{"title":"A Detailed Investigation on Embedded Computing Systems for IoT Applications","authors":"A. M., Renjith V. Ravi","doi":"10.1109/ICACCS48705.2020.9074481","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074481","url":null,"abstract":"The Internet of things(IoT) is a revolutionary paradigm in Information technology. IoT interconnects the various objects to internet thus being considered as virtual objects. It is considered that the IoT is the next big ‘thing’ in internet. Internet uses the Internet protocol suite (IP/TCP) by which computer networks are interconnected in order to serve the users worldwide. Thus billions of objects which would be provided with a unique identifiers(UID's), will be outfitted using several actuators and sensors and connecting those to internet which can be accessed using technologies like real time services, RFID, embedded sensing etc. IoT aims at improving the quality of human life. It is necessary to transform the cities by improving transportation systems, infrastructure, providing waste management etc. Currently as the internet infrastructure is almost available everywhere, thus the embedded computing device can be exposed to the internet influence. Hence the real-time data can be analyzed and used to create desired outcomes. IoT has wide range of applications like Smart cities, Industrial automation, Smart home applications, healthcare, wearables, agriculture etc.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134476453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marine Monitoring System and Safety Precautions Using Can Protocol","authors":"R. S., R. Sundar","doi":"10.1109/ICACCS48705.2020.9074380","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074380","url":null,"abstract":"Glaciers are very dangerous because they are so large that they drift low in the water, which can endanger ships. When you hit a glacier, the ship underneath the water will hit the iceberg first even before the front of the vessel above the waterline gets into contact, so it will divert from its course - it's not like hitting a brick wall. After some time they tend to capsize. At times the energy is so great which would trigger earthquakes and even tsunamis. So far from 1828 till present the turnout of the capsized ships due to icebergs are found to be 27. The main tool used to avoid the iceberg by the ice pilot is still by visually watching them or if the ship is equipped with ice radar but still the pilot needs to see the iceberg to make any decision. In case of blizzard or smog the pilot need to stop the ship until it gets cleared and visible. So we are proposing a model to detect the icebergs in the sea and to take preclusive measures which resolves the entire above mentioned problem.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAO Filter in HEVC: A survey","authors":"N. Archana, G. Keerthivasan, B. Janakiraman","doi":"10.1109/ICACCS48705.2020.9074373","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074373","url":null,"abstract":"High Efficiency Video Coding (HEVC) otherwise called as H.265 uses half of the bitrate when it is compared with its previous video coding standard namely Advanced Video Coding (AVC) otherwise called as H.264. This can be achieved with the help of SAO Filter. SAO filter reduces the bitrate by 50% when compared with H.264 video compression technique which uses macro block where in H.265 uses SAO filter. SAO filter calculates the offset in which data must be processed in the Codec. In this paper, a comprehensively survey the existing algorithm, model and architecture for SAO filter in HEVC. First, a compression on AVC and HEVC is given. Meanwhile, function of CTU and SAO filter is briefly explained. Second, function of SAO filter is reviewed which includes various offset calculations, statistical collection phase and parameter determination. Third, various proposed models over time on SAO filter are reviewed. Finally, this survey concluded the current status of SAO filter in HEVC and deliver insightful discussions and prospects for future work. This survey can serve as a reference for researchers on SAO filter in HEVC and related fields.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Thenmozhi, R. Maheswar, E. Nandakumar, P. Jayarajan, E. Priya, S. GaneshPrabhu
{"title":"A Novel Compact Square Patch Antenna for Wireless LAN Applications","authors":"S. Thenmozhi, R. Maheswar, E. Nandakumar, P. Jayarajan, E. Priya, S. GaneshPrabhu","doi":"10.1109/ICACCS48705.2020.9074391","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074391","url":null,"abstract":"Wireless Local Area Networks (WLANs) is one of the major backbones of accessing the internet in urban areas. WLAN uses the frequency in the unlicensed ISM band at 2.4GHz. Nowadays this has increased traffic over the channel. Hence an alternative to this problem presents using the WLAN in other frequencies. The best choice is to use the U-NII band which involves operation over the 5GHz frequency range. To use this, the components of communication should be developed. This paper presents a compact square patch antenna that resonates at 5.4GHz and implemented using the FR4 substrate. The return loss for the band is −40dB. The bandwidth is about 135MHz and the E-plane and H-plane parameters are satisfactory with the bandwidth.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sign Language Translation","authors":"Harini R, Janani R, K. S, M. S, V. S","doi":"10.1109/ICACCS48705.2020.9074370","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074370","url":null,"abstract":"Sign language is the way of communication for hearing impaired people. There is a challenge for common people to communicate with deaf people which makes this system helpful in assisting them. This project aims at implementing computer vision which can take the sign from the users and convert them into text in real time. The proposed system contains four modules such as: image capturing, preprocessing classification and prediction. By using image processing the segmentation can be done. Sign gestures are captured and processed using OpenCV python library. The captured gesture is resized, converted to grey scale image and the noise is filtered to achieve prediction with high accuracy. The classification and predication are done using convolution neural network.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"85 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115055864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Subtitle Generation for Videos","authors":"Aditya Ramani, A. Rao, V. Vidya, V. B. Prasad","doi":"10.1109/ICACCS48705.2020.9074180","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074180","url":null,"abstract":"Subtitles are content gotten from either a transcript or screenplay of the discourse or critique in movies, TV programs, computer games. In a lion's share of cases inside a video, the sound holds a critical spot. At present, to incorporate subtitles into the videos, we have to download them from a third-party source and manually add it to our media player of choice. This poses a few problems: The video content we are trying to transcribe may not always have subtitles readily available for it and an active internet connection would be required to even be able to search for such a resource before we can consume it. We aim to try to solve these problems by performing a comparative analysis of various speech recognition engines in a real-time use case, i.e. generating subtitles for a video being played on a media player in an offline environment. Among the speech recognition engines that were compared, DeepSpeech obtained the lower Word Error Rate (WER) of twenty-six percentage, but when we consider system resource usage as well, CMU Sphinx proves to be a better overall engine for the given use case.