Pub Date : 2018-02-01DOI: 10.1109/ic3iot.2018.8668143
A. Mahapatra, Muddasir Ahamad Faruquee, Pranaw Kumar
This paper presents a method to restore a degraded image with a known cause. Original image has been degraded by introducing a motion blur. Moreover, prior to this a Gaussian noise has also been added to the original image. Wavelet based algorithm, Lucy Richardson has been implemented to obtain the restored images. However an iteration of hundred times has been made with two different PSF. Obtained image has been found to be excellent. However presence of some noise in the restored image cannot be declined.
{"title":"Restoration of motion blurred image using Lucy Richardson Algorithm","authors":"A. Mahapatra, Muddasir Ahamad Faruquee, Pranaw Kumar","doi":"10.1109/ic3iot.2018.8668143","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668143","url":null,"abstract":"This paper presents a method to restore a degraded image with a known cause. Original image has been degraded by introducing a motion blur. Moreover, prior to this a Gaussian noise has also been added to the original image. Wavelet based algorithm, Lucy Richardson has been implemented to obtain the restored images. However an iteration of hundred times has been made with two different PSF. Obtained image has been found to be excellent. However presence of some noise in the restored image cannot be declined.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668195
V. Theivapriya, S. Jagatheeshwari, D. Aishwarya, G. Sudha
quadriplegia is paralysis where the person is unable to move all his limbs. The primary cause of quadriplegia is a spinal cord injury, but other conditions such as cerebral palsy and strokes can cause a similar paralysis. The amount of impairment resulting from a spinal cord injury depends on the part of the spinal cord injured and the amount of damage done. Injury to the spinal cord can be devastating because the spinal cord and the brain are the main parts of the central nervous system, which sends messages throughout your body. This paper proposes algorithm to detect the eye movement, known as Coherence algorithm. The proposed paper uses eye to control the wheel chair. The Coherence algorithm detects whether it is the movement of eye towards left or right. The eye blinking feature is also used by the algorithm to control the starting and stopping of wheelchair, then a heart beat sensor is used to detect the heart beat values, Whenever the heart beat values crosses a threshold value, then a buzzer is activated and a call is made to the concerned person using GSM.
{"title":"Smart Wheel Chair for Quadriplegics","authors":"V. Theivapriya, S. Jagatheeshwari, D. Aishwarya, G. Sudha","doi":"10.1109/IC3IOT.2018.8668195","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668195","url":null,"abstract":"quadriplegia is paralysis where the person is unable to move all his limbs. The primary cause of quadriplegia is a spinal cord injury, but other conditions such as cerebral palsy and strokes can cause a similar paralysis. The amount of impairment resulting from a spinal cord injury depends on the part of the spinal cord injured and the amount of damage done. Injury to the spinal cord can be devastating because the spinal cord and the brain are the main parts of the central nervous system, which sends messages throughout your body. This paper proposes algorithm to detect the eye movement, known as Coherence algorithm. The proposed paper uses eye to control the wheel chair. The Coherence algorithm detects whether it is the movement of eye towards left or right. The eye blinking feature is also used by the algorithm to control the starting and stopping of wheelchair, then a heart beat sensor is used to detect the heart beat values, Whenever the heart beat values crosses a threshold value, then a buzzer is activated and a call is made to the concerned person using GSM.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668131
P. Sadhukhan, Firoj Gazi
Traffic congestion is one of the major issues with the public transportation system in recent time. The traffic congestion has a negative impact on the productivity, competitiveness and economic growth of a country. Hence traffic congestion control has become an important area of research and significant number of solutions to this problem came out of various research efforts in the said field over the past few decades. Among these, vehicle-to-vehicle (V2V) communication based approaches cannot accurately estimate the density of traffic congestion. On the other hand, the traffic signaling systems having predetermined fixed operation time cannot manage the traffic volume changing over time and thus, long traffic queues are generated at the road crossings. To address the above mentioned issue, this paper proposes an internet-of-things (IoT) based intelligent traffic congestion control system that dynamically sets the signal operation time based on the measured values of traffic congestion density. Moreover, a novel technique of measuring the density of traffic congestion created at the road crossings is also presented in this paper.
