{"title":"Internet of Things based home automation system","authors":"S. Soumya, Malini Chavali, Shuchi Gupta, N. Rao","doi":"10.1109/RTEICT.2016.7807947","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807947","url":null,"abstract":"The internet has been connecting people and making life simpler by providing all kinds of information with the click of a button. The next big wave in this domain is the internet of things which will enable physical objects used in day to day life to connect to the internet and exchange data. In this paper a home automation system based on internet of things is developed. This allows the user to automate all the devices and appliances of home and integrate them to provide seamless control over every aspect of their home. The designed system not only monitors the sensor data, but also actuates a process according to the requirement, for example switching on the light when it gets dark and it allows the user to control the household devices from anywhere.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"13 1","pages":"848-850"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87002240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based robots for industrial security and application","authors":"Pawan Nandkumar Bachate, Shubhangi M. Mahamuni","doi":"10.1109/RTEICT.2016.7808135","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808135","url":null,"abstract":"Use of FPGA's in robotics gives us lots of option to solve the complex operations and real time applications as well. The speed and reconfigure ability of FPGA make that possible. Wireless communication which is having tremendous applications, we are making the use of wireless communication along with FPGA to have industrial security as well as application. The implementations of such a system will definitely going to solve the problem of real time applications in industry. Such a system with access and use of internet for indication of situation in industry is adding the value in the system. Implementation of one wireless node is done here; with increase in the number of nodes we can have bigger systems for outdoor applications.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"44 1","pages":"1757-1760"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89100693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subiya Yaseen, J. Singh, S. Tarannum, H. Ahmed, S. Fathima, Syeda Husna Mohammadi
{"title":"Implementation of controlled access methods for wireless communication using VLSI","authors":"Subiya Yaseen, J. Singh, S. Tarannum, H. Ahmed, S. Fathima, Syeda Husna Mohammadi","doi":"10.1109/RTEICT.2016.7808104","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808104","url":null,"abstract":"In Data Communication [1], when two or more stations send the data at the same time, there are possibilities that the data packets from different stations may collide. Thus, a protocol is required which may coordinate the data transfer among the computers that share the medium. One such MAC (Medium Access Control) Protocol uses sharing of the transmission channel using three methods namely token passing, reservation and polling. A Verilog Code is written for the same and using VLSI (Very Large Scale Integration) and System on Chip Design, Simulation Results and synthesized outputs are obtained. The results are analyzed for SPARTAN 6 FPGA devices.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"64 1","pages":"1607-1611"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79660344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of CAN bus protocol for monitoring vehicle parameters","authors":"A. A. Salunkhe, Pravin Kamble, Rohit Jadhav","doi":"10.1109/RTEICT.2016.7807831","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807831","url":null,"abstract":"CAN bus is a serial bus protocol used in most automotive industries. Recently, more attention on the CAN bus network application and wireless transmission bus carrying technology. CAN bus technology is adopted in modern vehicles to reduce the wiring harness and controls the vehicle using electronics system. In this paper, CAN bus protocol is implemented using a single board computer (SBC) and accessed the vehicle parameters remotely. Raspberry Pi is used as SBC which has a high performance processor used to increase speed ability. The presented work concentrate on the communication between three nodes using a CAN bus and how to access modern vehicle ECU parameters using OBD II connector. The paper is described further set up of CAN device using Linux software.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"46 1","pages":"301-304"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84653746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to detect brain tumour in MRI images using hybrid technique with SVM classifiers","authors":"M. Jahanavi, Sreepriya Kurup","doi":"10.1109/RTEICT.2016.7807881","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807881","url":null,"abstract":"The proposed system consists of a hybrid techniques are combining SVM algorithm along with two combined clustering techniques such as k-mean techniques, fuzzy c-mean methods, these all are used to find out the brain tumor. The hybrid techniques are involving image enhancement which is done by contrast improvement and midrange stretch, skull striping is done through double thresholding using morphological operations, segmentation of the image is done through two clustering techniques such as k-means and FCM in which separate analysis is done and also it is also enhanced by combining these k-means and FCM.FCM uses member ship functions to detect real tumor region. The feature extraction is performed by using gray level run length matrix. Finally SVM is helped to classify the image and also grade the location of the tumor is done with sensitivity, specificity, accuracy parameters. GUI program is constructed to test proposed algorithm.