Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668184
R. Kodali, S. Sahu
Coal is one of the most important fuel sources and is of paramount importance to many industries, often regarded by many as Black Diamond. It is the most important indigenous energy resource available in the world. Digging up more and more coal has become a national priority for India as it tries to meet its ever-increasing demand for electricity. But for the people who do this job, it is a dangerous and potentially lethal assignment. Workers in coal mines face many environment related problems such as high temperature, humidity, release of harmful gases to name a few. These factors create a rather dangerous environment for workers to work in and thus poses a serious risk to their very lives.As a means of reducing the intensity of the problem, we have developed a model which senses these environmental parameters from different locations in the mines and sends alerts to the mines control room so that appropriate actions can be taken whenever there seems to be a dangerous situation. Here NodeMCU is used as an MQTT publisher for these parameters sensed by the different sensors. The values of these parameters from different mine locations are sent via MQTT, by being subscribed by a Raspberry Pi which acts as an MQTT broker here. When these values exceed certain threshold values, an alert by email can be sent to the mine control office so that required actions can be taken. This also generates an alarm for the workers to evacuate the place. This published data can also be stored in files for data collection and big data analytics so that more efficient systems can be developed to improve the efficiency and reduce the risk of workers potentially losing their lives.
{"title":"IoT based Safety System for Coal Mines","authors":"R. Kodali, S. Sahu","doi":"10.1109/IC3IOT.2018.8668184","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668184","url":null,"abstract":"Coal is one of the most important fuel sources and is of paramount importance to many industries, often regarded by many as Black Diamond. It is the most important indigenous energy resource available in the world. Digging up more and more coal has become a national priority for India as it tries to meet its ever-increasing demand for electricity. But for the people who do this job, it is a dangerous and potentially lethal assignment. Workers in coal mines face many environment related problems such as high temperature, humidity, release of harmful gases to name a few. These factors create a rather dangerous environment for workers to work in and thus poses a serious risk to their very lives.As a means of reducing the intensity of the problem, we have developed a model which senses these environmental parameters from different locations in the mines and sends alerts to the mines control room so that appropriate actions can be taken whenever there seems to be a dangerous situation. Here NodeMCU is used as an MQTT publisher for these parameters sensed by the different sensors. The values of these parameters from different mine locations are sent via MQTT, by being subscribed by a Raspberry Pi which acts as an MQTT broker here. When these values exceed certain threshold values, an alert by email can be sent to the mine control office so that required actions can be taken. This also generates an alarm for the workers to evacuate the place. This published data can also be stored in files for data collection and big data analytics so that more efficient systems can be developed to improve the efficiency and reduce the risk of workers potentially losing their lives.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668129
Mohit Sharma, R. Mittal, T. Choudhury, K. Vishnu
This paper renders a summary of the knowledge domain study of scientific discipline, specially the realm of the sector relating to Artificial intelligence. Additionally the paper can lucubrate on current analysis for scientific discipline computing, and brain simulation exploitation laptop run models. A human brain can be the best example of intelligence well-known, with associate degree best ability for advanced, period of time interaction with a real world. Artificial intelligence features a crucial role to play in analysis as a result of computing rivets on the mechanisms that generate intelligence and knowledge. Artificial intelligence also may like learning the neural mechanisms of knowledge as a result of this analysis can unveil vital info regarding the character of intelligence and knowledge itself.
{"title":"Classification of Brain simulation using artificial intelligence, cognitive science and neuroscience","authors":"Mohit Sharma, R. Mittal, T. Choudhury, K. Vishnu","doi":"10.1109/IC3IOT.2018.8668129","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668129","url":null,"abstract":"This paper renders a summary of the knowledge domain study of scientific discipline, specially the realm of the sector relating to Artificial intelligence. Additionally the paper can lucubrate on current analysis for scientific discipline computing, and brain simulation exploitation laptop run models. A human brain can be the best example of intelligence well-known, with associate degree best ability for advanced, period of time interaction with a real world. Artificial intelligence features a crucial role to play in analysis as a result of computing rivets on the mechanisms that generate intelligence and knowledge. Artificial intelligence also may like learning the neural mechanisms of knowledge as a result of this analysis can unveil vital info regarding the character of intelligence and knowledge itself.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124190543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668176
VM Sundharam, M.S. Sriramm, Priya Pachhaiammal
The ideology of the people has changed over the decades, with the people’s interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people’s mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.