{"title":"An IoT based Intelligent Traffic Congestion Control System for Road Crossings","authors":"P. Sadhukhan, Firoj Gazi","doi":"10.1109/IC3IOT.2018.8668131","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668131","url":null,"abstract":"Traffic congestion is one of the major issues with the public transportation system in recent time. The traffic congestion has a negative impact on the productivity, competitiveness and economic growth of a country. Hence traffic congestion control has become an important area of research and significant number of solutions to this problem came out of various research efforts in the said field over the past few decades. Among these, vehicle-to-vehicle (V2V) communication based approaches cannot accurately estimate the density of traffic congestion. On the other hand, the traffic signaling systems having predetermined fixed operation time cannot manage the traffic volume changing over time and thus, long traffic queues are generated at the road crossings. To address the above mentioned issue, this paper proposes an internet-of-things (IoT) based intelligent traffic congestion control system that dynamically sets the signal operation time based on the measured values of traffic congestion density. Moreover, a novel technique of measuring the density of traffic congestion created at the road crossings is also presented in this paper.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668144
J. Roopa, S. Veluchamy
Biometric system is useful for a pattern recognition system which makes a personal identification. Unimodal biometrics uses single evidence for identity e.g., gait, signature etc. There are some disadvantages faced by unimodal biometrics (such as accuracy, performance improvement etc.). So multimodal biometrics is proposed to overcome the disadvantages of unimodal biometrics. Multimodal biometrics uses multiple evidences e.g., palm print, knuckle print etc. This project proposes a multimodal biometric identification system based on inner knuckle print and palm print features of the human hand. The hand image is captured using digital camera. It is then pre-processed to get Region of Interest (ROI) of palm and knuckle. Palm print features are extracted from palm region using Histogram of Oriented Gradients (HOG) algorithm. The HOG algorithm is used because it exhibits the local object appearance and shape within an image. Also it can be used in the case of mehandi designs in the hand. Similarly the features from knuckle will be extracted using RIDGELET transform. It gives the efficient features in the ridges. Different features are extracted from palm print and inner knuckle print and these features are combined by using efficient fusion scheme i.e.) Discriminant Correlation Analysis (DCA) algorithm. And the final decision is taken by efficient classification module.
{"title":"Person Validation System Using Hand Based Biometric Modalities","authors":"J. Roopa, S. Veluchamy","doi":"10.1109/IC3IOT.2018.8668144","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668144","url":null,"abstract":"Biometric system is useful for a pattern recognition system which makes a personal identification. Unimodal biometrics uses single evidence for identity e.g., gait, signature etc. There are some disadvantages faced by unimodal biometrics (such as accuracy, performance improvement etc.). So multimodal biometrics is proposed to overcome the disadvantages of unimodal biometrics. Multimodal biometrics uses multiple evidences e.g., palm print, knuckle print etc. This project proposes a multimodal biometric identification system based on inner knuckle print and palm print features of the human hand. The hand image is captured using digital camera. It is then pre-processed to get Region of Interest (ROI) of palm and knuckle. Palm print features are extracted from palm region using Histogram of Oriented Gradients (HOG) algorithm. The HOG algorithm is used because it exhibits the local object appearance and shape within an image. Also it can be used in the case of mehandi designs in the hand. Similarly the features from knuckle will be extracted using RIDGELET transform. It gives the efficient features in the ridges. Different features are extracted from palm print and inner knuckle print and these features are combined by using efficient fusion scheme i.e.) Discriminant Correlation Analysis (DCA) algorithm. And the final decision is taken by efficient classification module.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668155
R. Kodali, Subbachary Yerroju
India is the 4th largest consumer of energy, so it has to strive relentlessly for alternative methods to achieve effective reduction in consumption of energy. Because of inadequate energy infrastructure and extensive energy usage, intelligent energy management systems need to be incorporated in order to use energy more efficiently and to make an effective safe environment not only in industries but also in other ways of our day to day lives. Smart home automation can manage and monitor household energy efficiently and it also ensures safety. In this paper, an intelligent home automation technique is implemented using Internet of Things which will overcome the existing energy usage problems to a great extent. IoT makes use of a combination of intelligent software applications along with electronic devices to build an effective data exchange network. To implement this, a low cost and low power consuming embedded Wi-Fi module ESP8266 is used to operate a relay channel, which acts as a switch to control household appliances. Here Thinger.io provides cloud infrastructure through which mobile and ESP8266 to communicate with each other via REST API.
