Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441415
R. Maidhili, G. Karthik
This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN
{"title":"Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441415","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441415","url":null,"abstract":"This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441212
N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya
Spectacular benefits of virtualization and cloud computing technologies have stimulated the Information and Communication Technology sector towards adopting cloud computing. Various ICT-enabled service providers also have either adopted cloud computing or started migrating services to cloud infrastructure. However, the increasing demand for cloud based infrastructure has resulted into severe problem of resource management and load balancing for cloud service providers and consumers. Researchers have suggested various load balancing techniques for efficient resource utilization in cloud. A novel load balancing technique representing relocation of workload from overloaded VM to lightly loaded VM in cloud computing environment is presented in this paper. An attempt is made to help the cloud stake holders to overcome the imbalanced resource utilization problem is presented in this paper. The approach presented here is also useful during disaster management for safeguarding end-user applications and thereby assisting upholding cloud services.
{"title":"Implementation of Novel Load Balancing Technique in Cloud Computing Environmen","authors":"N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya","doi":"10.1109/ICCCI.2018.8441212","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441212","url":null,"abstract":"Spectacular benefits of virtualization and cloud computing technologies have stimulated the Information and Communication Technology sector towards adopting cloud computing. Various ICT-enabled service providers also have either adopted cloud computing or started migrating services to cloud infrastructure. However, the increasing demand for cloud based infrastructure has resulted into severe problem of resource management and load balancing for cloud service providers and consumers. Researchers have suggested various load balancing techniques for efficient resource utilization in cloud. A novel load balancing technique representing relocation of workload from overloaded VM to lightly loaded VM in cloud computing environment is presented in this paper. An attempt is made to help the cloud stake holders to overcome the imbalanced resource utilization problem is presented in this paper. The approach presented here is also useful during disaster management for safeguarding end-user applications and thereby assisting upholding cloud services.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117022518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441324
K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani
Today there is a rapid proliferation of DC loads into the market and DC micro grid with renewable energy sources is emerging as a possible solution to meet growing energy demand. As different energy sources like solar, wind, fuel cell, and diesel generators can be integrated into the DC grid, Management of power flow among the sources is essential. In this paper, a control strategy for Management of power flow in DC micro grid with solar and wind energy sources is presented. As the regulation of voltage profile is important in a standalone system, a dedicated converter is to be employed for maintaining the DC link voltage. DC link voltage is regulated by the battery circuit while maximum power is extracted from Solar and Wind to feed the loads connected at the DC bus. A powerflow algorithm is developed to control among three sources in the DC Microgrid. The algorithm is tested for various load conditions and for fluctuations in solar and wind power in MATLAB/SIMULINK environment.
{"title":"A Management of power flow for DC Microgrid with Solar and Wind Energy Sources","authors":"K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani","doi":"10.1109/ICCCI.2018.8441324","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441324","url":null,"abstract":"Today there is a rapid proliferation of DC loads into the market and DC micro grid with renewable energy sources is emerging as a possible solution to meet growing energy demand. As different energy sources like solar, wind, fuel cell, and diesel generators can be integrated into the DC grid, Management of power flow among the sources is essential. In this paper, a control strategy for Management of power flow in DC micro grid with solar and wind energy sources is presented. As the regulation of voltage profile is important in a standalone system, a dedicated converter is to be employed for maintaining the DC link voltage. DC link voltage is regulated by the battery circuit while maximum power is extracted from Solar and Wind to feed the loads connected at the DC bus. A powerflow algorithm is developed to control among three sources in the DC Microgrid. The algorithm is tested for various load conditions and for fluctuations in solar and wind power in MATLAB/SIMULINK environment.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441314
S. Saravanan, P. Sudhakar
Telemedicine is a Health care service of ICT for Emergency treatment using internet communication between patients to specialist doctors. The internet communication is important transmission of large size medical data, videoconferencing between patients of doctors to specialist doctors. Some rural area has less mobile signal strength, so the down load and upload internet speed has low speed. In the Telemedicine service need to transmit large size of medical data and need internet speed up to 3 Mbps to 10 Mbps. The design of advanced mobile dish antenna with FM radio Antenna for increase the internet speed. This paper explains how to design mobile dish antenna with FM radio Antenna in Telemedicine service.