{"title":"Predicting the Customer Behavior Through Web Page and Content Mining Techniques","authors":"VM Sundharam, M.S. Sriramm, Priya Pachhaiammal","doi":"10.1109/IC3IOT.2018.8668176","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668176","url":null,"abstract":"The ideology of the people has changed over the decades, with the people’s interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people’s mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124383984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668180
Rayasam Lakshmi Satya, R. Kaviya, R. Valarmathi
An Effective Vehicular on board accident detection system aimed at helping the injured on accident of the two-wheeler leading to a near fatal accident. The accident is detected and if fatal. the location of the accident is triangulated and emergency services are alerted either as a normal message or as an app notification. The usage of cloud technology provides further application as it can be used to identify accident hot spots by identifying it using machine learning.
{"title":"Intelligent Crash Detection and Emergency communication system for Two Wheelers","authors":"Rayasam Lakshmi Satya, R. Kaviya, R. Valarmathi","doi":"10.1109/IC3IOT.2018.8668180","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668180","url":null,"abstract":"An Effective Vehicular on board accident detection system aimed at helping the injured on accident of the two-wheeler leading to a near fatal accident. The accident is detected and if fatal. the location of the accident is triangulated and emergency services are alerted either as a normal message or as an app notification. The usage of cloud technology provides further application as it can be used to identify accident hot spots by identifying it using machine learning.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124572513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668200
Monu Verma, S. Vipparthi, Girdhari Singh
This paper presents a novel descriptor named Region based Extensive Response Index Pattern (RETRaIN) for facial expression recognition. The RETRaIN encodes the relation among the reference and neighboring pixels of facial active regions. These relations are computed by using directional compass mask on an input image and extract the high edge responses in foremost directions. Further extreme edge index positions are selected and encoded into six-bit compact code to reduce feature dimensionality and distinguish between the uniform and non-uniform patterns in the facial features. The performance of the proposed descriptor is tested and evaluated on three benchmark datasets Extended Cohn Kanade, JAFFE, and MUG. The RETRaIN achieves superior recognition accuracy in comparison to state-of-the-art techniques.
{"title":"Region Based Extensive Response Index Pattern for Facial Expression Recognition","authors":"Monu Verma, S. Vipparthi, Girdhari Singh","doi":"10.1109/IC3IOT.2018.8668200","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668200","url":null,"abstract":"This paper presents a novel descriptor named Region based Extensive Response Index Pattern (RETRaIN) for facial expression recognition. The RETRaIN encodes the relation among the reference and neighboring pixels of facial active regions. These relations are computed by using directional compass mask on an input image and extract the high edge responses in foremost directions. Further extreme edge index positions are selected and encoded into six-bit compact code to reduce feature dimensionality and distinguish between the uniform and non-uniform patterns in the facial features. The performance of the proposed descriptor is tested and evaluated on three benchmark datasets Extended Cohn Kanade, JAFFE, and MUG. The RETRaIN achieves superior recognition accuracy in comparison to state-of-the-art techniques.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"21 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131574192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668178
R. Dhianeswar, S. Sumathi, K. Joshitha
The main aim of this project is to make the life of the person (mainly elders) comfortable. They face many problems and the major one is the memory loss. Due to this problem, they are not able to remember things. So they are pulled to many drastic situations. This project is about the automatic gas cut off, when the person is not present at the environment. Now-a-days, many people are forgetting to turn off the gas stove. Due to this, many fire accidents and wastage of gas occurs. Now, this project is going to be a solution for the above problem.
{"title":"Automatic Gas Controller","authors":"R. Dhianeswar, S. Sumathi, K. Joshitha","doi":"10.1109/IC3IOT.2018.8668178","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668178","url":null,"abstract":"The main aim of this project is to make the life of the person (mainly elders) comfortable. They face many problems and the major one is the memory loss. Due to this problem, they are not able to remember things. So they are pulled to many drastic situations. This project is about the automatic gas cut off, when the person is not present at the environment. Now-a-days, many people are forgetting to turn off the gas stove. Due to this, many fire accidents and wastage of gas occurs. Now, this project is going to be a solution for the above problem.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668191
Ankur Lohachab, Karambir
Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).
{"title":"Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks","authors":"Ankur Lohachab, Karambir","doi":"10.1109/IC3IOT.2018.8668191","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668191","url":null,"abstract":"Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ic3iot.2018.8668199
N. Rao, G. Ram
In many communication applications like radar and point to point micro wave links, narrow beamwidth and low side lobe level beams are required. Trying to generate narrow beams using conventional antenna synthesis methods results in higher side lobe levels and trying to generate low side lobe beams results in broader beams. Dolph chebychev linear array method is a compromise between SLL and FNBW. In this method, for a given SLL, the narrowest beam width is obtained and for a given beamwidth the smallest SLL is obtained. But the smallest SLL for the narrowest beamwidth is not obtained. In this paper an effort is made to get the narrowest main beamwidth without significantly increasing SLL and the smallest SLL is obtained without significantly broadening the beamwidth using random stochastic methods like Particle swarm optimization (PSO) and Genetic algorithm (GA). Results obtained with PSO and results obtained with GA are compared.