{"title":"Energy Efficient Home Automation Using IoT","authors":"R. Kodali, Subbachary Yerroju","doi":"10.1109/IC3IOT.2018.8668155","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668155","url":null,"abstract":"India is the 4th largest consumer of energy, so it has to strive relentlessly for alternative methods to achieve effective reduction in consumption of energy. Because of inadequate energy infrastructure and extensive energy usage, intelligent energy management systems need to be incorporated in order to use energy more efficiently and to make an effective safe environment not only in industries but also in other ways of our day to day lives. Smart home automation can manage and monitor household energy efficiently and it also ensures safety. In this paper, an intelligent home automation technique is implemented using Internet of Things which will overcome the existing energy usage problems to a great extent. IoT makes use of a combination of intelligent software applications along with electronic devices to build an effective data exchange network. To implement this, a low cost and low power consuming embedded Wi-Fi module ESP8266 is used to operate a relay channel, which acts as a switch to control household appliances. Here Thinger.io provides cloud infrastructure through which mobile and ESP8266 to communicate with each other via REST API.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668127
B. S. Abhigna, Sudeshna Chakraborty, Vivek Kumar
In this paper we explain the delineation and enactment of an E-Conceptual Automation based Academic System christened Medha. E-concept is a slight deviation from E-learning. While E-learning emphasizes on the provision of a complete learning management system in the usually fixed standards, E-concept chooses to do the same in a non-standardized manner. This property of building its structure on the fly makes it more flexible and at the same time gives the arena of user-friendly environment an absolute next level experience. Medha is an insightful combination of both E-concept and semantic web. The ability to access the web in a semantic analysis approach ensures more accurate and relevant search results as compared to the usually opted syntactic approach. This system avails almost everything a student would require to excel in academics. Not only does this system provide encouragement through the motivational blog section but also enables the users to share their viewpoint at the Users-corner. So the aim is to provide everything on a single platform which would save both – time and energy of the students while they are on the quest to acquire supreme quality knowledge.
{"title":"Medha : A Collaborative E-Concept Framework","authors":"B. S. Abhigna, Sudeshna Chakraborty, Vivek Kumar","doi":"10.1109/IC3IOT.2018.8668127","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668127","url":null,"abstract":"In this paper we explain the delineation and enactment of an E-Conceptual Automation based Academic System christened Medha. E-concept is a slight deviation from E-learning. While E-learning emphasizes on the provision of a complete learning management system in the usually fixed standards, E-concept chooses to do the same in a non-standardized manner. This property of building its structure on the fly makes it more flexible and at the same time gives the arena of user-friendly environment an absolute next level experience. Medha is an insightful combination of both E-concept and semantic web. The ability to access the web in a semantic analysis approach ensures more accurate and relevant search results as compared to the usually opted syntactic approach. This system avails almost everything a student would require to excel in academics. Not only does this system provide encouragement through the motivational blog section but also enables the users to share their viewpoint at the Users-corner. So the aim is to provide everything on a single platform which would save both – time and energy of the students while they are on the quest to acquire supreme quality knowledge.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668107
A. Premchand, Anurag Choudhry
Open Banking and Open APIs have gained momentum and have grown from purely technical capabilities to being of business relevance. Open Banking is an innovative model for the financial industry not only from competition perspective but also from customer engagement perspective. Banks will have to help their customers with superior and more agile offerings. Banks should enable their customers to manage their financial affairs, make better decisions, save money etc. Digital disruption, FinTechs and Regulatory compliance such as Revised Payment Services Directive (PSD2) have accelerated the competition and forced banks to open up their systems. Using API, banks can transform their core systems for innovations and can integrate with internal system and external partners in a simpler, secure and controlled way.This paper takes a look at why open API is the foundation of open banking, values creating using open APIs, open banking framework / building blocks, and challenges faced by banks in implementing the open banking. It also highlights the various initiatives taken for API standardization.
