首页 > 最新文献

2020 Global Conference on Wireless and Optical Technologies (GCWOT)最新文献

英文 中文
IoT Based Technique for Household Rainwater Harvesting 基于物联网的家庭雨水收集技术
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391634
Gaurav Verma, Shubhangi Gupta, Rohan Gupta
In this paper, a more efficient way of rainwater harvesting is proposed. Due to vast globalization, urbanization and modernization the quality of our surroundings is degraded, which in turn, affects the natural phenomenon of rains too. The burning of fossil fuels at a vast level, the fumes from the exhaust of automobiles and oil refineries lead to the formation of toxic gases like sulphur dioxide, carbon monoxide, nitrogen dioxide etc. These gases get transported by air and wind currents. Sulphur dioxide and nitrogen dioxide mixes with water and other material to form sulphuric acid and nitric acid and cause acid rain. The problem in harvesting rainwater arises here as this water is not suitable for use and storing it in the same reservoir in which the water of slightly better quality get stored, can lead to degradation of that water too. Using technological enhancements this problem can be dealt with. As we know the filtration processes is quite expensive, so if we can check the quality of water before storing it into reservoir or sending it to ground water table. It would be easier to decide for what purpose we can use the harvested water and also we can save the groundwater from getting polluted by the acid rainwater.
本文提出了一种更有效的雨水收集方法。由于大规模的全球化、城市化和现代化,我们周围环境的质量正在退化,这反过来也影响了降雨的自然现象。化石燃料的大量燃烧,汽车和炼油厂排出的废气导致二氧化硫、一氧化碳、二氧化氮等有毒气体的形成。这些气体通过空气和气流传播。二氧化硫和二氧化氮与水和其他物质混合,形成硫酸和硝酸,引起酸雨。收集雨水的问题出现在这里,因为这些水不适合使用,并且将其储存在储存质量稍好的水的同一个水库中,也会导致水的退化。使用技术改进可以解决这个问题。正如我们所知,过滤过程是相当昂贵的,所以如果我们能在将水储存到水库或送到地下水位之前检查水的质量。这将更容易决定我们可以使用收获的水的目的,我们也可以保存地下水从被酸性雨水污染。
{"title":"IoT Based Technique for Household Rainwater Harvesting","authors":"Gaurav Verma, Shubhangi Gupta, Rohan Gupta","doi":"10.1109/GCWOT49901.2020.9391634","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391634","url":null,"abstract":"In this paper, a more efficient way of rainwater harvesting is proposed. Due to vast globalization, urbanization and modernization the quality of our surroundings is degraded, which in turn, affects the natural phenomenon of rains too. The burning of fossil fuels at a vast level, the fumes from the exhaust of automobiles and oil refineries lead to the formation of toxic gases like sulphur dioxide, carbon monoxide, nitrogen dioxide etc. These gases get transported by air and wind currents. Sulphur dioxide and nitrogen dioxide mixes with water and other material to form sulphuric acid and nitric acid and cause acid rain. The problem in harvesting rainwater arises here as this water is not suitable for use and storing it in the same reservoir in which the water of slightly better quality get stored, can lead to degradation of that water too. Using technological enhancements this problem can be dealt with. As we know the filtration processes is quite expensive, so if we can check the quality of water before storing it into reservoir or sending it to ground water table. It would be easier to decide for what purpose we can use the harvested water and also we can save the groundwater from getting polluted by the acid rainwater.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Statistical and Similarity Features Based Recognition of Offline Characters 基于统计和相似特征的离线字符识别
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391614
Deval Verma, Gaurav Verma, C. Tan, Wisetsri, Yannakorn Toprayoon, Thanyanant Chansongpol
This paper uses a blend of similarity and statistical based features for the recognition of offline alphabetic characters in noisy and noiseless environment. The complete representation of the characters is based on the combination of these two different families of features and recognition by different classifiers. The main strategy is to extract complementary similarity measure (CSM) as a feature vector and combined with grey level co-occurrence matrix (GLCM) features. A standard dataset is taken into consideration and recognition is done by artificial neural network (ANN), support vector machine (SVM), Naïve Bayes (NB) classifier and random forest (RF) classifier. The highest average recognition accuracy of all characters is recorded as 94.05% using RF in noiseless environment. In noisy environment, the highest accuracy is recorded as 75.8% by neural network. The analysis proves that the combination of feature works on various types of printed characters in noisy and noiseless environment irrespective of the font of characters.