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Discovery The Cloud Services Authentication An Expert Based System Using Multi-Factor Authentication","authors":"G. S. Kumar, N. Kandavel, K. Madhavan","doi":"10.1109/ICACCS48705.2020.9074195","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074195","url":null,"abstract":"In this paper, we proposed dependable operators' verification based cloud administration disclosure. In our proposed technique the specialist customer requires administration with explicit useful and specialized necessities. For protection concern, we give validation to every specialist in cloud by utilizing Multifactor confirmation process. By utilizing verification id specialists find the cloud administration dependent on administration motor. In our framework, we improve the security of the cloud web index by presenting new verification system. The validation procedure is finished by using the multiple elements like mystery key that is formed dependent on Advanced Encryption Standard calculation, biometric of client and the client's secret word accreditations. Centered Selection Contract Net Protocol is launched to identify the significant cloud administration and it assumes various jobs in cloud administration disclosure. The closeness amid the specialist's solicitation and cloud administration is figured dependent on administration details and purchaser administration utilizing Cloud cosmology. Each authentic specialist gives dependable cloud administrations to operator customers (individuals). The service capacity table identifies the cloud admin rundown and the associated ID and the admin solid cloud disclosure","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raj Vyas, Kirti Joshi, Hitesh Sutar, Tatwadarshi P. Nagarhalli
{"title":"Real Time Machine Translation System for English to Indian language","authors":"Raj Vyas, Kirti Joshi, Hitesh Sutar, Tatwadarshi P. Nagarhalli","doi":"10.1109/ICACCS48705.2020.9074265","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074265","url":null,"abstract":"For humans it is difficult to understand different languages. As in India there are more than 22 official languages it becomes extremely difficult for a human to know all the languages, in this type of cases communication becomes a hindrance, this is where human interpreters might be required. It cannot be assured that human interpreters would be available every time. Due to this Machine Translation (MT) system comes into picture. MT performs replacement of words from one language to another. The idea behind this project is to achieve the real-time translation of languages with respect to real-time audio as an input by using NLP. It is done by the computers to learn the languages. The proposed system will take real-time English audio as an input and will translate English into Indian language and will produce audio output in the Indian language. The translation system will make use of OpenNMT. OpenNMT is an open source initiative for NMT and neural sequence modeling. NMT is used for automated translation which helps in learning process for both ends which is used to overcome many weaknesses of previously based translation systems.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"117 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Monitoring System using RFID Technology","authors":"Ashlin Jinushia R, S. S., B. S, E. Clapton","doi":"10.1109/ICACCS48705.2020.9074448","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074448","url":null,"abstract":"The task is created for utilizing RFID system with ID card to take presence of the student. Nowadays, staffs use the paper to get the attendance with the student presence. There were many problems to get student attendance when using the paper such as impostor. For this, by using RFID, lecturer can easily solve the problem by designing an regular attendance management system using RFID and ID card. From this code is run to compare with the datasheet in Access with ID card. At First, lecturer needs to fill the attendance sheet with relevant staff name, student name, roll no, class etc. This procedure is important by getting the information to use with the next step. In the next process, staffs need to check to make connection with RFID reader. The attendance procedure gets when RFID reader gets ready by swapping the card on RFID pursuer, a code gets generated from the ID card in contrasted and the database gets generated. At this point the code generated with the database with particular student name, and ID number wants to appear on the interface and that data will trigger into a rundown. In this, all information like student name and ID number will connect with the instructor name, student name, roll no and subject. On the off chance that the code isn't coordinated with database, it will leads to the person is in wrong class, the teacher will enroll data by utilizing the enlisting data and it will be refresh into database.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kesavan, S. Sheebarani, V. Gomathy, R. Kavin, S. Sivaranjani
{"title":"Renewable Energy Based on Energy Conservation and Crossover System","authors":"T. Kesavan, S. Sheebarani, V. Gomathy, R. Kavin, S. Sivaranjani","doi":"10.1109/ICACCS48705.2020.9074157","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074157","url":null,"abstract":"Electricity plays a vital role to fulfil the requirements of basic livelihood. The energy from conventional source gives its maximum efficiency of electricity for the livelihood. The greenhouse effect causes global warming more than 30% in India. So, the renewable energy sources which do not causes environmental pollution will be the best alternative way to generate electricity. This paper focuses on the usage of electricity from non-conventional energy source wisely and methods to increase the energy efficiency. As 2017 to 2018, due to the changes in climatic conditions the energy generation from non-conventional energy sources decreases. So, the crossover system combines the solar, hydropower and wind energy source and genset to a DC bus line and it is charged by a battery with a charge controller to prevent overload of battery and in converted by AC load by inverter. The installation of grid in rural areas are complicated. This system will benefit for the rural houses. As of 2018, 25% of renewable energy is been used in India. It is our primary duty to conserve the energy wisely.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}