Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668168
Nishtha Gupta, Shubham Gupta, Divya Gupta
An individual has an ability to know various aspects of difficult situations and take spontaneous decisions about what to do in the next step. But till now, introduction of screens, displays, indicators, dials, gauges have provided human only a partial interface limiting individual’s ability to interact with reality.With the advancement of Augmented Reality (AR), this situation is evolving quickly, enabling people to profit by their regular perceptual and choice capacities, enhanced with the sensor and scientific abilities of an IoT stage.
{"title":"The rise in art of Augmented Reality","authors":"Nishtha Gupta, Shubham Gupta, Divya Gupta","doi":"10.1109/IC3IOT.2018.8668168","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668168","url":null,"abstract":"An individual has an ability to know various aspects of difficult situations and take spontaneous decisions about what to do in the next step. But till now, introduction of screens, displays, indicators, dials, gauges have provided human only a partial interface limiting individual’s ability to interact with reality.With the advancement of Augmented Reality (AR), this situation is evolving quickly, enabling people to profit by their regular perceptual and choice capacities, enhanced with the sensor and scientific abilities of an IoT stage.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"6 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668121
Komal Jaswal, Nirbhay Kashyap, Manmohan Singla, T. Choudhury
These days Internet of Things (IoT) has transformed into an extreme ponder which created strides in practically all fields of human life. This examination paper gives a survey of Internet of things and its engaging developments, security issues and creating applications in the remote progressions. There are enormous number of employments of Internet of things in essentially all aspects of life i.e. therapeutic administrations, collaborations and generation organize organization, savvy condition and social application et cetera thusly security is a fundamental stress of remote frameworks accordingly it is one of the rule issues in Internet of things. The following paper will provide a layout of some of the various security stresses in an Internet of things system, perils identified with it, challenges and a framework to protect Iot devices from such security issues
{"title":"A framework for Security and protection in Internet of things (IoT) devices","authors":"Komal Jaswal, Nirbhay Kashyap, Manmohan Singla, T. Choudhury","doi":"10.1109/IC3IOT.2018.8668121","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668121","url":null,"abstract":"These days Internet of Things (IoT) has transformed into an extreme ponder which created strides in practically all fields of human life. This examination paper gives a survey of Internet of things and its engaging developments, security issues and creating applications in the remote progressions. There are enormous number of employments of Internet of things in essentially all aspects of life i.e. therapeutic administrations, collaborations and generation organize organization, savvy condition and social application et cetera thusly security is a fundamental stress of remote frameworks accordingly it is one of the rule issues in Internet of things. The following paper will provide a layout of some of the various security stresses in an Internet of things system, perils identified with it, challenges and a framework to protect Iot devices from such security issues","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132496916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668128
Yasmeen Shaikh, V. Parvati, S. R. Biradar
Monitoring health of a person(s) has become a major IoT application where we need to have a system at home that helps inhabitants to have their health check done without affecting their daily routines. It is very much essential to have a IoT driven remote health monitoring system for ailing individuals which can inform caretakers in case of an emergency. These applications are constrained by the amount of data collected, managed and exchanged. The factors that constraint IoT applications are robustness, privacy, security and reliability. In this paper, a survey of various health care solutions using Internet of Things (IoT) is presented. This paper presents various challenges and problems that occur in smart health system and proposes solution to overcome them.
{"title":"Survey of Smart Healthcare Systems using Internet of Things (IoT) : (Invited Paper)","authors":"Yasmeen Shaikh, V. Parvati, S. R. Biradar","doi":"10.1109/IC3IOT.2018.8668128","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668128","url":null,"abstract":"Monitoring health of a person(s) has become a major IoT application where we need to have a system at home that helps inhabitants to have their health check done without affecting their daily routines. It is very much essential to have a IoT driven remote health monitoring system for ailing individuals which can inform caretakers in case of an emergency. These applications are constrained by the amount of data collected, managed and exchanged. The factors that constraint IoT applications are robustness, privacy, security and reliability. In this paper, a survey of various health care solutions using Internet of Things (IoT) is presented. This paper presents various challenges and problems that occur in smart health system and proposes solution to overcome them.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668147
K. Poornisha, M. R. Keerthana, S. Sumathi
As increase in population and over exploitation of water, groundwater level has decreased, people in the world face water crisis. India is an agarian country, farmers depend on groundwater, but to their disappointment there is irregular distribution of rainfall and failure of monsoon. So they are forced to drill borewells to greater depths and depend on it. Majority of people living in urban areas are dependent on borewells as there is no other alternative for water. The advancements in technology like Internet of Things, Cloud computing, Big Data, Internet facility can be used to design a system to monitor these immense important borewells to overcome disadvantages like poor quality drinking water, increased manpower requirements, irreversible damage caused to poorly monitored public motors. Design and development of monitoring pH, turbidity in the water and monitoring motor temperature and current in borewells would be of great use. Also borewells are not centrally monitored leading to dry run out or breakdown of the motor. Borewells are the vital source of water for the people in most of the towns and almost all cities to accomplish their basic requirements of a day. The system has two sensors for namely turbidity and pH sensor to check water quality and temperature sensor and current sensor for motor monitoring, Single microcontroller chip, a wifi chip is used to send the data of various borewells to a single sever. Thus by this system it is possible to monitor multiple borewells in a township remotely in a single mobile application.