本文采用相似度特征和统计特征相结合的方法对有噪声和无噪声环境下的离线字母字符进行识别。字符的完整表示是基于这两种不同的特征族的结合和不同分类器的识别。主要策略是提取互补相似测度(CSM)作为特征向量,并结合灰度共生矩阵(GLCM)特征。以标准数据集为对象,采用人工神经网络(ANN)、支持向量机(SVM)、Naïve贝叶斯(NB)分类器和随机森林(RF)分类器进行识别。在无噪声环境下,使用射频对所有字符的最高平均识别准确率为94.05%。在噪声环境下,神经网络的准确率最高,达到75.8%。分析表明,无论何种字体,在有噪声和无噪声环境下,特征组合对各种类型的印刷字符都有效。
{"title":"Statistical and Similarity Features Based Recognition of Offline Characters","authors":"Deval Verma, Gaurav Verma, C. Tan, Wisetsri, Yannakorn Toprayoon, Thanyanant Chansongpol","doi":"10.1109/GCWOT49901.2020.9391614","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391614","url":null,"abstract":"This paper uses a blend of similarity and statistical based features for the recognition of offline alphabetic characters in noisy and noiseless environment. The complete representation of the characters is based on the combination of these two different families of features and recognition by different classifiers. The main strategy is to extract complementary similarity measure (CSM) as a feature vector and combined with grey level co-occurrence matrix (GLCM) features. A standard dataset is taken into consideration and recognition is done by artificial neural network (ANN), support vector machine (SVM), Naïve Bayes (NB) classifier and random forest (RF) classifier. The highest average recognition accuracy of all characters is recorded as 94.05% using RF in noiseless environment. In noisy environment, the highest accuracy is recorded as 75.8% by neural network. The analysis proves that the combination of feature works on various types of printed characters in noisy and noiseless environment irrespective of the font of characters.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125822358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing of three regions de-blocking filters in BDCT coded images at low bit rate 低比特率BDCT编码图像中三个区域去块滤波器的设计
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391623
Anudeep Gandam, J. S. Sidhu
Compression of images and video frames at a low bit rate significantly degrades the visual quality decoded with JPEG and MPEG standards. This paper focuses on an efficient pre and post-processing technique to address and rectify the blocking artifact. This method differentiates the blocked images or frames into different regions based upon the activity function. It efficiently removes the artifacts while preserving the edge details with the help of different adaptive filters. The proposed technique is implemented on various images and videos and results are compared with multiple existing methods using performance metrics like SSIM and GBIM. The simulation results show significant improvement in subjective quality for different images and video frames. It outperforms existing de-blocking methods
以低比特率压缩图像和视频帧会显著降低用JPEG和MPEG标准解码的视觉质量。本文重点研究了一种有效的预处理和后处理技术,以解决和纠正阻塞伪影。该方法基于活动函数将被遮挡的图像或帧划分为不同的区域。它有效地去除伪影,同时保留边缘细节与不同的自适应滤波器的帮助。所提出的技术在各种图像和视频上实现,并使用诸如SSIM和GBIM等性能指标与多种现有方法进行结果比较。仿真结果表明,对不同图像和视频帧的主观质量有显著提高。它优于现有的去阻塞方法
{"title":"Designing of three regions de-blocking filters in BDCT coded images at low bit rate","authors":"Anudeep Gandam, J. S. Sidhu","doi":"10.1109/GCWOT49901.2020.9391623","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391623","url":null,"abstract":"Compression of images and video frames at a low bit rate significantly degrades the visual quality decoded with JPEG and MPEG standards. This paper focuses on an efficient pre and post-processing technique to address and rectify the blocking artifact. This method differentiates the blocked images or frames into different regions based upon the activity function. It efficiently removes the artifacts while preserving the edge details with the help of different adaptive filters. The proposed technique is implemented on various images and videos and results are compared with multiple existing methods using performance metrics like SSIM and GBIM. The simulation results show significant improvement in subjective quality for different images and video frames. It outperforms existing de-blocking methods","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"26 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Encryption Scheme Based On Adaptive System 基于自适应系统的数据加密方案
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391622
Shaheryar Najam, Mujeeb ur Rehman, Jameel Ahmed
World has evolved into digital hub, lots of digital data such as images, videos, text and audio signal are transmitted over the internet. Due to increase in this multimedia communication, there has been a rapid increase in requirement of encryption of these data. Various encryption scheme has been proposed to make these multimedia communications more and more secure. In this paper, a new approach of adaptive system has been presented. Adaptive system previously used for prediction, noise removal and system identification has been deployed to encrypt data and results have shown, adaptive system can be used to encrypt signal with high rate of randomness in encrypted signal. Furthermore, randomness can be enhanced by changing the desire signal.
