{"title":"Design &Implementation of Single Switch DC-DC Resonant Converter for Hybrid Vehicle","authors":"G. Kanna, K. Muthulakshmi, S. Vinitha, R. Raja","doi":"10.1109/ICISC44355.2019.9036399","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036399","url":null,"abstract":"In this paper, a innovate single-switch resonant DC-DC power converter for a hybrid vehicle with renewable energy generation operations for the hybrid vehicle are developed. This circuit Scheme combines a innovate resonant DC-DC converter with energy-blocking diode with zero-current switching (ZCS) and zero-voltage switching (ZVS). The output level of the innovate single-switch DC-DC resonant converter was filtered by using direct-current(DC) output blocking diode. To decrease the price of the control circuits. For power energy conversion only one active power switch was provided. The PWM at a constant duty cycle, the fixed switching frequency is used to control the active power switch. When the DC-DC resonant converter works at irregular conduction mode. At that time inductor current which travels through the resonant tank might reach the (ZCS) Zero Current Switching of the energy-blocking diode. The resonant tank consequently, a high energy modification efficiency is confirmed. Working propositions are analyses and derived are achieve for proposed resonant DC-DC converter under different working modes based on the equivalent circuit. The working principles of the resonant DC-DC converter were authenticated powered load system by employing a Photovoltaic (PV). Given properly selected circuit parameters, The ZVS can work with active power switch the planned topology of 97.3% can be obtained with measured energy conversion efficiency.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neil Daftary, Jaideep Rao, Aditya Desai, D. Kalbande
{"title":"Comparative study of different methodologies to detect Melanoma","authors":"Neil Daftary, Jaideep Rao, Aditya Desai, D. Kalbande","doi":"10.1109/ICISC44355.2019.9036336","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036336","url":null,"abstract":"Skin cancer is increasing worldwide due to ultraviolet rays radiation. Predominantly affecting only fair skinned people, recent cases suggest that it is affecting even darker skinned people. Melanoma is a form of skin cancer which may prove to be fatal if allowed to go undetected for long periods of time. It even poses the threat of spreading to other organs in the body. Melanoma starts off as a harmless looking mole on the skin and thus early-detection of the same by untrained people is difficult. Over the last few decades, the number of cases of Melanoma has been increasing. Having realized these factors, many computer-aided techniques have been designed to enable quick and easy detection of the same. This paper analyzes the various techniques employed for the detection of Melanoma.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maneesha P, Tripty Singh, Ravi C. Nayar, Shiv Kumar
{"title":"Multi Modal Medical Image Fusion using Convolution Neural Network","authors":"Maneesha P, Tripty Singh, Ravi C. Nayar, Shiv Kumar","doi":"10.1109/ICISC44355.2019.9036373","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036373","url":null,"abstract":"Medical image fusion have very important rolefor disease diagnosis and medical image analysis.An application to get complementary information from multiple images of different modalities. It is extensively used to combineinfor-mation from multiple images into single image with good accuracy. In our paper multimodal medical image fusion based on convolutional nueral network(CNN) is proposed. In this method a CNN model is created which will contain the pixel activity information of the input images. Image is decomposed into highly matching and low matching and separatefusion method is applied to both type of images. Beside this main important factor is to reduce noise because noise will affect the pixel intensities.so we will implement a new method to reduce noise in this manner. This method is to combine affected pixels of different images we are going to fuse. Different affected images will undergo an test for checking whether it is having noise or not. Then effected image will undergo a filtering algorithmtogetnoiselessimageforprovidingmoreclarity.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Computer Vision - Scene Classification Techniques","authors":"Aayushi A. Shah, Keyur Rana","doi":"10.1109/ICISC44355.2019.9036472","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036472","url":null,"abstract":"In today's era, need for automatic response of machines on certain task has been prevalent. Humans want their life easier and automatic in every possible way. However, those tasks require better understanding by the machine to perform human like tasks. Tasks like classification, detection and localization are on high demand and dominant research area. These tasks fall into a domain called computer vision where computers by analyzing and understanding performs human like tasks. This domain provides the automatic inference by machines to make human life easier. In this paper, we focus on one of the difficult computer vision tasks called scene classification. Scene Classification deals with techniques that make machine intelligent and automated by processing given input say image. As machines are made automatic and intelligent to perform various tasks, Artificial Intelligence and Image processing comes into the picture. We study and analyze various approaches and methods by which such task can be handled easily and accurately. Furthermore, we compare all the approaches and find out the best approach to opt for this task.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dipayan Saha, Jagrita Roy, K. F. Fiaboe, Pranaw Kumar