{"title":"Optimization of SLL and FNBW in Linear Arrays Using PSO","authors":"N. Rao, G. Ram","doi":"10.1109/ic3iot.2018.8668199","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668199","url":null,"abstract":"In many communication applications like radar and point to point micro wave links, narrow beamwidth and low side lobe level beams are required. Trying to generate narrow beams using conventional antenna synthesis methods results in higher side lobe levels and trying to generate low side lobe beams results in broader beams. Dolph chebychev linear array method is a compromise between SLL and FNBW. In this method, for a given SLL, the narrowest beam width is obtained and for a given beamwidth the smallest SLL is obtained. But the smallest SLL for the narrowest beamwidth is not obtained. In this paper an effort is made to get the narrowest main beamwidth without significantly increasing SLL and the smallest SLL is obtained without significantly broadening the beamwidth using random stochastic methods like Particle swarm optimization (PSO) and Genetic algorithm (GA). Results obtained with PSO and results obtained with GA are compared.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668149
Sajal Jain, T. Choudhury, Vivek Kumar, Praveen Kumar
Framework trustworthiness is a cardinal segment of info security. It guarantees that info frameworks work inside some attractive points of confinement. Web security dangers, for example, malicious piece of code what’s more, exceptionally malevolent projects are on the ascent, bringing about the need for broad research endeavours to create components that can counter different dangers. Malicious piece of code Sandbox investigation is a successful system having gotten recommendations as a potential arrangement. When utilizing Malicious piece of code Sandbox examination, tests of malicious piece of code are accomplished to decide their practices. The consequences of this activity are then recorded for ensuing examination. This paper initially will clarify the idea of malicious piece of code, at that point talk about the accessible techniques to distinguish and control different malicious piece of code exercises.Finally, it will investigate the general Sandbox course of action, with a vital importance on a novel directed malevolent bit of code area technique using Sandbox-evasion rehearses as a street to distinguishing, assuaging or altogether avoiding the malignant bit of code.
{"title":"Detecting Malware & Analysing Using Sandbox Evasion","authors":"Sajal Jain, T. Choudhury, Vivek Kumar, Praveen Kumar","doi":"10.1109/IC3IOT.2018.8668149","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668149","url":null,"abstract":"Framework trustworthiness is a cardinal segment of info security. It guarantees that info frameworks work inside some attractive points of confinement. Web security dangers, for example, malicious piece of code what’s more, exceptionally malevolent projects are on the ascent, bringing about the need for broad research endeavours to create components that can counter different dangers. Malicious piece of code Sandbox investigation is a successful system having gotten recommendations as a potential arrangement. When utilizing Malicious piece of code Sandbox examination, tests of malicious piece of code are accomplished to decide their practices. The consequences of this activity are then recorded for ensuing examination. This paper initially will clarify the idea of malicious piece of code, at that point talk about the accessible techniques to distinguish and control different malicious piece of code exercises.Finally, it will investigate the general Sandbox course of action, with a vital importance on a novel directed malevolent bit of code area technique using Sandbox-evasion rehearses as a street to distinguishing, assuaging or altogether avoiding the malignant bit of code.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668111
M. Akshaiya, M. Akshaya, G. Lakshmi, S. Sumathi
Dengue is the most important disastrous disease by which many number of people are affected. The incidence of dengue is associated particularly with the spread of the vector Aedes Aegypti and some of the environmental variables such as the trade, travel, climate change, inadequate water supplies, warming temperature etc. Therefore a mobile app that gives the reliable real time information stating when and where to expect the outbreak of dengue is essential which would use the GPS receiver embedded in the mobile phone and this also gives the dengue risk index in and around the exact location or at the remote location and the spread of the disease in the near future can also be estimated.
{"title":"A GPS Based Dengue Risk Index to Predict the Susceptibility of an Individual","authors":"M. Akshaiya, M. Akshaya, G. Lakshmi, S. Sumathi","doi":"10.1109/IC3IOT.2018.8668111","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668111","url":null,"abstract":"Dengue is the most important disastrous disease by which many number of people are affected. The incidence of dengue is associated particularly with the spread of the vector Aedes Aegypti and some of the environmental variables such as the trade, travel, climate change, inadequate water supplies, warming temperature etc. Therefore a mobile app that gives the reliable real time information stating when and where to expect the outbreak of dengue is essential which would use the GPS receiver embedded in the mobile phone and this also gives the dengue risk index in and around the exact location or at the remote location and the spread of the disease in the near future can also be estimated.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124447274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}