{"title":"Open Banking & APIs for Transformation in Banking","authors":"A. Premchand, Anurag Choudhry","doi":"10.1109/IC3IOT.2018.8668107","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668107","url":null,"abstract":"Open Banking and Open APIs have gained momentum and have grown from purely technical capabilities to being of business relevance. Open Banking is an innovative model for the financial industry not only from competition perspective but also from customer engagement perspective. Banks will have to help their customers with superior and more agile offerings. Banks should enable their customers to manage their financial affairs, make better decisions, save money etc. Digital disruption, FinTechs and Regulatory compliance such as Revised Payment Services Directive (PSD2) have accelerated the competition and forced banks to open up their systems. Using API, banks can transform their core systems for innovations and can integrate with internal system and external partners in a simpler, secure and controlled way.This paper takes a look at why open API is the foundation of open banking, values creating using open APIs, open banking framework / building blocks, and challenges faced by banks in implementing the open banking. It also highlights the various initiatives taken for API standardization.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668137
R. Kodali, Sindhuja Yadavilli
This paper proposes a smart surveillance system based on Mongoose RTOS which can be remotely monitored by the owner. When a trespass is detected, an alert is send to the owner’s phone and it can also be observed on the application log of Losant Platform. This paper proposed a system for monitoring the motion of a person using PIR motion sensor and ESP8266 NodeMCU WiFi micro-controller. The eminent feature of the system is that it uses Mongoose RTOS which is reliable to run in production environment and the owner can receive alerts even if his mobile phone is not connected to the Internet. The sytem is inexpensive as it uses low cost Wi-Fi enabled micro-controller ESP8266 NodeMCU and PIR sensor which is very cheap compared to other devices for motion detection.
{"title":"Mongoose RTOS based IoT Implementation of Surveillance System","authors":"R. Kodali, Sindhuja Yadavilli","doi":"10.1109/IC3IOT.2018.8668137","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668137","url":null,"abstract":"This paper proposes a smart surveillance system based on Mongoose RTOS which can be remotely monitored by the owner. When a trespass is detected, an alert is send to the owner’s phone and it can also be observed on the application log of Losant Platform. This paper proposed a system for monitoring the motion of a person using PIR motion sensor and ESP8266 NodeMCU WiFi micro-controller. The eminent feature of the system is that it uses Mongoose RTOS which is reliable to run in production environment and the owner can receive alerts even if his mobile phone is not connected to the Internet. The sytem is inexpensive as it uses low cost Wi-Fi enabled micro-controller ESP8266 NodeMCU and PIR sensor which is very cheap compared to other devices for motion detection.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668173
A. Premchand, Anurag Choudhry
As technocrats and technical architects, each day we are challenged by the maze of complex monolithic applications that have become characteristic of large organizations, especially financial institutions. In this paper, we focus on rehabilitation of such monstrous architectural spaces using the lever of microservices. In our recent experience, there is a lot of interest in the field of microservices especially elicited due to the complexity of architecture and near impossibility of managing them as-is rationally. It is our effort to focus on what microservices are and how they can be used to great advantage for architecture simplification exercises especially at large institutions.
{"title":"Architecture Simplification at Large Institutions using Micro Services","authors":"A. Premchand, Anurag Choudhry","doi":"10.1109/IC3IOT.2018.8668173","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668173","url":null,"abstract":"As technocrats and technical architects, each day we are challenged by the maze of complex monolithic applications that have become characteristic of large organizations, especially financial institutions. In this paper, we focus on rehabilitation of such monstrous architectural spaces using the lever of microservices. In our recent experience, there is a lot of interest in the field of microservices especially elicited due to the complexity of architecture and near impossibility of managing them as-is rationally. It is our effort to focus on what microservices are and how they can be used to great advantage for architecture simplification exercises especially at large institutions.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668118
S. Aparna Devi, P. Hemamalini, S. Veena, Swagata B. Sarkar
Millions of tons of food are processed and packaged by individuals and machines. As such, the possibility exists that food manufacturers and the suppliers will not catch every object that does not belong in the product. When a person consumes a food that has a foreign object in it, he or she may suffer a physical or emotional injury. This paper describes a working prototype that non-destructively identifies the presence of foreign object in food products. The infrared sensor module consists of a source and detector which will detect the presence of foreign object and thereby sends the signal to the PIC16F877A microcontroller which thereby indicates the defective edible and non-defective and edible food products using LED indications.
{"title":"Non-Destructive Method of Foreign Object Detection in Food Products","authors":"S. Aparna Devi, P. Hemamalini, S. Veena, Swagata B. Sarkar","doi":"10.1109/IC3IOT.2018.8668118","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668118","url":null,"abstract":"Millions of tons of food are processed and packaged by individuals and machines. As such, the possibility exists that food manufacturers and the suppliers will not catch every object that does not belong in the product. When a person consumes a food that has a foreign object in it, he or she may suffer a physical or emotional injury. This paper describes a working prototype that non-destructively identifies the presence of foreign object in food products. The infrared sensor module consists of a source and detector which will detect the presence of foreign object and thereby sends the signal to the PIC16F877A microcontroller which thereby indicates the defective edible and non-defective and edible food products using LED indications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}