Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981680
Muhammad Irfan Ali
This document describes the prototyping of a low-cost and portable infusion pump, which is used to provide a certain dose of a drug in certain time. This device uses the principles of electronics, mechanics and fluid mechanics to drive a syringe-based infusion pump, which delivers the prescribed amount of drug in required time to the patient. The designed device can deliver drug up-to 1 ml/hour with an adjustable range. The device detects and maintains flow of drug according to the input provided by the user. The most prominent feature of the device is its ability to detect bubble in the liquid. Whenever an air bubble is detected in the device it will instantly stop the flow. It is a low-cost and portable device which can be operated on a 12-volt battery and directly from the power socket. The cost of this prototype is only about $200 which will further diminish if the units are produced on an industrial scale.
{"title":"Designing a Low-Cost and Portable Infusion Pump","authors":"Muhammad Irfan Ali","doi":"10.1109/ICEEST48626.2019.8981680","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981680","url":null,"abstract":"This document describes the prototyping of a low-cost and portable infusion pump, which is used to provide a certain dose of a drug in certain time. This device uses the principles of electronics, mechanics and fluid mechanics to drive a syringe-based infusion pump, which delivers the prescribed amount of drug in required time to the patient. The designed device can deliver drug up-to 1 ml/hour with an adjustable range. The device detects and maintains flow of drug according to the input provided by the user. The most prominent feature of the device is its ability to detect bubble in the liquid. Whenever an air bubble is detected in the device it will instantly stop the flow. It is a low-cost and portable device which can be operated on a 12-volt battery and directly from the power socket. The cost of this prototype is only about $200 which will further diminish if the units are produced on an industrial scale.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981674
Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood
In today’s world of globalization where industries are becoming paperless, where robots are replacing human’s hard-core labor intensive work, where the whole world is connected with just one click, where predictive modeling and artificial intelligence AI is helping in tracking any big disaster and where biotech is helping in curing any disease in no time, Block-chain, one of the major innovations of today’s time, is all set to help humans in reaching to new heights of advancements in almost every field. But like other technologies, Blockchain is also facing some challenges, which must be addressed before widespread integration can take place. The mitigation these issues and all the obstacles in the adoption of Blockchain will have positive effects on the overall economy. This research, a questionnaire-based approach was adopted, aims to conclude and summarize the challenges faced by top-management of tech companies in the adoption of block-chain technology in developing countries.
{"title":"Challenges in Adoption of Blockchain in Developing Countries","authors":"Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood","doi":"10.1109/ICEEST48626.2019.8981674","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981674","url":null,"abstract":"In today’s world of globalization where industries are becoming paperless, where robots are replacing human’s hard-core labor intensive work, where the whole world is connected with just one click, where predictive modeling and artificial intelligence AI is helping in tracking any big disaster and where biotech is helping in curing any disease in no time, Block-chain, one of the major innovations of today’s time, is all set to help humans in reaching to new heights of advancements in almost every field. But like other technologies, Blockchain is also facing some challenges, which must be addressed before widespread integration can take place. The mitigation these issues and all the obstacles in the adoption of Blockchain will have positive effects on the overall economy. This research, a questionnaire-based approach was adopted, aims to conclude and summarize the challenges faced by top-management of tech companies in the adoption of block-chain technology in developing countries.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"129 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981692
Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah
This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social media. These techniques have limitations. In order to minimize the security risk of authentication and validation, a methodology called face detection and facial recognition is discussed in this paper. It provides the facility to improve security and to avoid unauthorized access of social media accounts.
{"title":"Enhancing the Authentication Mechanism of Social Media Websites using Face Detection","authors":"Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah","doi":"10.1109/ICEEST48626.2019.8981692","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981692","url":null,"abstract":"This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social media. These techniques have limitations. In order to minimize the security risk of authentication and validation, a methodology called face detection and facial recognition is discussed in this paper. It provides the facility to improve security and to avoid unauthorized access of social media accounts.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129384474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981702
Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza
The research conducted in this paper presents a detailed analysis of the latest research publications related to Data Science using information retrieval and text mining approach. The database used in this study was created by collecting the latest research papers from well-reputed Journals and Conference proceedings published by IEEE and Springer. This comprehensive study shows the significance of information retrieval and text mining in the identification of key insight from textual documents.
{"title":"Identifying Trends in Data Science Articles using Text Mining","authors":"Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza","doi":"10.1109/ICEEST48626.2019.8981702","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981702","url":null,"abstract":"The research conducted in this paper presents a detailed analysis of the latest research publications related to Data Science using information retrieval and text mining approach. The database used in this study was created by collecting the latest research papers from well-reputed Journals and Conference proceedings published by IEEE and Springer. This comprehensive study shows the significance of information retrieval and text mining in the identification of key insight from textual documents.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981685
Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali
Twitter being the most popular content sharing platform is giving rise to automated accounts called “bots”. Majority of the users on Twitter are bots. Various machine learning (ML) algorithms are designed to detect bots avoiding the vulnerability constraints of ML-based models. This paper contributes to exploit vulnerabilities of machine learning (ML) algorithms through black-box attack. An adversarial text sequence misclassifies the results of deep learning (DL) classifiers for bot detection. Literature shows that ML models are vulnerable to attacks. The aim of this paper is to compromise the accuracy of ML-based bot detection algorithms by replacing original words in tweets with their synonyms. Our results show 7.2% decrease in the accuracy for bot tweets, therefore classifying bot tweets as legitimate tweets.
