Isolation (LBI) has been implemented which honestly manifested on a character encoding technique. These isolated characters have found using set, sub-set, and static dictionary. Similarly, for assimilating the outcome of LBI two most well-liked algorithm terms LZW and Huffman are used. The investigational consequences of the counseled approach carry off common compression ratio 0.52 and again talented than LZW and Huffman.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Embedding and Chirikov Map based Image Watermarking in Transformed Domain","authors":"Syeda Saida Khadeeza Nawrin, C. Saha","doi":"10.1109/IC4ME247184.2019.9036680","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036680","url":null,"abstract":"With the increasing growth of technology, image security is hampering day to day. Now a watermarking technique which ensures security with less computational effort is the best solution. In this paper differential embedding and chirkov map based image watermarking in transformed domain is proposed. Here, Chirikov map is employed for scrambling the watermark providing security to the method. 2nd level DWT is applied to the host image and the middle band coefficients are chosen to maintain balance between imperceptibility and robustness. These coefficients are DCT transformed for energy compaction and zigzag scanning is performed to cluster the highly correlated coefficients. The concept of differential signaling is used to embed the watermark into the highly correlated coefficients of the host image. The use of different strength factor as secret key and control parameters in Chirikov map will ensure security. At the end section, NCC, MSE and PSNR is calculated as performance parameter to evaluate this method and comparison with the existing method is also discussed and our proposed method shows robustness and imperceptibility against a numbers of image processing attacks.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Aslam Mollah, Md. Yousufali, Md. Rifat Bin Asif Faysal, Md. Abdul Mazid, R. Marma
{"title":"Low Loss Microstructure Optical Fiber Refractive Index Sensor based on Surface Plasmon Resonance","authors":"Md. Aslam Mollah, Md. Yousufali, Md. Rifat Bin Asif Faysal, Md. Abdul Mazid, R. Marma","doi":"10.1109/IC4ME247184.2019.9036645","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036645","url":null,"abstract":"We propose a simple rectangular lattice microstructure optical fiber (MOF) based plasmonic refractive index (RI) sensor for analyte sensing having RI range from 1.35 to 1.40. Sensitivity analysis of the suggested RI sensor is done by finite element method (FEM). Simulation result shows that amplitude and wavelength sensitivity of the presented RI sensor can reach 1200 RIU-1 and 12,000 nm/RIU, respectively, while corresponding resolution is obtained of 8.33 × 10-6 RIU. In addition, deposition of gold film outside the MOF structure makes this sensor practically feasible as well as keeps the confinement loss very low. Due to these advantages, the suggested sensor can be used in analyte sensing application.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"56 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EEG Classification for MI-BCI using CSP with Averaging Covariance Matrices: An Experimental Study","authors":"Abu Saleh Musa Miah, M. Islam, M. I. Molla","doi":"10.1109/IC4ME247184.2019.9036591","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036591","url":null,"abstract":"To assist disabled people by controlling an external system by using motor imagery (MI) is a common applications of brain computer interface (BCI) field. This paper we focused on an experimental comparison of covariance matrix averaging ways of EEG signal and EEG classification of two types of MI tasks $(right-hand^{ast}$ foot and right-hand*left hand). Indeed averaging covariance matrices of EEG signal might be a used in brain computer interfaces (BCI) with common spatial pattern (CSP) method. Structured into trials is a usually paradigms of BCI which we have a tendency to use this structure into account. In addition, covariance matrices with non-Euclidean structure should be consideration likewise. We review much method for averaging covariance matrices in SVM from literature and observe through the experimented result using publicly available four datasets. Our experimental result show that for the case of averaging covariance matrices using Riemannian geometry with small dimension feature issue improve the classification performance. Our result shows the performance increase (2% >performance), but also the limit of this method once the increase feature dimension.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farhana Binte Sufi, J. Gazzano, Fernando Rincón Calle, Juan Carlos Vallejo López
{"title":"Multi-Camera Tracking System Applications Based on Reconfigurable Devices: A Review","authors":"Farhana Binte Sufi, J. Gazzano, Fernando Rincón Calle, Juan Carlos Vallejo López","doi":"10.1109/IC4ME247184.2019.9036575","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036575","url":null,"abstract":"Real-time video image processing requires video compression techniques. Efficient Motion Estimation (ME) and Motion Compensation (MC) algorithms and their successful hardware implementation are the key to video compression. Work on developing and implementing efficient ME and MC algorithms for multi-camera systems is ongoing. The low power consumption yet high speed of Heterogeneous Reconfigurable Devices such as Field Programmable Gate Arrays (FPGA) can be suitable for implementation of real-time optic flow computation using multi-camera systems. This paper focuses on a search into the current state-of-the-art for multi-camera motion tracking. It has been found the tracking systems mainly focused on people and vehicle tracking in both indoor and outdoor conditions, tracking under occlusion, tracking for surveillance, single and multi-view tracking, etc. The review search also found use of multi-camera tracking in the medical sector, such as multi-camera tracking systems for respiratory motion tracking. Research on this field has not been explored much and this holds possibilities for further work.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"14 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Microprocessor Based Smart and Safety Blind Glass System","authors":"Md.Tobibul Islam, Mohiudding Ahmad, A. S. Bappy","doi":"10.1109/IC4ME247184.2019.9036504","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036504","url":null,"abstract":"In this paper, we present a unique microprocessor-based wearable glass security system for human beings who are blind or visually impaired. People who are visually impaired face hard to communicate efficaciously with their environment. They always depend on other people. Sometimes they fall into a lot of troubles when on foot in the road, field, marketplace, bus stand, railway station and so on. So, making sure their safety is very important to us. Imparting the blind person the safety information about their surroundings and family members are the goals of the smart glass safety system. This paper offers a correct and dependable real-time monitoring system using global positioning system (GPS). This smart glass device will help blind humans attain improved independence and freedom in the indoor and outdoor environment. We have proposed a smart glass application to address the safety threat to blind people and give security information to the family members of the blind man. The proposed prototype system is based on a Raspberry pi 3 model B and NEO-6M GPS module. Our proposed system is good, low cost, highly efficient and user-friendly.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121703556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ic4me247184.2019.9036524","DOIUrl":"https://doi.org/10.1109/ic4me247184.2019.9036524","url":null,"abstract":"","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116716960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}