{"title":"Borewell water quality and motor monitoring based on IoT gateway","authors":"K. Poornisha, M. R. Keerthana, S. Sumathi","doi":"10.1109/IC3IOT.2018.8668147","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668147","url":null,"abstract":"As increase in population and over exploitation of water, groundwater level has decreased, people in the world face water crisis. India is an agarian country, farmers depend on groundwater, but to their disappointment there is irregular distribution of rainfall and failure of monsoon. So they are forced to drill borewells to greater depths and depend on it. Majority of people living in urban areas are dependent on borewells as there is no other alternative for water. The advancements in technology like Internet of Things, Cloud computing, Big Data, Internet facility can be used to design a system to monitor these immense important borewells to overcome disadvantages like poor quality drinking water, increased manpower requirements, irreversible damage caused to poorly monitored public motors. Design and development of monitoring pH, turbidity in the water and monitoring motor temperature and current in borewells would be of great use. Also borewells are not centrally monitored leading to dry run out or breakdown of the motor. Borewells are the vital source of water for the people in most of the towns and almost all cities to accomplish their basic requirements of a day. The system has two sensors for namely turbidity and pH sensor to check water quality and temperature sensor and current sensor for motor monitoring, Single microcontroller chip, a wifi chip is used to send the data of various borewells to a single sever. Thus by this system it is possible to monitor multiple borewells in a township remotely in a single mobile application.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668141
Sachin Paswan, Y. Rathore
Leukemia is a development of the blood and bone marrow, the flexible tissue arranged the bones where platelets are made. Extraordinary myeloid leukemia (AML) is a champion among the most understood sorts of leukemia among adults. The signs and signs of leukemia are non-specific in nature and besides they are for all intents and purposes indistinguishable to the symptoms of other shared issue. Manual microscopic examination of recolored blood spread or bone marrow suction is the most ideal approach to fruitful investigation of leukemia. Regardless, this procedure is monotonous and less correct. In this paper, a technique for customized disclosure and portrayal of AML in blood spread is shown. K-implies calculation is utilized for division. KNN, CNN and SVM are utilized for grouping. GLCM is utilized for streamlining the ghostly highlights. Neighborhood double example is utilized for surface depiction. Blood magnifying instrument pictures were tried and the execution of the classifier was dissected. At long last, By utilizing CNN exactness of 98% has been accomplished
{"title":"Recognition and Arrangement of Blood Cancer from Microscopic Cell Pictures Utilizing Support Vector Machine K-Nearest Neighbor and Deep Learning","authors":"Sachin Paswan, Y. Rathore","doi":"10.1109/IC3IOT.2018.8668141","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668141","url":null,"abstract":"Leukemia is a development of the blood and bone marrow, the flexible tissue arranged the bones where platelets are made. Extraordinary myeloid leukemia (AML) is a champion among the most understood sorts of leukemia among adults. The signs and signs of leukemia are non-specific in nature and besides they are for all intents and purposes indistinguishable to the symptoms of other shared issue. Manual microscopic examination of recolored blood spread or bone marrow suction is the most ideal approach to fruitful investigation of leukemia. Regardless, this procedure is monotonous and less correct. In this paper, a technique for customized disclosure and portrayal of AML in blood spread is shown. K-implies calculation is utilized for division. KNN, CNN and SVM are utilized for grouping. GLCM is utilized for streamlining the ghostly highlights. Neighborhood double example is utilized for surface depiction. Blood magnifying instrument pictures were tried and the execution of the classifier was dissected. At long last, By utilizing CNN exactness of 98% has been accomplished","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668119
M. Darbandi, Saeed Haghgoo, Mahdi Hajiali, Alireza Khabir
Today, IT technologies and the internet are become an essential factors in human life’s. The demands level of the users are growing extensively, they need more generic software and hardware services, also they need, security in their processes and data transfers, dynamic accessibility, swift processing and also saving more money in their works. In this paper, we want to present new method for estimating and predicting the next user demands, and provide those services before direct request of the users. Our algorithm is based on Kalman filtering, and it used background usages of the users along with their suggestions in CRM section to be able to predict their next needs. By providing the next needs of the users, before their request, we can improve the level of customer satisfaction and also earn more money via suggesting the new software and applications.