{"title":"FM Radio Antenna with Mobile Dish Antenna for Internet communication in Telemedicine","authors":"S. Saravanan, P. Sudhakar","doi":"10.1109/ICCCI.2018.8441314","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441314","url":null,"abstract":"Telemedicine is a Health care service of ICT for Emergency treatment using internet communication between patients to specialist doctors. The internet communication is important transmission of large size medical data, videoconferencing between patients of doctors to specialist doctors. Some rural area has less mobile signal strength, so the down load and upload internet speed has low speed. In the Telemedicine service need to transmit large size of medical data and need internet speed up to 3 Mbps to 10 Mbps. The design of advanced mobile dish antenna with FM radio Antenna for increase the internet speed. This paper explains how to design mobile dish antenna with FM radio Antenna in Telemedicine service.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441318
V. A. S. Ponnapalli, V. Y. J. Pappu
This research article explores the effect of centre antenna element on the array factor properties of the deterministic triangular fractal array antenna of expansion factor two. This sub-array based fractal array antenna is designed based on the concentric elliptical sub array geometric generator methodology. An alteration of the fractal array geometry is considered in which one of the antenna element is placed at the centre of the each sub-array of the deterministic triangular fractal array. Owing to the centre antenna element side lobe ratios are diminished from −25dB to −52dB and −30dB to −41dB in the triangular fractal array of second and third iterations simultaneously, with little variation in the side lobe level angle and beam width.
{"title":"Effect of Centre Antenna Element on Array Factor Properties of the Deterministic Triangular Fractal Array Antenna","authors":"V. A. S. Ponnapalli, V. Y. J. Pappu","doi":"10.1109/ICCCI.2018.8441318","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441318","url":null,"abstract":"This research article explores the effect of centre antenna element on the array factor properties of the deterministic triangular fractal array antenna of expansion factor two. This sub-array based fractal array antenna is designed based on the concentric elliptical sub array geometric generator methodology. An alteration of the fractal array geometry is considered in which one of the antenna element is placed at the centre of the each sub-array of the deterministic triangular fractal array. Owing to the centre antenna element side lobe ratios are diminished from −25dB to −52dB and −30dB to −41dB in the triangular fractal array of second and third iterations simultaneously, with little variation in the side lobe level angle and beam width.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441267
Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya
Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.
{"title":"Image Encryption: A Random Selection Approach","authors":"Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya","doi":"10.1109/ICCCI.2018.8441267","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441267","url":null,"abstract":"Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441466
D. Suresh, K. Venkateswarlu, S. Singh
In this paper, five level distributed static compensator (DSTATCOM) is demonstrated to reduce harmonics efficiently. The topology of the DSTATCOM consists of the cascaded H-hridge multilevel inverter (CHBMLI), de link and interfacing inductor. The dc link voltage regulated with single input fuzzy logic controller. The concept of the SIFLC is derived from conventional FLC with signed distance. This simplification allows SIFLC control surface to approximated piece wise linear surface (PWL). The derived PWL surface is used for individual de capacitor voltage regulation. The instantaneous reactive power theory is used for reference current generation. The SIFLC for CHBMLI based DSTATCOM individual dc voltage regulation is proposed. The CHBMLI based DSTATCOM with SIFLC efficiently compensates the reactive current of the nonlinear load. The performance characteristics of the CHBMLI based DSTATCOM using SIFLC is compared with conventional fuzzy logic controller. The simulated response of DSTATCOM with the SIFLC shows effective compensation performance for a dynamic change in the load than the Conventional fuzzy logic controller.
