{"title":"Computer Aided System for Inspection of Assembled PCB","authors":"Jinay. A. Nahar, A. Phadke","doi":"10.1109/ICCS45141.2019.9065636","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065636","url":null,"abstract":"Printed Circuit Board (PCB) is said to be the heart of the electronic automation system. Components of different sizes, shapes are used for assembling the PCB. With the advancements in the technology, complexity of PCBs has also increased and also number of components to be assembled on PCB is also increased. Missing components are to be verified before testing the operation of the system. Wrong component placement may cause complete failure of the system. Proposed system does the automatic inspection of the assembled PCB using image processing techniques. The proposed system uses image pre-processing techniques, image subtraction, and extraction of region properties to find defect in assembled PCB. This system detects multiple missing components as well as wrongly placed components. It provides ease in inspection of assembled PCB and provides accurate results.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gayatri Nair, Karishma Elsa Johns, Shyna A, Ansamma John
{"title":"An overview of machine learning techniques applicable for summarisation of characters in videos","authors":"Gayatri Nair, Karishma Elsa Johns, Shyna A, Ansamma John","doi":"10.1109/ICCS45141.2019.9065654","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065654","url":null,"abstract":"Machine Learning and its applications have been developed and utilised in implementing a wide array of functionalities. Its usage in the area of image and video processing have resulted in an improved mechanism for video analysis. It can further be used in the development of a system that helps summarise the role of characters in a video. In this paper we analyse the existing techniques that can help formulate the required model.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. K., Poorna S S, Jeyasree S, Vaishnavi Sreekumar, Chaitanya Anudeep Origanti
{"title":"Comparative Study of Spatial Modulation and OFDM using QAM Symbol Mapping","authors":"A. K., Poorna S S, Jeyasree S, Vaishnavi Sreekumar, Chaitanya Anudeep Origanti","doi":"10.1109/ICCS45141.2019.9065516","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065516","url":null,"abstract":"The research on modern communication devices and demand for data services are seen increasing predominantly during the recent years. Even though a lot of new modulation schemes are available, there is a vital requirement of a scheme which preserves transmission bandwidth and power without losing the qualities of MIMO systems. This paper deals with the analysis and comparison of two advanced MIMO modulation schemes Spatial Modulation and Orthogonal Frequency Division Multiplexing, adopted for high performance digital transmission. The performance measures employed in this study are Bit Error Rate and Mean Square Error, assuming Quadrature Amplitude Modulation as the symbol mapping scheme.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on DNS Security Issues and Mitigation Techniques","authors":"Anju Ramdas, R. Muthukrishnan","doi":"10.1109/ICCS45141.2019.9065354","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065354","url":null,"abstract":"The Domain Name System (DNS) is the backbone of the internet. It is a distributed hierarchical database which stores resource records like A, MX, AAAA, CNAME. The whole DNS is classified into three layers - root, top-level domain (TLD) and authoritative DNS servers. Each level has its own responsibility to resolve certain categories of domain names. It is very difficult for us to memorize the IP address of each site which we need to visit. In this case, the DNS comes into rescue to figure out the corresponding IP address a domain points to. In the current world, the internet is an inevitable part of our life and DNS is the soul of the internet. Due to this reason, DNS is a major attack target like amplification attack, cache poisoning attack, DNS hijacking, NXDomain attack and Phantom domain attack. These attacks could create a serious security threat to internet users. Threats can be a simple redirection to potentially stealing user credentials. Even though different mitigation techniques are available, the threat still exists. In this paper, we present our survey of the existing research and its shortcomings on securing the DNS. We have also introduced a novel idea which uses blockchain technology to validate the response sent by the DNS servers.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pallavi Khare, K. Satya Ram, S. Sourabh, A. Mahender
{"title":"QWERTY Keyboard in Virtual Domain Using Image Processing","authors":"Pallavi Khare, K. Satya Ram, S. Sourabh, A. Mahender","doi":"10.1109/ICCS45141.2019.9065459","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065459","url":null,"abstract":"Individuals inside the cutting-edge times are occupied with genuine issues at hand and they don't have even one moment to squander. They battle to reduce their regular work by utilizing standard gadgets like Desktop Computers and Laptops, moreover further developed gadgets like cell phones and PCs. To improve the versatility and utility people will in general cut back the size of the gadgets. In this way the greater part of the cell phones and hand-held gadgets contain tiny keypads. Some of the people who utilize such a device think that it’s hard to see the letters on the console. With a cell phone, a full-size physical keypad isn't perfect. Yet, options are accessible as written recognition, speech recognition and so forth but every one of them has severe short comings on the exactness and accommodation of a full-size keypad. This paper displays an imaginative virtual keyboard to beat the previously mentioned issues, which may be a feasible swap for fold-up keypad. The proposed device basically dependent on the vision based human-PC cooperation concept, image capturing and image processing technique that contains virtual keys similar to the size of conventional keys inside the ordinary QWERTY keyboard. This device comprises of 2 fundamental modules, in particular, Image Capturing, Character Identification and Mapping. The final product of the virtual keyboard project was a cost-effective, easy to understand and transportable virtual keyboard, that sends typed characters to any display device.