{"title":"Prediction and Estimation of Next Demands of Cloud Users based on their Comments in CRM and Previous usages","authors":"M. Darbandi, Saeed Haghgoo, Mahdi Hajiali, Alireza Khabir","doi":"10.1109/IC3IOT.2018.8668119","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668119","url":null,"abstract":"Today, IT technologies and the internet are become an essential factors in human life’s. The demands level of the users are growing extensively, they need more generic software and hardware services, also they need, security in their processes and data transfers, dynamic accessibility, swift processing and also saving more money in their works. In this paper, we want to present new method for estimating and predicting the next user demands, and provide those services before direct request of the users. Our algorithm is based on Kalman filtering, and it used background usages of the users along with their suggestions in CRM section to be able to predict their next needs. By providing the next needs of the users, before their request, we can improve the level of customer satisfaction and also earn more money via suggesting the new software and applications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we are focusing on design and construction of Service-Oriented Architecture (SOA) enabled Internet of Things (IoT) based smart assistive system prototype, which can be dynamically configured and interfaced with array of sensors to prevent injuries of Autism Spectrum Disorder (ASD) individuals. This increase the quality of life of people with ASD. The proposed model suggested implementing a wearable array of sensor components to gather information about the physiological status of a person and environmental condition of his surroundings. Afterward the data forwarded to a cloud service for analysis purpose. The system compromises of various tier of interaction and storage, to form a ubiquitous platform. One of the layer in the tier are linked to wearable computing platform. Another layer of the tier is dedicated to data storage captured from raw sensor data. The interaction between the tiers nodes is performed over the Internet through HyperText Transfer Protocol (HTTP) REST API and Message Queuing Telemetry Transport (MQTT) protocol. The system work in three domain: services at home, services at community i.e. neighborhood and services away from home. We can access in real time and monitor of ASD person though mobile app and web. So our approach will be helpful to manage ASD affected individuals.
{"title":"A Service-Oriented IoT System to Support Individuals with ASD","authors":"Yigremachew Eshetu, Prachet Bhuyan, Ashutosh Behura","doi":"10.1109/IC3IOT.2018.8668138","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668138","url":null,"abstract":"In this work, we are focusing on design and construction of Service-Oriented Architecture (SOA) enabled Internet of Things (IoT) based smart assistive system prototype, which can be dynamically configured and interfaced with array of sensors to prevent injuries of Autism Spectrum Disorder (ASD) individuals. This increase the quality of life of people with ASD. The proposed model suggested implementing a wearable array of sensor components to gather information about the physiological status of a person and environmental condition of his surroundings. Afterward the data forwarded to a cloud service for analysis purpose. The system compromises of various tier of interaction and storage, to form a ubiquitous platform. One of the layer in the tier are linked to wearable computing platform. Another layer of the tier is dedicated to data storage captured from raw sensor data. The interaction between the tiers nodes is performed over the Internet through HyperText Transfer Protocol (HTTP) REST API and Message Queuing Telemetry Transport (MQTT) protocol. The system work in three domain: services at home, services at community i.e. neighborhood and services away from home. We can access in real time and monitor of ASD person though mobile app and web. So our approach will be helpful to manage ASD affected individuals.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668198
Sheikh Amanur Rahman, M. M. Sufyan Beg
Today, a greater amount of products/services reviews available on the Internet, e.g., blogs, review forum, discussion groups, etc. However, it is almost impossible for a user to read all of the different and possibly even contradictory opinions and make an informed decision. Generally, reviewers write the reviews related to the aspects of the product in the form of text and give the rating to the product. But some of the reviewers are biased while giving the rating to the product and while writing the review, they used to write genuine re-views, at least up to some extent, related to the aspects of the products. Moreover, there are also spammers who are paid to give the fake rating to the product. So, to overcome the challenges of direct rating of the product, instead, the rating of the product can be projected with the help of the aspects reviews of the product. Till now, there is no significant work on product rating based on the aspects reviews.Our proposed system works for the above-mentioned problem. The proposed system works in three phase, firstly; it identifies aspects and predicts the aspects rating, secondly; aspects along with their rating are classified/clustered and finally; based on aspect rating, product rating is calculated. Our work diminishes the effect of spam review or biased review. To the best of author’s knowledge, it is virtually first of its kind, related to product/aspect rating based on their aspect reviews.
