{"title":"Automatic number plate recognition system for vehicle identification","authors":"P. Patil, C. Kanagasabapathi, S. Yellampalli","doi":"10.1109/ICEECCOT.2017.8284543","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284543","url":null,"abstract":"The proposed system will be designed as for the automatic vehicle identification for the security purpose. The number plate of the vehicle is identified by image identification technology. This system can be implemented for the security checking in the area of the parliament and defence military area and also used in the toll plaza, parking fee collection etc. The images of the vehicles will be captured by cameras and those captured images will be processed by MAT LAB. Here the MaTLAB is used for the image identification and vehicle number extraction. The system contains embedded section for the automatic control of the gate and communication purpose. A LCD screen will be provided at the entry of the gate to gives the instruction to the driver and whether he is permitted to this area or not and the message will be passed to security cabin. The communication between MATLAB and microcontroller is done by using Zigbee. We can also extend to get the information of the vehicle owner, by incorporating the RTO database. The embedded section is programmed by using embedded c.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge preserving image enhancement using median absolute deviation and iterative median absolute deviation","authors":"Shivaprasad, C. D’souza, P. Vinay","doi":"10.1109/ICEECCOT.2017.8284668","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284668","url":null,"abstract":"The aim of image enhancement is to produce a processed image which is more suitable than the original image for specific application. Application can be edge detection, boundary detection, image fusion, segmentation etc. In this paper different types of image enhancement algorithms in spatial domain are presented for gray scale images. Quantitative analysis like AMBE, MSE and PSNR for the different enhancement algorithms are evaluated. Algorithms like Linear contrast stretching, Fuzzy based image enhancement, and Local mean local standard deviation are discussed and compared. During result analysis, it has been observed that some algorithms do give considerably highly distinct values of PSNR, MSE and AMBE (parameters) for different images. To stabilize these parameters, a new enhancement scheme Median Absolute Deviation (MAD) is proposed, which will take care of these issues. By experimental analysis It has been observed that proposed method gives better AMBE (should be less) and PSNR (should be high) values compared with other algorithms, also these values are not highly distinct for different images. Also elapsed time taken by different algorithms to achieve desired application is recorded. MAD based image enhancement is faster also provides best values of MSE, PSNR and AMBE when applied on a database consisting of 400 images.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of Gilbert cell mixer for ultrawide band applications and noise parameters","authors":"Kamalakar Pallela, Umadevi Gurram, Suryanarayan Palleboina","doi":"10.1109/ICEECCOT.2017.8284621","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284621","url":null,"abstract":"Gilbert Mixer Cell is very popular active mixer that is used in most of the electronic applications. Various noise parameters related with the Gilbert mixer have significance importance to understand in a detailed study. Very less work in this area was carried out in the past with respect to various noise related issues. In this paper a detailed study on noise parameters in the Gilbert mixer cell are discussed and a simplified mixer cell is proposed which is suitable for ultra-wide (UWB) applications. The obtained noise figure is less when compared with previous works. The mixer circuit proposed in this paper delivered best suitable outputs for the low-voltage application in UWB frequency range.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126419890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancements and recent trends in emotion recognition using facial image analysis and machine learning models","authors":"Tuhin Kundu, C. Saravanan","doi":"10.1109/ICEECCOT.2017.8284512","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284512","url":null,"abstract":"As the demand for systems with human computer interaction grows, automated systems with human gesture and emotion recognition capabilities are the need of the hour. Emotions are understood by textual, vocal, and verbal expression data. Facial imagery also provides a constructive option to interpret and analyse human emotional issues. This paper describes the recent advancements in methods and techniques used to gauge the five primary emotions or moods frequently captured on images containing the human face: surprise, happiness, disgust, normality, drowsiness, through automated machinery. Looking at the recent developments in facial expression recognition techniques, the focus is on artificial neural networks and Support Vector Machine (SVM) in emotion classification. The technique first analyses the information conveyed by the facial regions of the eye and mouth into a merged new image and using it as an input to a feed forward neural network trained by back propagation. The second method showcases the use of Oriented Fast and Rotated (ORB) on a single frame of imagery to extract texture information, and the classification is completed using SVM. The special case of drowsiness detection systems using facial imagery by pattern classification, as automated drowsiness detection promises to play a revolutionary role in preventing road fatalities due to lethargic symptoms in drivers is also discussed.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of space vector intonation system","authors":"G. Shobha, G. S. Gamya, T. Yuvaraja","doi":"10.1109/ICEECCOT.2017.8284547","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284547","url":null,"abstract":"In recent days, multilevel inverters play an important role in industrial applications, renewable energy systems and various FACTS compensators [1]. The multilevel inverter (MLI) has many advantages like reduced harmonic level, improved output voltage, low EMI problems and output voltage nearly sinusoidal. MLI was introduced to discover the solution to improve voltage ranges of conventional semiconductors. It facilitates and encourages the researchers to contribute their research work in the distribution system analyses. Most prominently, it provides a wide opening to the researchers in distribution system optimization and fault analysis. This paper details the set up/hardware equipments of the proposed workstation and its simulation package.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121539553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. B. Biradar, P. Vishwas, C. Chetan, B. S. Premananda