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Framework for Breast Cancer Prediction Using Frequent Itemsets Mining for Attributes Filtering","authors":"Ankita Sinha, B. Sahoo, S. Rautaray, M. Pandey","doi":"10.1109/ICCS45141.2019.9065877","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065877","url":null,"abstract":"Data Mining is applicable for pulling up some new information by analyzing the database. It is also used for prediction based on real and actual current data. Breast cancer is a very harmful disease which effects badly to ones social, physical life and also effects mentally. This paper focuses on the attribute filtering techniques i.e frequent itemsets mining with the intention to find the essential and relevant attribute from the Wisconsin breast cancer dataset and classification algorithmic program like SVM, Naive Bayes, k-NN, Decision Tree comparison is done with attribute filtering. SVM produces beat result among all the classifier with attribute filtering.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Victory prediction in League of Legends using Feature Selection and Ensemble methods","authors":"A. R, Vishnu Harikumar, Arjun K Devan, O. Deepa","doi":"10.1109/ICCS45141.2019.9065758","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065758","url":null,"abstract":"Prediction of winners in the online video games has become an important application for machine learning based prediction models. The main goal of the present study is to achieve a good prediction rate for a popular Electronic sport called League of Legends. League of Legends is a Multiplayer Online Battle Arena (MOBA) game that combines intensity of a Real-time strategy with various Role-playing elements. Feature selection is done and only relevant features that affect the match outcomes are considered. Prediction is done by using ensemble models of classification algorithms and the performance was evaluated. The important performance metrics and their influence on each game model were also analyzed. The results show that the reliable match result prediction is possible in the League of Legends game.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDA Based Classification Algorithm for Early Detection of Alzheimer’s disease","authors":"K. P. Thejaswini, B. A. Sujatha Kumari","doi":"10.1109/ICCS45141.2019.9065526","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065526","url":null,"abstract":"People suffering from Alzheimer’s disease aren’t able to speak properly. Since central nervous system get broken they can't do their work properly. they need to depend on their members of the family to do their work. The many studies projected that more or less one hundred fifteen million individuals are going to be affected from Alzheimer disease (AD) worldwide by the year 2050. Early detection of AD is vital so preventative measures may be taken place. The human brain magnetic resonance imaging (MRI) information are used to detection of AD. one among the vital part of the brain is Hippocampus. the normal behavior of persons is depends on the functionality of Hippocampus. Manual Segmentation by a specialist on the Hippocampus takes several hours. The Alzheimer detection and classification systems include four stages, namely, MRI preprocessing, Segmentation, Feature extraction by gaussian Discriminant Analysis (GDA), and Classification by Support Vector Machine (SVM). the strategy is evaluated by exploitation an ADNI dataset. The results of the proposed technique indicate the person is littered with AD or not.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography","authors":"Ankit Chouhan, A. Kumara, Makhduma Saiyad","doi":"10.1109/ICCS45141.2019.9065645","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065645","url":null,"abstract":"In this day and age of cutting edge innovation, it's not sheltered to share the private or classified information over the system .Cryptography is one of the methods in data security through which we are shield our private information from obscure individual .In this paper we center around the elliptic bend cryptography based methodology for secure multiparty calculation .Classical way to deal with SMC is to perform calculation utilizing confided in outsider. be that as it may, when we talk about commonsense circumstance TTPs are difficult to accomplish and it is basic to kill TTP in SMC .moreover ,existing arrangement proposed for SMC utilize traditional homomorphic encryption plan, for example, RSA and Paillier. Yet, such cryptosystem brought about greater expense ,So that resultant SMC conventions are not adaptable .We have proposed ECC based homomorphic encryption conspire for SMC, in light of execution measurements, for example, computational expense and correspondence cost . We prescribe an effective calculation among a few chose one, that offers security and diminishes costing and can be connected in numerous protection requesting application.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reshma Banu, J. T., Amulya M, Anju K N, A. Raju, Shishira N Kashyap
{"title":"MONOSEK – A Network Packet Processing System for Analysis & Detection of TCP Xmas attack using Pattern Analysis","authors":"Reshma Banu, J. T., Amulya M, Anju K N, A. Raju, Shishira N Kashyap","doi":"10.1109/ICCS45141.2019.9065325","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065325","url":null,"abstract":"Identification of an open or closed port is done using several port scanning techniques and one of them is TCP Xmas scan. In the TCP header, URG, PSH and FIN flags are utilized for scanning the port. On the targeted system, receiving ports are identified. Distinct packets are directed to the target system. There are several port scanning tools like Snort and Wireshark. In this paper we highlight the advantages of Nmap. Nmap is a network scanning tool which is used for penetration testing and host detection. Specially designed packets are sent to the target host and the reply is analyzed. MONOSEK is used for analyzing the packets. MONOSEK is a Network Session Analysis and Network Packet Processing system. Xmas attack is detected in order to prevent OS fingerprinting and to scan web services.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128740223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}