{"title":"SIFLC based control implementation of DSTATCOM","authors":"D. Suresh, K. Venkateswarlu, S. Singh","doi":"10.1109/ICCCI.2018.8441466","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441466","url":null,"abstract":"In this paper, five level distributed static compensator (DSTATCOM) is demonstrated to reduce harmonics efficiently. The topology of the DSTATCOM consists of the cascaded H-hridge multilevel inverter (CHBMLI), de link and interfacing inductor. The dc link voltage regulated with single input fuzzy logic controller. The concept of the SIFLC is derived from conventional FLC with signed distance. This simplification allows SIFLC control surface to approximated piece wise linear surface (PWL). The derived PWL surface is used for individual de capacitor voltage regulation. The instantaneous reactive power theory is used for reference current generation. The SIFLC for CHBMLI based DSTATCOM individual dc voltage regulation is proposed. The CHBMLI based DSTATCOM with SIFLC efficiently compensates the reactive current of the nonlinear load. The performance characteristics of the CHBMLI based DSTATCOM using SIFLC is compared with conventional fuzzy logic controller. The simulated response of DSTATCOM with the SIFLC shows effective compensation performance for a dynamic change in the load than the Conventional fuzzy logic controller.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441472
K. Shibija, Raymond Joseph
Today, the use of mobile phone is growing in all the areas and unfortunately, it made the mobile phones a continuous target of cyber attackers. The main source of these kinds of attack is the malicious applications which a user will be downloading from trusted mediums such as Playstore, App store and all. Considering the millions of applications, the play store is having, it is impossible to identify which one is malicious and which one is not for a user. Even after the installation, the user will not be able to understand the activities the application will be performing in the mobile device. A lot of problems are arising nowadays because of this and a lot of confidential information is getting leaked from the mobile device. So, it is important to have a platform where it should be able to distinguish a malicious app from the set of benign app. This system is a mobile android application which will be working based on machine learning. The application will perform both static and dynamic analysis to identify the malicious activities of an application. The static analysis is mainly focused on the manifest.xml file of an Android application and the dynamic analysis will be based on the actions it will be triggering while running on a mobile device. The system is capable of combining both static and dynamic analysis results. The main aim of this project is to develop an efficient and effective android mobile application with a high success rate of distinguishing malicious from benign applications.
{"title":"A Machine Learning Approach to the Detection and Analysis of Android Malicious Apps","authors":"K. Shibija, Raymond Joseph","doi":"10.1109/ICCCI.2018.8441472","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441472","url":null,"abstract":"Today, the use of mobile phone is growing in all the areas and unfortunately, it made the mobile phones a continuous target of cyber attackers. The main source of these kinds of attack is the malicious applications which a user will be downloading from trusted mediums such as Playstore, App store and all. Considering the millions of applications, the play store is having, it is impossible to identify which one is malicious and which one is not for a user. Even after the installation, the user will not be able to understand the activities the application will be performing in the mobile device. A lot of problems are arising nowadays because of this and a lot of confidential information is getting leaked from the mobile device. So, it is important to have a platform where it should be able to distinguish a malicious app from the set of benign app. This system is a mobile android application which will be working based on machine learning. The application will perform both static and dynamic analysis to identify the malicious activities of an application. The static analysis is mainly focused on the manifest.xml file of an Android application and the dynamic analysis will be based on the actions it will be triggering while running on a mobile device. The system is capable of combining both static and dynamic analysis results. The main aim of this project is to develop an efficient and effective android mobile application with a high success rate of distinguishing malicious from benign applications.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132604195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441423
R. Kodali, Venkata Sundeep Kumar Gorantla
Individuals show immense interest in making the things around them smart by implementing new technologies. This paper mainly focuses on detection of motion in a particular area and if it is detected a notification will be sent to the person. In current implementation the PIR sensor is integrated to low-cost and Wi-Fi enabled NodeMCU Microcontroller in order to detect the motion. The NodeMCU posts the information to Thinger.io cloud which uses RESTful Programming Interface for easy integration of components. Pyroelectric Infrared (PIR) sensors are simple and most powerful people presence triggers. We also integrated IFTTT channel maker, a Web based service to thinger.io in order to get notifications when motion is detected. Here the PIR Sensor sends a signal to ESP 8266 if a motion is detected and now this information is uploaded on the thinger.io cloud and it is notified in IFTTT which is the HTTP Endpoint configuration to thinger.io cloud.