{"title":"Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting","authors":"Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali","doi":"10.1109/ICEEST48626.2019.8981685","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981685","url":null,"abstract":"Twitter being the most popular content sharing platform is giving rise to automated accounts called “bots”. Majority of the users on Twitter are bots. Various machine learning (ML) algorithms are designed to detect bots avoiding the vulnerability constraints of ML-based models. This paper contributes to exploit vulnerabilities of machine learning (ML) algorithms through black-box attack. An adversarial text sequence misclassifies the results of deep learning (DL) classifiers for bot detection. Literature shows that ML models are vulnerable to attacks. The aim of this paper is to compromise the accuracy of ML-based bot detection algorithms by replacing original words in tweets with their synonyms. Our results show 7.2% decrease in the accuracy for bot tweets, therefore classifying bot tweets as legitimate tweets.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981708
Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed
Three-dimensional (3D) modeling of objects play an important role in quality assurance, re-engineering of an object, and mapping of interior design for quality measurements. Hence, this field proves to be one of the hot research topics in the field of robotics. Although, using laser scanner is the most common method for 3D point cloud, the camera-based methods are also introduced in this field. In this paper, we propose and analyze two methods for making 3D point cloud for any given object. First one is camera-based 3D point cloud using structure from motion technique and secondly the laser scanner-based 3D point cloud. The result shows that camera-based 3D point cloud method produced dense point cloud but prone to outliers, whereas the laser scanner method is robust. It should also be noted that the camera is multiple times cost effective than laser scanner.
{"title":"Comparison of Camera and Laser Scanner based 3D Point Cloud","authors":"Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed","doi":"10.1109/ICEEST48626.2019.8981708","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981708","url":null,"abstract":"Three-dimensional (3D) modeling of objects play an important role in quality assurance, re-engineering of an object, and mapping of interior design for quality measurements. Hence, this field proves to be one of the hot research topics in the field of robotics. Although, using laser scanner is the most common method for 3D point cloud, the camera-based methods are also introduced in this field. In this paper, we propose and analyze two methods for making 3D point cloud for any given object. First one is camera-based 3D point cloud using structure from motion technique and secondly the laser scanner-based 3D point cloud. The result shows that camera-based 3D point cloud method produced dense point cloud but prone to outliers, whereas the laser scanner method is robust. It should also be noted that the camera is multiple times cost effective than laser scanner.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981689
R. Umar, Fengfan Yang, S. Mughal
This paper presents multiple turbo coded cooperative orthogonal frequency division multiplexing (MTCC-OFDM) scheme over a quasi-static frequency selective Rayleigh fading channel. The MTCC-OFDM scheme is composed of multiple input and multiple output antennas. As, in practical coded cooperative scenario, the relay terminal is mostly in outage due to noisy source to relay channel which causes an erroneous transmission towards the destination terminal that eventually results in a very low bit-error rate (BER) performance of the communication system. Therefore, in the proposed scheme, a turbo iterative decoding is being performed at the relay terminal that considerably improves the BER performance of the communication system. The numerical simulated results confirm that the proposed scheme not only out-performs its related coded non-cooperative scheme i.e., turbo coded OFDM scheme under a similar conditions in terms of bit error-correction performance but also offers robustness in a noisy (practical) source to relay channel scenario.
{"title":"Performance of distributed multiple turbo code with MIMO antennas over frequency selective Rayleigh fading channels","authors":"R. Umar, Fengfan Yang, S. Mughal","doi":"10.1109/ICEEST48626.2019.8981689","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981689","url":null,"abstract":"This paper presents multiple turbo coded cooperative orthogonal frequency division multiplexing (MTCC-OFDM) scheme over a quasi-static frequency selective Rayleigh fading channel. The MTCC-OFDM scheme is composed of multiple input and multiple output antennas. As, in practical coded cooperative scenario, the relay terminal is mostly in outage due to noisy source to relay channel which causes an erroneous transmission towards the destination terminal that eventually results in a very low bit-error rate (BER) performance of the communication system. Therefore, in the proposed scheme, a turbo iterative decoding is being performed at the relay terminal that considerably improves the BER performance of the communication system. The numerical simulated results confirm that the proposed scheme not only out-performs its related coded non-cooperative scheme i.e., turbo coded OFDM scheme under a similar conditions in terms of bit error-correction performance but also offers robustness in a noisy (practical) source to relay channel scenario.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124540932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981681
Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar
Brain tumor is an irregular mass of tissue with inept expansion/enlargement inside the skull that attack and harm nerves and other sound tissues. The multiplication/ expansion of neurons can cause undesirable cell advancement. Brain Tumor is a testing errand as symptoms show up in the progressive phases of tumor. To provide accuracy in cerebrum tumor location MRI (Magnetic Resonance Image) is widely preferred imaging modality. To give better revelation of tumor without affecting a normal tissue is extremely difficult process. This research paper provided a solution to detect tumor using image processing technique, that include the image acquisition, preprocessing, enhancement, image segmentation, classification and volume calculation. This segmented image is further utilized for the evaluation of brain tumor in early stage.