世界已经发展成为数字中心,大量的数字数据,如图像、视频、文本和音频信号通过互联网传输。随着多媒体通信的增加,对这些数据的加密要求也在迅速增加。为了提高多媒体通信的安全性,提出了各种加密方案。本文提出了一种新的自适应系统方法。以往用于预测、去噪和系统识别的自适应系统已被用于加密数据,结果表明,自适应系统可以用于加密信号中随机性高的信号。此外,随机性可以通过改变欲望信号来增强。
{"title":"Data Encryption Scheme Based On Adaptive System","authors":"Shaheryar Najam, Mujeeb ur Rehman, Jameel Ahmed","doi":"10.1109/GCWOT49901.2020.9391622","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391622","url":null,"abstract":"World has evolved into digital hub, lots of digital data such as images, videos, text and audio signal are transmitted over the internet. Due to increase in this multimedia communication, there has been a rapid increase in requirement of encryption of these data. Various encryption scheme has been proposed to make these multimedia communications more and more secure. In this paper, a new approach of adaptive system has been presented. Adaptive system previously used for prediction, noise removal and system identification has been deployed to encrypt data and results have shown, adaptive system can be used to encrypt signal with high rate of randomness in encrypted signal. Furthermore, randomness can be enhanced by changing the desire signal.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Collection and Analysis of Manufacturing Test Sites Data for Electronic Products 电子产品制造试验场数据的收集与分析方法
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391597
Atif Siddiqui, P. Otero, Muhammad Yousuf Irfan Zia, J. Poncela
Manufacturing industry plays an important role in the development of a country by providing employment to its skilled and semi-skilled workforce. Companies focus on maintaining a good standard of their products which can be achieved through manufacturing test. In order to compete with similar companies, the manufacturing companies need to have an optimized electronic product testing system. Products are tested for manufacturing faults and functionality to maintain quality control which is a continuous process. It can be achieved through a process where manufacturing test data is collected and analyzed. In this paper a LabVIEW based application is presented for collection and analysis of manufacturing test site data. The data collected is for low and mid volume batch-size for a month, where a weekly analysis is normally done. The application provides a standard approach based on graphical analysis to review data trends and provide recommendations to the manufacturing organizations for cost reduction, increased first time yield, training requirements for the operators etc. Initial results obtained using the application show that the proposed approach is efficient and reliable for test site data collection and analysis of variety of products.