{"title":"Design and performance analysis of modified unsigned braun and signed Baugh-Wooley multiplier","authors":"V. B. Biradar, P. Vishwas, C. Chetan, B. S. Premananda","doi":"10.1109/ICEECCOT.2017.8284612","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284612","url":null,"abstract":"Adders and Multipliers play a vital role in the functioning of various systems used in communication and signal processing. Baugh Wooley and Braun multipliers employ parallel architecture and hence they are the most frequently used multipliers for signed and unsigned operations. In any system design, the three main constraints which determine the performance of the system are speed, area and power requirement. This work involves design and implementation of modified Baugh-Wooley and Braun multipliers for signed and unsigned number multiplication respectively and analysis with respect to speed and power consumption of the designed multipliers. The adder is designed using three different logics, namely, Basic CMOS, Domino and Split Path Data Driven Dynamic Logic (SPD3L). The designed adder is then used to construct the multipliers. An improvement in power and reduction in delay is observed for both the designed multipliers.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based hardware implementation of hybrid cryptographic algorithm for encryption and decryption","authors":"Vikrant Shende, Meghana Kulkarni","doi":"10.1109/ICEECCOT.2017.8284540","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284540","url":null,"abstract":"In this paper, a hybrid encryption algorithm is proposed. The RSA (Rivest Shamir Adleman) public-key standard has been used along with AES (Advanced Encryption Standard), a symmetric key algorithm, thereby reinforcing the RSA architecture as well as giving rise to a much more secure encryption algorithm. This hybrid design is implemented on Modelsim to obtain the simulation results and then synthesized using Xilinx ISE platform and targeted on a FPGA. In the proposed hybrid system, to provide extra security and to achieve much stronger encryption, the AES key is also encrypted using RSA algorithm along with the encryption of plaintext by AES. This virtually provides a double layer of the security perimeter. For the decryption, the RSA public key is used to decrypt the AES key and then using this key, the original plaintext message is obtained.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel IoT based framework for blood glucose examination","authors":"G. Bhat, Nayana G. Bhat","doi":"10.1109/ICEECCOT.2017.8284666","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284666","url":null,"abstract":"Glucose checking is a fundamental piece of diabetes administration, and the support of physiological blood glucose fixation is the main route for a diabetic to evade perilous diabetic confusions. There have been constant advances in the field of glucose observing amid the most recent four decades, which have prompted the improvement of exceedingly developed blood glucose meters, non-obtrusive glucose monitoring (NGM) gadgets and continuous glucose monitoring systems (CGMS). Our thought comprises in understanding a keen framework to help a diabetic patient through the day by day life, in a nonobtrusive manner. The embraced strategy utilizes IR spectroscopy to decide the blood glucose level in an individual. A part based insightful versatile care framework with a Wi-Fi module, gives ready administration in unending consideration condition (Android Application). The sections in our framework incorporate patients, doctors, relatives and medicinal services suppliers. Each of the sections in framework communicate to a man who uses a cell phone, for example, a cell phone to speak with the server setup in the care focus to such an extent that he or she can go around without confinements. The framework is produced for home utilization of patients that should be continually or intermittently observed. In any basic condition, the required eating routine arrangement and area of adjacent healing centers are given. This guarantees brisk support of the patients and we can without much of a stretch spare many lives.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131504805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sindhu P. Menon, Ramith Bharadwaj, Pooja Shetty, P. Sanu, S. Nagendra
{"title":"Prediction of temperature using linear regression","authors":"Sindhu P. Menon, Ramith Bharadwaj, Pooja Shetty, P. Sanu, S. Nagendra","doi":"10.1109/ICEECCOT.2017.8284588","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284588","url":null,"abstract":"An urban heat island (UHI) is an urban area or metropolitan area that is significantly warmer than its surrounding rural areas due to human activities. The project aims to showcase the effect of UHI using temperature as the independent variable with pollution and population as the dependent factor variables. Using the Time Series analysis we obtained the trend in temperature, population and pollution. Using Multiple Linear Regression we have predicted the temperature based on the factors. The accuracy of the predicted values is depicted by comparing the predicted and measured values of the years 2013–2016. Hence proving that the predicted value is accurate and measures must be taken to prevent this or the temperature will increase to an unlivable extent.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified topology-hiding multipath routing (M-THMR) protocol: Solution to the topology exposure problem in MANET","authors":"A. Phalke, J. Lagad","doi":"10.1109/ICEECCOT.2017.8284529","DOIUrl":"https://doi.org/10.1109/ICEECCOT.2017.8284529","url":null,"abstract":"In the past few years MANETs had widespread usage in different applications. However, in-spite of having many advantages, they are prone to some serious security issues one of which being the topology exposure problem. Though there exist several Ad-hoc routing protocols that deal with some security issues in the MANETs, they hardly deal with the topology exposure problem, which makes them vulnerable to attack. Due to scarce resources MANETs tends to be difficult to be secured from malicious users. While underlining the necessity of hiding the topology of MANET when designing routing protocols, this paper presents ‘Modified Topology-Hiding Multipath Routing protocol’ (M-THMR) to address the security challenges in MANET, specifically those related to the topology exposure problem. M-THMR implements mechanisms for hiding the network topology, searching the nodes and avoiding unreliable routes. The paper analyses the general types of attacks on the MANET and shows the relationship between these attacks and the issue of topology exposure. Based on the performance evaluation, it is proposed that the M-THMR possess better capability of finding routes and nonetheless it does not degrade the performance of the network in the absence of attack. Moreover, in an adverse scenario, M-THMR is able to tackle an attack at the cost of very low overhead and short routing convergent time.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}