Shreetej. M. Malode, Priyank Zilpe, Neema Ukani, Saurabh Chakhole
{"title":"Design of lower-limb Exoskeletal","authors":"Shreetej. M. Malode, Priyank Zilpe, Neema Ukani, Saurabh Chakhole","doi":"10.1109/ICACCS48705.2020.9074211","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074211","url":null,"abstract":"In today's world, man and machine have equal space at work, some working conditions include standing hours during the day, work such as mining, assembly lines, training and a doctor's desk during surgery, etc. When such activities increase fatigue. and subsequently reduce performance. A machine can do the job without rest and boredom, but the human need for rest and comfort plays a vital role. To satisfy an employee's immediate seat requirements, the solution to this problem is to have a portable device that has an ergonomic device designed similar to the shape and functions of the human body. With segments and joints corresponding to those of a person, externally in combination with the lower extremities of the human body. It functions like a chair when necessary, and is thought up as a chair without a chair. An industrial worker can wear on his feet like an exoskeleton. It locks in place and you can sit on it. The wearable device never comes in contact with the ground, which makes it easier to wear: a belt fastens it on the hips, and belts wrap around the hips. Exoskeletal is well designed, developed and analysed using state-of-the-art manufacturing technologies such as Solid-Works, Catia and Analysis Simulation. In addition, to reduce weight, it is made using high-strength and low-density material from aluminium alloy 6082.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transactional Memory: A Review","authors":"Tabassum, Meenu","doi":"10.1109/ICACCS48705.2020.9074423","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074423","url":null,"abstract":"For simplifying parallel programming, Software Transactional Memory is an important method which improves scalability in multiple cores. Python uses a system clock instead of a global counter. STM in python deals with shared data among parallel threads of locked(as in python) data structure. A Haskell has thread-local journaling for operations on mutable and globally shared objects. In this review paper, we have discussed STM having basic approaches called HTM, STM, and HyTM with version management and synchronization. This paper also discusses previous version work and challenges of STM.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Prabha, R. S. Saranish, S. Sowndharya, A. Santhosh, R. Varsha, K. Sumathi
{"title":"IoT Controlled Aquaponic System","authors":"R. Prabha, R. S. Saranish, S. Sowndharya, A. Santhosh, R. Varsha, K. Sumathi","doi":"10.1109/ICACCS48705.2020.9074401","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074401","url":null,"abstract":"Aquaponics framework is a cooperative blend of aquaculture and hydroponics that encourage soil-less plant development by using the profoundly improved profluent of fish or other oceanic creatures that contains all the supplement required for ideal plant development in an incorporated domain. Aquaponics is considered as a standout amongst other cultivating strategies, since the misuse of one living biological system is utilized to profit another common environment to accomplish a brilliant and maintainable cycle in natural cultivating with two surges of pay, fishes and vegetables. This framework makes it conceivable to act naturally adequate by the way that with this system the plants grow multiple times quicker when contrasted with customary cultivating even in home nurseries, it likewise expels the utilization of pesticides and manures and diminishes the water utilization up to 90 percentage as in traditional cultivating by recycling the perfect and supplement rich water inconclusively. This task incorporates numerous highlights like temperature detecting and controlling utilizing heat source and cooling fan, discovery of pH in water utilizing a pH sensor, and a siphon for cleaning and re-coursing the water. The proposed undertaking initially distinguishes the parameters of water utilizing different sensors and utilizing PIC 16F877A microcontroller the information will be contrasted and an ideal scope of the particular parameters, at that point if the characteristics are beneath or above ideal range the required tasks will be done in like manner. Another innovation called the Internet of Things (IoT) crosses over any barrier between the physical world and the computerized world. In this aquaponics observing framework, with the utilization of IoT the webserver persistently shows the estimations of the parameters and data.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"20 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking Real Time Vehicle And Locking System Using Labview Applications","authors":"G. S, S. S, Agnes Shiny Rachel, A. R. Roshinee","doi":"10.1109/ICACCS48705.2020.9074323","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074323","url":null,"abstract":"The proposed project aims to develop a portable embedded system to avoid burglary on vehicles. The complete prototype is designed on a single chip which is very simple and cost effective. Our proposed prototype compressed of a 32-bit microcontroller, SIM900A GPS/GSM Module, sensors and transducers. The prototype is fixed inside the engine part of transport with proper shielding. A android based mobile application is developed in order to track the movement of vehicles even though the key ignition were ON/OFF state. During burglary of vehicles, the owner can deactivate engine vehicles ignition then consecutively owner can lock the gear panel, ABS brakes can also be locked if necessary. Later with the usage of SIM900A GPS/GSM module, current latitude and longitude value are fetched and the same locations are transferred via SMS (Short Message Service) to the owners mobile. The complete prototype is designed on a single chip which is very simple and cost effective.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128227355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Prediction System Using Internet of Things","authors":"S. Balaji, S. Karthik","doi":"10.1109/ICACCS48705.2020.9074299","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074299","url":null,"abstract":"Electrical Energy Prediction is a very important task for an industry. Electricity load and price forecasting is fundamental in decision making mechanisms for many energy companies. Wrong estimation of cost leading to over-contracting and under contracting leading to buying and selling the power can lead to loss of finance and there are cases of companies going bankrupt. Due to these reasons, energy predictions are an important feature for safe keeping the company's future. The purpose of this work is to create a energy prediction system using machine learning algorithms such as LSTM, KNN etc. and predict the abnormalities and energy consumption of a building or an company.