制造业通过为熟练和半熟练劳动力提供就业机会,在一个国家的发展中发挥着重要作用。公司专注于保持良好的产品标准,可以通过制造测试来实现。为了与同类公司竞争,制造企业需要有一个优化的电子产品测试系统。对产品的制造缺陷和功能进行测试,以保持质量控制,这是一个连续的过程。它可以通过收集和分析制造测试数据的过程来实现。本文介绍了一个基于LabVIEW的制造试验场数据采集与分析的应用程序。收集的数据是针对一个月的低批量和中等批量,通常每周进行一次分析。该应用程序提供了一种基于图形分析的标准方法来审查数据趋势,并为制造组织提供降低成本、提高首次成品率、提高操作人员培训要求等方面的建议。应用的初步结果表明,该方法对各种产品的现场数据采集和分析是有效可靠的。
{"title":"An Approach for Collection and Analysis of Manufacturing Test Sites Data for Electronic Products","authors":"Atif Siddiqui, P. Otero, Muhammad Yousuf Irfan Zia, J. Poncela","doi":"10.1109/GCWOT49901.2020.9391597","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391597","url":null,"abstract":"Manufacturing industry plays an important role in the development of a country by providing employment to its skilled and semi-skilled workforce. Companies focus on maintaining a good standard of their products which can be achieved through manufacturing test. In order to compete with similar companies, the manufacturing companies need to have an optimized electronic product testing system. Products are tested for manufacturing faults and functionality to maintain quality control which is a continuous process. It can be achieved through a process where manufacturing test data is collected and analyzed. In this paper a LabVIEW based application is presented for collection and analysis of manufacturing test site data. The data collected is for low and mid volume batch-size for a month, where a weekly analysis is normally done. The application provides a standard approach based on graphical analysis to review data trends and provide recommendations to the manufacturing organizations for cost reduction, increased first time yield, training requirements for the operators etc. Initial results obtained using the application show that the proposed approach is efficient and reliable for test site data collection and analysis of variety of products.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Key Management and Lightweight Cryptography for IoT 物联网密钥管理和轻量级加密技术综述
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391613
Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan
Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.
物联网(IoT)是一种允许完全不同的设备通过互联网连接以进行数据交换的技术。这些设备的例子可以是孩子使用的玩具,汽车里的音响系统或厨房用具。甚至在上个世纪末,它还不是一个明确的概念,但在过去的二十年里,它已经成为我们生活中不可或缺的一部分。其核心原因是消费者的超节奏适应能力。在不同的物联网设备之间共享大量数据的不幸方面是,黑客和不道德的用户对这些数据感兴趣,这些设备成为这些人利用漏洞获取数据的目标。此外,如果这些数据落入黑客或不道德的用户手中,它可以很容易地危及作为该数据所有者的整个组织。在本文中,我们初步研究了IoT(物联网)的安全需求,这些安全需求根据TCP/IP模型的层进行了分类。在对安全需求进行深入分析和批判性评估之后,我们将着眼于系统和物联网的关键管理视角。最后,我们讨论轻量级加密,这是特别用于物联网。我们通过轻量级加密技术对物联网中使用的所有可能算法进行了深入分析。在我们的研究工作中,还对各种轻量级算法的优缺点进行了全面的比较。物联网配置中的主要安全问题也是身份验证和机密性。因此,我们得出结论,对于客户端到客户端通信应该使用密钥加密,在物联网配置中客户端需要与服务器通信的地方,可以使用基于轻量级算法的椭圆曲线加密进行身份验证,并遵循密钥机制进行保密。
{"title":"A Review on Key Management and Lightweight Cryptography for IoT","authors":"Mohammad Ayub Latif, M. Ahmad, Muhammad Khalid Khan","doi":"10.1109/GCWOT49901.2020.9391613","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391613","url":null,"abstract":"Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Smart Projector with Wireless Mouse 带无线鼠标的智能投影仪
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391606
Dur-e-Jabeen, A. Haseeb, Aashir Ali, Hamza Saleem
This work is based on image processing using Raspberry pi 3 through Python programming that is interfaced with OpenCV tool and the processed image captured by camera. Haar cascade algorithm is available in OpenCV. It is used to process the image with Haar classifier that creates black spot on presenter face by considering distance and position to safe eyes by picking the coordinates as breadth, width, length and height. This black spot prevents the eyes from high intensity light beam of projector. The size of the black spots varies and continuously generated as presenter moves in front of projector. This does not affect the information displayed on projector screen. If two (or more) presenters are sharing the same projector, the eye protecting black spots are generated accordingly. Moreover wireless air mouse is incorporated in this project to detect the mouse movement using image processing. Cursor will move through laser device and click status will transmit to Raspberry pi via Bluetooth. Presenter can easily use the wireless mouse from the distance for presentation. It will be considered that this project prevent the eyes of presenter as well as reduce the size and power consumption from relatively available projectors attached with PC because of this project is embedded on Raspberry pi.