{"title":"Design and analysis of FSO (Free Space Optics) link at high bit rate","authors":"Dipayan Saha, Jagrita Roy, K. F. Fiaboe, Pranaw Kumar","doi":"10.1109/ICISC44355.2019.9036358","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036358","url":null,"abstract":"An optical communication system has been optimized and designed for the transmission of bit rates upto 15Gbps. The free space optics link for short haul communication at a wavelength of 1500 nanometer has been developed. For optical fiber link, non return to zero signal, modulated with Mach-Zehnder modulator is used. Free Space optics (FSO) Technology provides high bandwidth along with high data transmission over long link range. Major limitation of the FSO technology is atmospheric turbulence, which decreases data carrying capacity of the optical system with increased bit error rate (BER). In this paper, efforts have been made to mitigate or to minimize the effects of scintillation by evaluating the performance of the system through simulation. Simulated results have been analyzed and factors like Q-factor, received power, BER and eye height have been studied.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilayer MAC with Adaptive listening for WSN","authors":"S. Radha, G. Bala, P. Nagabushanam","doi":"10.1109/ICISC44355.2019.9036423","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036423","url":null,"abstract":"In general, WSN refers to a group of nodes that is deployed to monitor a particular environment. The nodes are usually wireless sensors that maintain high energy to enhance the network lifetime. The energy of a node will be wasted if the node keeps on working throughout the simulation time or even when it has no packets. This paper presents two innovative approaches for MAC. They are (1) Mathematical Modeling in MAC and (2) MAC with Relay Nodes. We proposed a new technique for MAC with a multilayer approach. In this paper, a MAC with and without multilayer is simulated using NS-2.35. SMAC approach integrated with adaptive listening in the sleep and idle states for the nodes will leverage a better energy efficiency and throughput. The final result shows that the ML-MAC is the suitable method for WSN applications.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131302956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach of Image Enhancement Technique in Recognizing the Number Plate Location","authors":"S. Kranthi, K. Pranathi, A. Srisaila","doi":"10.1109/ICISC44355.2019.9036434","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036434","url":null,"abstract":"Recognition of number plat from the image of vehicles and exhibits their number is a mass observation approach. This helps to resolve the problem like identification of theft vehicle. This work describes the process of image enhancement with the set of procedures and it helps to detect the vehicle number from the vehicle plate by using the electronic cameras. From the back image of vehicle plate, this can be identified and reported to the respective users. It will be dvided based on the distinctive counts and it has two different methods to foucs the snappy counts such as edge finding approach and Window filetering approach. It provides the ooptimal performance in image enhancement in the structure of number plate area.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Machine Learning in Agriculture - background work for an unmanned coconut tree harvester","authors":"Sakthiprasad K. M., R. K. Megalingam","doi":"10.1109/ICISC44355.2019.9036375","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036375","url":null,"abstract":"Agriculture of a country must increase with the population otherwise that would affect the economy. When the population increases the resource availability for agriculture gets reduces, so efficient methodologies are required in the field of agriculture to get maximum production from the limited resources. Precision agriculture is the solution for that, it is achieved by advanced technologies like wireless sensor networks, machine learning etc. Different machine learning algorithms are using to achieve precision agriculture like crop selection, to identify management zones, crop monitoring and phenology, climate estimation and plant disease diagnosis etc. Awareness about the machine learning technologies used in the agriculture field is helpful to make the learning algorithm for the autonomous coconut harvester.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114249623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Denial of Service DoS and Distributed DoS Attack of Application and Network Layer of IoT","authors":"Hanumat Prasad Alahari, Suresh Babu Yelavarthi","doi":"10.1109/ICISC44355.2019.9036403","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036403","url":null,"abstract":"Internet of Things (IoT) is a new revolution that makes use of internet services to connect the whole world anywhere and anytime without the restriction of geographic location. It provides a platform to communicate between the objects, which are self-organize, recognize themselves using (RFID) Radio frequency identification, Zig Bee and Wireless sensor network etc. for effective communication. The unique characteristics of this technology provides dynamic nature, connectivity, enormous scale, heterogeneity, sensing energy, etc., which has the capability to enhance various innovative applications and services. However, IoT architecture provides complex environment that has various challenging issues such as connectivity, power, security etc., which need to be solved. The successful adoption of IoT largely depends upon security issue, which protects the user's personal data from the real-time threats. However, several security mechanisms are already in use in traditional network are no longer sufficient to protect the future generation IoT. This paper analysis the Denial of Service and DDoS attack of application and network layer of IoT. Moreover, this paper also analyze the performance with various metrics delay, number of packets lost, routing metrics that can degrade the performance of the IoT.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of neural networks and feed forward neural network models on to content-based image retrieval","authors":"E. Ranjith, L. Parthiban","doi":"10.1109/ICISC44355.2019.9036351","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036351","url":null,"abstract":"The advanced technological developments in the machine learning models are being to develop new methodologies for content based image retrieval (CBIR). Since the ML models has the capability of learning global visual features for any given query enables them a better solutions for the models deal with massive amount of different image dataset. At the same time, the application of ML models like neural networks (NN) has some difficulties like the search goal has to be fixed or the computation complexity become too expensive for an online setting. In this study, a performance evaluation is carried out between NN and feed forward neural network (FNN) for CBIR. A set of benchmark images is employed to study the performance of the two ML models interms of different measures. The attained results exhibit that the FNN model is found to be better than the NN on all applied test images.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}