{"title":"Image Analysis for MRI Based Brain Tumor Detection","authors":"Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar","doi":"10.1109/ICEEST48626.2019.8981681","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981681","url":null,"abstract":"Brain tumor is an irregular mass of tissue with inept expansion/enlargement inside the skull that attack and harm nerves and other sound tissues. The multiplication/ expansion of neurons can cause undesirable cell advancement. Brain Tumor is a testing errand as symptoms show up in the progressive phases of tumor. To provide accuracy in cerebrum tumor location MRI (Magnetic Resonance Image) is widely preferred imaging modality. To give better revelation of tumor without affecting a normal tissue is extremely difficult process. This research paper provided a solution to detect tumor using image processing technique, that include the image acquisition, preprocessing, enhancement, image segmentation, classification and volume calculation. This segmented image is further utilized for the evaluation of brain tumor in early stage.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981687
Asad Ullah, Abid Jami, Muhammad Waqas Aziz, Farhan Naeem, Sadique Ahmad, M. Anwar, Wang Jing
Expression recognition is an important direction for computers to understand human emotions and an important aspect of human-computer interaction. Expression recognition refers to the selection of an expression state from a still photo or video sequence to determine the emotional and psychological changes to the character.Spectral Supervised Canonical Correlation Analysis has been used for Feature extraction. For proper classification VGG119 and softmax has been used. Facial variations such as redundant information in image, illumination variance and overfitting have been addressed in this paper. The images have been preprocessed using face detection, data augmentation and image normalization. After down-sampling, Spectral Supervised Canonical Correlation Analysis (SSCCA) holds the dimensions with factor data which constructs affinity matrix that incorporates both the class information and local structure of the data points. Features with having massive discriminative details have been taken. In order to attain low frequency coefficients more effectively the local structural information will be effectively utilized using SSCCA. Data is further provided to VGG19 for proper training. Meanwhile, the proposed method is more effective and robust comparing other methods in the area.
{"title":"Deep Facial Expression Recognition of facial variations using fusion of feature extraction with classification in end to end model","authors":"Asad Ullah, Abid Jami, Muhammad Waqas Aziz, Farhan Naeem, Sadique Ahmad, M. Anwar, Wang Jing","doi":"10.1109/ICEEST48626.2019.8981687","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981687","url":null,"abstract":"Expression recognition is an important direction for computers to understand human emotions and an important aspect of human-computer interaction. Expression recognition refers to the selection of an expression state from a still photo or video sequence to determine the emotional and psychological changes to the character.Spectral Supervised Canonical Correlation Analysis has been used for Feature extraction. For proper classification VGG119 and softmax has been used. Facial variations such as redundant information in image, illumination variance and overfitting have been addressed in this paper. The images have been preprocessed using face detection, data augmentation and image normalization. After down-sampling, Spectral Supervised Canonical Correlation Analysis (SSCCA) holds the dimensions with factor data which constructs affinity matrix that incorporates both the class information and local structure of the data points. Features with having massive discriminative details have been taken. In order to attain low frequency coefficients more effectively the local structural information will be effectively utilized using SSCCA. Data is further provided to VGG19 for proper training. Meanwhile, the proposed method is more effective and robust comparing other methods in the area.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981710
Zia Mohi U Din, Waleed Razzaq, Usman Arif, Waqas Ahmad, Wasif Muhammad
Unsupervised Ackermann’s principle is widely used in automobile market and other mobile vehicles to steer an autonomous vehicle. In real time self-driving car operation automatic lane detection and following is main task for autonomous navigation. Different type of sensors are being used for lane lines detection but cameras are the most cost effective and accurate sensory modality. This paper presents a novel method for lanes lines detection on a road and then controls the Ackermann Steering angle of the prototype car for autonomous navigation. A bird’s eye view input obtained from a monocular camera mounted at the head of car is fed to the processing unit.
{"title":"Real Time Ackerman Steering Angle Control for Self-Driving Car Autonomous Navigation","authors":"Zia Mohi U Din, Waleed Razzaq, Usman Arif, Waqas Ahmad, Wasif Muhammad","doi":"10.1109/ICEEST48626.2019.8981710","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981710","url":null,"abstract":"Unsupervised Ackermann’s principle is widely used in automobile market and other mobile vehicles to steer an autonomous vehicle. In real time self-driving car operation automatic lane detection and following is main task for autonomous navigation. Different type of sensors are being used for lane lines detection but cameras are the most cost effective and accurate sensory modality. This paper presents a novel method for lanes lines detection on a road and then controls the Ackermann Steering angle of the prototype car for autonomous navigation. A bird’s eye view input obtained from a monocular camera mounted at the head of car is fed to the processing unit.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}