本工作是基于树莓派3的图像处理,通过Python编程,与OpenCV工具接口,处理后的图像由相机捕获。Haar级联算法在OpenCV中可用。利用Haar分类器对图像进行处理,该分类器通过选取宽、宽、长、高等坐标,考虑到安全眼的距离和位置,在展示者的脸上产生黑点。这个黑点可以防止眼睛受到投影仪高强度光束的照射。当演示者在投影仪前移动时,黑点的大小会不断变化并不断产生。这不会影响投影机屏幕上显示的信息。如果两个(或更多)演示者共用一台投影仪,则会相应地产生保护眼睛的黑点。此外,本课题还引入了无线空气鼠标,利用图像处理技术检测鼠标的运动。光标将通过激光设备移动,点击状态将通过蓝牙传输给树莓派。演示者可以方便地在远距离使用无线鼠标进行演示。由于这个项目是嵌入在树莓派上的,我们认为这个项目可以防止演示者的眼睛,也可以减少相对现有的PC上的投影仪的尺寸和功耗。
{"title":"Smart Projector with Wireless Mouse","authors":"Dur-e-Jabeen, A. Haseeb, Aashir Ali, Hamza Saleem","doi":"10.1109/GCWOT49901.2020.9391606","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391606","url":null,"abstract":"This work is based on image processing using Raspberry pi 3 through Python programming that is interfaced with OpenCV tool and the processed image captured by camera. Haar cascade algorithm is available in OpenCV. It is used to process the image with Haar classifier that creates black spot on presenter face by considering distance and position to safe eyes by picking the coordinates as breadth, width, length and height. This black spot prevents the eyes from high intensity light beam of projector. The size of the black spots varies and continuously generated as presenter moves in front of projector. This does not affect the information displayed on projector screen. If two (or more) presenters are sharing the same projector, the eye protecting black spots are generated accordingly. Moreover wireless air mouse is incorporated in this project to detect the mouse movement using image processing. Cursor will move through laser device and click status will transmit to Raspberry pi via Bluetooth. Presenter can easily use the wireless mouse from the distance for presentation. It will be considered that this project prevent the eyes of presenter as well as reduce the size and power consumption from relatively available projectors attached with PC because of this project is embedded on Raspberry pi.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks 水下传感器网络的地理和协作机会路由协议
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391632
Sarang Karim, F. Shaikh, B. S. Chowdhry, P. Otero
Underwater Sensor Networks (UWSNs) are capable to explore the many unrevealed natural resources beneath the water, such as lakes, ponds, rivers, seas, and oceans. But there are so many challenges to be faced during the design of UWSN system due to the random nature of water waves. But, perhaps the most significant challenge in UWSNs is how to relay packets efficiently with minimum energy cost to the surface sink. This can be achieved by employing geographic and opportunistic routing schemes to transfer the packets at the surface sink reliably in cooperation with relay nodes. Considering these issues, we design a new routing protocol, called the Geographic and Cooperative Opportunistic Routing Protocol (GCORP), where data packets are routed from source node to the surface sink with the aid of relay nodes. In GCORP protocol, initially, a relay forwarding set is being determined by the source node on basis of depth data, then we use a weighting scheme to choose the best relay node from the relay forwarding set. The weight calculation is performed on normalized energy, packet delivery probability, and normalized distance of the forwarding node to the known surface sink. The main purpose of developing the GCORP protocol is to provide an effective solution for UWSN routing by improving the network metrics. We perform extensive simulations in NS-3 to validate the outcomes of GCORP protocol and compared them with other routing schemes with respect to packet delivery ratio, end-2-end delay, network lifetime, and energy consumption. The simulation results reveal that the GCORP protocol outperforms the existing approaches.