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Deep Convolutional Model for Segmentation of Nucleus and Cytoplasm from Pap Stained Cell Images","authors":"K. Sabeena, C. Gopakumar, R. Thampi","doi":"10.1109/ICACCS48705.2020.9074244","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074244","url":null,"abstract":"For the early detection of cervical dysplasia, automated cervical cell analysis system requires an accurate segmentation of nucleus and cytoplasm from cells. The segmentation of cellular materials from pap stained cytology image is open issue due to touching and crowded cells, presence of inflammatory cells, mucus and blood in the image. In this paper, for detecting and analyzing cell components from cervical smears, we developed a deep convolution framework using FC-Densenet56. Here images from Herlev dataset are trained and tested in deep architectures. A combination of FC-DenseNet56 and ResNet101 were used in proposed method to get an accurate result. For the comparison purpose, the results of proposed segmentation were evaluated with Precision and Dice coefficient, that achieves better results than the works reported in the literature. The performance parameters such as Precision and Dice coefficient is obtained greater than 90% and Recall and IoU got values greater than 85%. Besides cervical smear images, the proposed methodology can be adopted for segmentation of other cytology images.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122334162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multipath & Multi Packet Secured knowledge Transmission Victimization Energy state observance & Dynamic","authors":"S. Kannan, S. Amutha","doi":"10.1109/icaccs48705.2020.9074279","DOIUrl":"https://doi.org/10.1109/icaccs48705.2020.9074279","url":null,"abstract":"Recently, Wireless Mobile Networks (WMNs) square measure significantly created owing to the expansion of ease, wide offered remote cell phones. With the expanding kind of portable applications, similar to online life systems, GPS, cry, and so on, individuals' life has been indissoluble from cell phones that may get to the web at whenever and anyplace. Notwithstanding, inferable from the receptiveness normal for remote channels, it gets simpler for malevolent hubs to meddle the entrance system by change of state or molding demand messages.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. H. M. Al-Kadei, Huda Abdalkaream Mardan, Nevart A. Minas
{"title":"Speed Up Image Encryption by Using RSA Algorithm","authors":"F. H. M. Al-Kadei, Huda Abdalkaream Mardan, Nevart A. Minas","doi":"10.1109/ICACCS48705.2020.9074430","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074430","url":null,"abstract":"Since the existing RSA Algorithm needs long key sizes, requires big memory spaces and also a long execution time, it seems necessary to make some changes or taking some necessary precautions during the implementation of RSA in order to provide maximum security level. In this paper, three experiments were developed in order to examine the execution time of the processes of encryption and decryption and comparing the results together to elicit the improved points and discussing them. Moreover, some programming techniques will be used in order to speed up the process of encryption or decryption. The results indicate that the execution time of encryption process was improved by 14% in experiment 3 by using some techniques to speed up the process, the decryption process was improved as well by 22%.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Forgery Detection using Deep Learning: A Survey","authors":"Zankhana Barad, Mukesh M Goswami","doi":"10.1109/ICACCS48705.2020.9074408","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074408","url":null,"abstract":"The information is shared in form of images through newspapers, magazines, internet, or scientific journals. Due to software like Photoshop, GIMP, and Coral Draw, it becomes very hard to differentiate between original image and tampered image. Traditional methods for image forgery detection mostly use handcrafted features. The problem with the traditional approaches of detection of image tampering is that most of the methods can identify a specific type of tampering by identifying a certain features in image. Nowadays, deep learning methods are used for image tampering detection. These methods reported better accuracy than traditional methods because of their capability of extracting complex features from image. In this paper, we present a detailed survey of deep learning based techniques for image forgery detection, outcomes of survey in form of analysis and findings, and details of publically available image forgery datasets.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127980499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual Authentication and Location Privacy using HECC and SHA 2 in Mobile Cloud Computing Environment","authors":"Karuna Rana, Hinamshu Yadav, Chetan Agrawal","doi":"10.1109/ICACCS48705.2020.9074369","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074369","url":null,"abstract":"Cloud computing alludes to information sharing, putting away of information in distributed storage and sharing assets to the customer. Regarding the data security is a top undermining issues, in this paper we analyze about the data uprightness issues of the cloud. A protected correspondence is exceptionally required and is acted in the proposed calculation. Preserve the privacy of the data. SPYSECUREOU (Secure Documents Care Owner and User) data, which contains personal data of the client, is dealt with in re-appropriated condition. Here the endorsing of the data is checked by the information proprietor or a TPA—outsider inspecting utilizing Secure Hash Algorithm (SHA2) which work alongside the Hyper Elliptic Curve Crypto framework which is an encryption method for the information which make use of multiple phases, conversion and paradigm related to data in binary form provide high security in low computation time. To preserve the security of that data is the main objective of this dissertation. The approach also exhibit data shared efficiency in comment (Data posting) phase and accessing phase. A further extension to the work can be opting out in giving efficiency with encryption model.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}