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"49 1","pages":"546-549"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90738339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of amplify and forward technique to improve secrecy rate in multi-hop relaying system","authors":"Km Divya Gawtham, P. Jindal","doi":"10.1109/RTEICT.2016.7807783","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807783","url":null,"abstract":"In this paper, Two cooperative techniques Amplify and Forward (AF) and Decode and Forward (DF) have been analyzed in multi-hop relay network with full duplex (FDRs) and half duplex relays (HDRs). The performance analysis has been done in terms of secrecy rate for both AF and DF. Numerical results show that AF with FDRs and HDRs improves the secrecy rate over the DF. AF technique outperforms DF by 44% with FDRs and 40% with HDRs.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"88 1","pages":"62-64"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78173752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apratim Ambade, Sunitha Premakumar, Rini Patel, H. B. Chaudhari, A. Tillu, U. Yerge, R. Rajan, R. I. Bakhtsingh
{"title":"Direct power control PWM rectifier using switching table for series resonant converter capacitor charging pulsed power supply","authors":"Apratim Ambade, Sunitha Premakumar, Rini Patel, H. B. Chaudhari, A. Tillu, U. Yerge, R. Rajan, R. I. Bakhtsingh","doi":"10.1109/RTEICT.2016.7807928","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807928","url":null,"abstract":"This paper presents the analysis of a direct power control (DPC) technique and model using switching table for Pulsed power system used in linear electron accelerator. High voltage pulse are required in such accelerator are generated using smart modulator based on capacitor charging power supply (CCPS). The CCPS used has a series-resonant topology, which acts as a nonlinear and discontinuous load. Hence power factor is poor in 3-phase mains supply. Active rectifiers are good choice for power factor correction in non-linear loads. The simplest form of active rectification is based on direct power control (DPC) using switching table where. The Control algorithm stored in switching table in DPC provides smooth regulation of instantaneous active and reactive powers. The unity power factor (UPF) operation maintains the reactive power zero in all sectors. Simulation verifies the harmonic distortion content are maintained within standard limits.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"10 1","pages":"758-762"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78317308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of concatenated codes for different channels","authors":"N. Sharanya, S. Jayashree","doi":"10.1109/RTEICT.2016.7807917","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807917","url":null,"abstract":"Forward Error Correction codes are required to remove errors such as noise, crosstalk etc that transpire in communication channel. In this paper, we propose a concatenated (Single Parity Check, BCH and Low Density Parity Check) coding method to remove the errors and improve the efficiency of the system. Simulation results shows that Single Parity Check method along with BCH and Low Density Parity Check gives better results. Performance of these coding methods in different channels such as AWGN, Rayleigh and Rician channels are also simulated. SPC method having simple encoding and decoding mechanism does not give good BER. LDPC in contrast to BCH achieves higher performance and better error correction capability.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"4 1","pages":"715-719"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74906426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based monitoring and control of appliances for smart home","authors":"Praveen Kumar, U. C. Pati","doi":"10.1109/RTEICT.2016.7808011","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808011","url":null,"abstract":"The recent technology in home automation provides security, safety and comfortable life at home. That is why in the competitive environment and fast world, home automation technology is required for every person. This purposed home automation technology provides smart monitoring and control of the home appliances as well as door permission system for interaction between the visitor and home/office owner. The control and monitoring the status (ON/OFF of the appliances) have been implemented using multiple ways such as The Internet, electrical switch, and Graphical User Interface (GUI) interface. The system has low-cost design, user-friendly interface, and easy installation in home or multi-purpose building. Using this technology, the consumer can reduce the wastage of electrical power by regular monitoring of home appliances or the proper ON/OFF scheduling of the devices.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"16 1","pages":"1145-1150"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74426166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of algorithms for MAV security","authors":"N. Prapulla, S. Veena, G. Srinivasalu","doi":"10.1109/RTEICT.2016.7807936","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807936","url":null,"abstract":"This paper describes the various security schemes required for incorporating security to the data being transmitted over the wireless link between a Micro Air Vehicle (MAV) and Ground Control Station (GCS). The suggested security schemes are developed in software and is integrated with the open source communication protocol i.e., MAVLink. The ciphers used in the adapted method are, Advanced Encryption Standard in Counter mode (AES-CTR) algorithm is used for data encryption, SHA-256 for key Hashing and Diffie-Hellman(D-H) for key exchange. This provides both encryption and authentication to the MAV communication, So that it results in improved security and integrity of the system in the real time applications.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"45 1","pages":"799-802"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84886915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}