水下传感器网络(UWSNs)能够探测许多未被发现的水下自然资源,如湖泊、池塘、河流、海洋和海洋。但是由于水波的随机性,在UWSN系统的设计中面临着许多挑战。但是,UWSNs中最重要的挑战可能是如何以最小的能量成本有效地将数据包中继到表面接收器。这可以通过与中继节点合作,采用地理和机会路由方案在表面sink可靠地传输数据包来实现。考虑到这些问题,我们设计了一种新的路由协议,称为地理合作机会路由协议(GCORP),其中数据包在中继节点的帮助下从源节点路由到表面sink。在GCORP协议中,首先由源节点根据深度数据确定中继转发集,然后使用加权方案从中继转发集中选择最佳中继节点。权重计算是根据转发节点到已知表面sink的归一化能量、分组投递概率和归一化距离进行的。开发GCORP协议的主要目的是通过改进网络指标,为UWSN路由提供有效的解决方案。我们在NS-3中进行了广泛的模拟,以验证GCORP协议的结果,并将其与其他路由方案在分组传送率、端到端延迟、网络寿命和能耗方面进行了比较。仿真结果表明,GCORP协议优于现有协议。
{"title":"Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks","authors":"Sarang Karim, F. Shaikh, B. S. Chowdhry, P. Otero","doi":"10.1109/GCWOT49901.2020.9391632","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391632","url":null,"abstract":"Underwater Sensor Networks (UWSNs) are capable to explore the many unrevealed natural resources beneath the water, such as lakes, ponds, rivers, seas, and oceans. But there are so many challenges to be faced during the design of UWSN system due to the random nature of water waves. But, perhaps the most significant challenge in UWSNs is how to relay packets efficiently with minimum energy cost to the surface sink. This can be achieved by employing geographic and opportunistic routing schemes to transfer the packets at the surface sink reliably in cooperation with relay nodes. Considering these issues, we design a new routing protocol, called the Geographic and Cooperative Opportunistic Routing Protocol (GCORP), where data packets are routed from source node to the surface sink with the aid of relay nodes. In GCORP protocol, initially, a relay forwarding set is being determined by the source node on basis of depth data, then we use a weighting scheme to choose the best relay node from the relay forwarding set. The weight calculation is performed on normalized energy, packet delivery probability, and normalized distance of the forwarding node to the known surface sink. The main purpose of developing the GCORP protocol is to provide an effective solution for UWSN routing by improving the network metrics. We perform extensive simulations in NS-3 to validate the outcomes of GCORP protocol and compared them with other routing schemes with respect to packet delivery ratio, end-2-end delay, network lifetime, and energy consumption. The simulation results reveal that the GCORP protocol outperforms the existing approaches.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IOT Based Real Time Health Monitoring System 基于物联网的实时健康监测系统
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391589
Khan Abdul Moid, P. Otero
Our daily life is tough and full of problems, one of the most difficult task for this generation is to stay healthy. This can be achieved by inducting state of the art health monitoring system. Our aim is to provide affordable and effective solution of monitoring patient's health from anywhere in the world. In this paper, Raspberry Pi and Internet of Things (IoT) are used. Raspberry Pi is interfaced with multiple sensory sources that provide continuous data and limits the human error. The acquired data is transmitted and acquired by the data center, where it can be stored for later use and updates regularly. It also alerts the concerned physician or doctor for any kind of abnormality if it occurs. The aim of the proposed system is to monitor all patients located anywhere on the globe, which can easily be achieved by making the data available on a website. The propose system is inexpensive and provide an effective solution for the health monitoring tasks, it also reduces the communication gap between the doctor and the patient
我们的日常生活是艰难的,充满了问题,这一代人最困难的任务之一就是保持健康。这可以通过引进最先进的健康监测系统来实现。我们的目标是提供负担得起的和有效的解决方案,从世界任何地方监测病人的健康。本文使用树莓派和物联网(IoT)。树莓派与多个感官源接口,提供连续数据并限制人为错误。采集的数据由数据中心传输和采集,存储在数据中心供以后使用并定期更新。如果发生任何异常,它还会提醒有关的医生或医生。拟议系统的目的是监测全球任何地方的所有患者,这可以通过在网站上提供数据轻松实现。该系统成本低廉,为健康监测任务提供了有效的解决方案,减少了医患之间的沟通差距