{"title":"RESTful Motion Detection and Notification using IoT","authors":"R. Kodali, Venkata Sundeep Kumar Gorantla","doi":"10.1109/ICCCI.2018.8441423","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441423","url":null,"abstract":"Individuals show immense interest in making the things around them smart by implementing new technologies. This paper mainly focuses on detection of motion in a particular area and if it is detected a notification will be sent to the person. In current implementation the PIR sensor is integrated to low-cost and Wi-Fi enabled NodeMCU Microcontroller in order to detect the motion. The NodeMCU posts the information to Thinger.io cloud which uses RESTful Programming Interface for easy integration of components. Pyroelectric Infrared (PIR) sensors are simple and most powerful people presence triggers. We also integrated IFTTT channel maker, a Web based service to thinger.io in order to get notifications when motion is detected. Here the PIR Sensor sends a signal to ESP 8266 if a motion is detected and now this information is uploaded on the thinger.io cloud and it is notified in IFTTT which is the HTTP Endpoint configuration to thinger.io cloud.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441492
R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna
Sentiment analysis or opinion mining has been used widely in various applications like market analysis. Usually during sentiment detection the polarity of the sentiment either positive or negative is detected. Basically there are multiple classes of emotions and so emotion detection is different from sentiment analysis. Reading a novel for a visually impaired person with the help of a text to speech synthesizer is still a challenging task, since it was not possible to modulate the sound with respect to the emotion in the text or dialogue. Text to speech softwares can synthesize the speech signal to embrace the emotions if the emotion of that particular text was already annotated. Multi-Class emotion detection aims analyse different emotions hidden in the text data. Multi-class emotion classification in Indian languages was not experimented before. In this paper, an SVM classifier is used for sentence level multi-class emotion detection in Malayalam. The proposed approach uses different syntactic features such as n-gram, POS related, negation related, level related features etc, for better classification. The classifier classifies the Malayalam sentences into different emotion classes like happy, sad, anger, fear or normal etc. with level information such as high, low etc. It also states whether the sentence is dialogue, question or not for better hearing experience from a speech synthesiser while reading the novel.
{"title":"Multi-Class Emotion Detection and Annotation in Malayalam Novels","authors":"R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna","doi":"10.1109/ICCCI.2018.8441492","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441492","url":null,"abstract":"Sentiment analysis or opinion mining has been used widely in various applications like market analysis. Usually during sentiment detection the polarity of the sentiment either positive or negative is detected. Basically there are multiple classes of emotions and so emotion detection is different from sentiment analysis. Reading a novel for a visually impaired person with the help of a text to speech synthesizer is still a challenging task, since it was not possible to modulate the sound with respect to the emotion in the text or dialogue. Text to speech softwares can synthesize the speech signal to embrace the emotions if the emotion of that particular text was already annotated. Multi-Class emotion detection aims analyse different emotions hidden in the text data. Multi-class emotion classification in Indian languages was not experimented before. In this paper, an SVM classifier is used for sentence level multi-class emotion detection in Malayalam. The proposed approach uses different syntactic features such as n-gram, POS related, negation related, level related features etc, for better classification. The classifier classifies the Malayalam sentences into different emotion classes like happy, sad, anger, fear or normal etc. with level information such as high, low etc. It also states whether the sentence is dialogue, question or not for better hearing experience from a speech synthesiser while reading the novel.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122204156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}