{"title":"ProRat: Product Rating Prediction Model based on Online Product Reviews","authors":"Sheikh Amanur Rahman, M. M. Sufyan Beg","doi":"10.1109/IC3IOT.2018.8668198","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668198","url":null,"abstract":"Today, a greater amount of products/services reviews available on the Internet, e.g., blogs, review forum, discussion groups, etc. However, it is almost impossible for a user to read all of the different and possibly even contradictory opinions and make an informed decision. Generally, reviewers write the reviews related to the aspects of the product in the form of text and give the rating to the product. But some of the reviewers are biased while giving the rating to the product and while writing the review, they used to write genuine re-views, at least up to some extent, related to the aspects of the products. Moreover, there are also spammers who are paid to give the fake rating to the product. So, to overcome the challenges of direct rating of the product, instead, the rating of the product can be projected with the help of the aspects reviews of the product. Till now, there is no significant work on product rating based on the aspects reviews.Our proposed system works for the above-mentioned problem. The proposed system works in three phase, firstly; it identifies aspects and predicts the aspects rating, secondly; aspects along with their rating are classified/clustered and finally; based on aspect rating, product rating is calculated. Our work diminishes the effect of spam review or biased review. To the best of author’s knowledge, it is virtually first of its kind, related to product/aspect rating based on their aspect reviews.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668187
Du Zhiqin
Traditional offline sales of fashion businesses are shrinking, gradually replaced by the surging online sales due to the fast development of e-commerce in China. The success of online businesses has therefore become the key for the fashion businesses to succeed in such an industry with fierce competition. Under this situation, fashion businesses are trying all their means to improve their online sales through various marketing efforts. Many businesses do have successfully and effectively utilized WeChat, a mobile social networking tool, as a tool to market their products point to point, and many marketing strategies have been developed as a result. However, the majority of those strategies are formulated based on general marketing theories, and few are based on AISAS consumer behavior model (an acronym for Attention, Interest, Search, Action and Share). This research conducted a questionnaire randomly among young people, investigating the distribution of information WeChatters are concerned with, and the interaction of people with fashion businesses’ WeChat subscription accounts. On the basis of the investigation and the AISAS consumption model, fashion businesses are suggested to try all means to promote their WeChat subscription accounts, to well design and tailor make the information distributed to subscribers through WeChat, to interact efficiently with consumers before, during and after WeChat marketing campaigns, and to take measures to encourage consumers to share their positive shopping experiences through WeChat.
{"title":"Youth-Targeted WeChat Marketing Strategies of Fashion Businesses","authors":"Du Zhiqin","doi":"10.1109/IC3IOT.2018.8668187","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668187","url":null,"abstract":"Traditional offline sales of fashion businesses are shrinking, gradually replaced by the surging online sales due to the fast development of e-commerce in China. The success of online businesses has therefore become the key for the fashion businesses to succeed in such an industry with fierce competition. Under this situation, fashion businesses are trying all their means to improve their online sales through various marketing efforts. Many businesses do have successfully and effectively utilized WeChat, a mobile social networking tool, as a tool to market their products point to point, and many marketing strategies have been developed as a result. However, the majority of those strategies are formulated based on general marketing theories, and few are based on AISAS consumer behavior model (an acronym for Attention, Interest, Search, Action and Share). This research conducted a questionnaire randomly among young people, investigating the distribution of information WeChatters are concerned with, and the interaction of people with fashion businesses’ WeChat subscription accounts. On the basis of the investigation and the AISAS consumption model, fashion businesses are suggested to try all means to promote their WeChat subscription accounts, to well design and tailor make the information distributed to subscribers through WeChat, to interact efficiently with consumers before, during and after WeChat marketing campaigns, and to take measures to encourage consumers to share their positive shopping experiences through WeChat.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668101
Amlan Kiran Mishra
Active electronically scanned array technology, with its unique degree of operational capability which is on the verge of increasing the performance of modern radar systems. AESA technology is particularly adventurous in the fighter radars. The performance, efficiency, life cycle cost makes it special. The development of packaging technology such as GaN, MMIC, the MMIC architecture are the recent trends which makes the further advancement in this sector.
{"title":"AESA radar and its application","authors":"Amlan Kiran Mishra","doi":"10.1109/IC3IOT.2018.8668101","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668101","url":null,"abstract":"Active electronically scanned array technology, with its unique degree of operational capability which is on the verge of increasing the performance of modern radar systems. AESA technology is particularly adventurous in the fighter radars. The performance, efficiency, life cycle cost makes it special. The development of packaging technology such as GaN, MMIC, the MMIC architecture are the recent trends which makes the further advancement in this sector.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}