{"title":"IOT Based Real Time Health Monitoring System","authors":"Khan Abdul Moid, P. Otero","doi":"10.1109/GCWOT49901.2020.9391589","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391589","url":null,"abstract":"Our daily life is tough and full of problems, one of the most difficult task for this generation is to stay healthy. This can be achieved by inducting state of the art health monitoring system. Our aim is to provide affordable and effective solution of monitoring patient's health from anywhere in the world. In this paper, Raspberry Pi and Internet of Things (IoT) are used. Raspberry Pi is interfaced with multiple sensory sources that provide continuous data and limits the human error. The acquired data is transmitted and acquired by the data center, where it can be stored for later use and updates regularly. It also alerts the concerned physician or doctor for any kind of abnormality if it occurs. The aim of the proposed system is to monitor all patients located anywhere on the globe, which can easily be achieved by making the data available on a website. The propose system is inexpensive and provide an effective solution for the health monitoring tasks, it also reduces the communication gap between the doctor and the patient","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Crop Disease Diagnosis using Deep Learning Models 利用深度学习模型进行作物病害诊断
Pub Date : 2020-10-06 DOI: 10.1109/GCWOT49901.2020.9391605
Waleej Haider, Aqeel Ur Rehman, Ahmed Maqsood, Syed Zurain Javed
Diseases and pesticides are the most common problems of wheat being faced by the farmers. These are commonly formed due to improper land preparation, unconditional rains, variable climate conditions, and irregular watering. The impact of these factors on the wheat crop could ultimately affect the economy of the country. Timely detection of the diseases could avoid many financial and time-based losses and help in applying relevant disease management methods. The old manual methods of detecting the diseases are based on personal observations. These have not much contributed due to: a) High frequency of errors, b) Time consuming, c) In case of detecting the large area of the crop by the humans, the observation may not be accurate, d) Risk of spreading disease while applying manual methods. User-friendly applications with self-learning ability are primarily required to help the farmers to deal with the disease problems. In this paper, an effective and efficient approach has been presented for the timely diagnosis of wheat disease and to provide relevant management methods. This user-friendly application facilitates various types of users in the management of crop diseases. The data set has been obtained from online sources and Convolutional Neural Network (CNN) has been used to train the data. The proposed approach has gained significant accuracy in the detection of diseases.
疾病和农药是小麦种植最常见的问题。这些通常是由于不适当的土地准备、无条件的降雨、多变的气候条件和不规律的浇水而形成的。这些因素对小麦作物的影响最终可能影响到该国的经济。及时发现疾病可以避免许多经济和时间上的损失,并有助于应用相关的疾病管理方法。旧的手工检测疾病的方法是基于个人观察。由于:a)错误频率高,b)耗时,c)在人工检测作物大面积的情况下,观察可能不准确,d)在使用人工方法时有传播疾病的风险,这些因素没有多大贡献。用户友好的、具有自学习能力的应用程序是帮助农民处理病害问题的主要要求。本文为小麦病害的及时诊断和管理提供了一种有效的方法。这个用户友好的应用程序方便了各种类型的用户在作物病害管理。该数据集从在线资源中获得,并使用卷积神经网络(CNN)对数据进行训练。所提出的方法在疾病检测中获得了显著的准确性。
{"title":"Crop Disease Diagnosis using Deep Learning Models","authors":"Waleej Haider, Aqeel Ur Rehman, Ahmed Maqsood, Syed Zurain Javed","doi":"10.1109/GCWOT49901.2020.9391605","DOIUrl":"https://doi.org/10.1109/GCWOT49901.2020.9391605","url":null,"abstract":"Diseases and pesticides are the most common problems of wheat being faced by the farmers. These are commonly formed due to improper land preparation, unconditional rains, variable climate conditions, and irregular watering. The impact of these factors on the wheat crop could ultimately affect the economy of the country. Timely detection of the diseases could avoid many financial and time-based losses and help in applying relevant disease management methods. The old manual methods of detecting the diseases are based on personal observations. These have not much contributed due to: a) High frequency of errors, b) Time consuming, c) In case of detecting the large area of the crop by the humans, the observation may not be accurate, d) Risk of spreading disease while applying manual methods. User-friendly applications with self-learning ability are primarily required to help the farmers to deal with the disease problems. In this paper, an effective and efficient approach has been presented for the timely diagnosis of wheat disease and to provide relevant management methods. This user-friendly application facilitates various types of users in the management of crop diseases. The data set has been obtained from online sources and Convolutional Neural Network (CNN) has been used to train the data. The proposed approach has gained significant accuracy in the detection of diseases.","PeriodicalId":157662,"journal":{"name":"2020 Global Conference on Wireless and Optical Technologies (GCWOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 Global Conference on Wireless and Optical Technologies (GCWOT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1