Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862763
S. Mishra, A. Rasool
Hospitals all over the world are moving towards better and more advanced technologies. In the recent times, integration of the Internet of Things with the available medical technologies as well as with patients and their environment has given a new scope for data collection and better decisions. This survey paper focuses on various ways the IoT devices can be used to improve the health of people along with ensuring that there are no mistakes in the process of medication and medicine delivery. Here we have taken many examples of the devices that are being used and which are and can be used in the future for more advanced and secure health care.
{"title":"IoT Health care Monitoring and Tracking: A Survey","authors":"S. Mishra, A. Rasool","doi":"10.1109/ICOEI.2019.8862763","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862763","url":null,"abstract":"Hospitals all over the world are moving towards better and more advanced technologies. In the recent times, integration of the Internet of Things with the available medical technologies as well as with patients and their environment has given a new scope for data collection and better decisions. This survey paper focuses on various ways the IoT devices can be used to improve the health of people along with ensuring that there are no mistakes in the process of medication and medicine delivery. Here we have taken many examples of the devices that are being used and which are and can be used in the future for more advanced and secure health care.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862691
B. Sivanagaleela, S. Rajesh
Crime analysis is methodological approach for identify the crime areas. The crime areas are mainly based on the crime type these identified crime areas are helpful to reduce the crime rate. This can be very easy to identify the crime areas, based on this process the crime rate can be analyzed. With the increasing of computer systems the crime data analysts can help to the crime investigators to analyze the crime. Based on the clustering and preprocessing extract the crime areas from a structured data. The cause of occurrences of crimes like crime details of person and other factors we are focusing mainly on crime factors of previous years. This system is mainly focus on in which area the crime will occur, does not focus on the identify the criminal. In the existing system naive bayes classification was used In the present system, the fuzzy C-Means algorithm will be use to cluster the crime data for total cognizable crimes such as Kidnapping, murder, Theft, Burglary, cheating, crime against women, robbery and other such crimes.
{"title":"Crime Analysis and Prediction Using Fuzzy C-Means Algorithm","authors":"B. Sivanagaleela, S. Rajesh","doi":"10.1109/ICOEI.2019.8862691","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862691","url":null,"abstract":"Crime analysis is methodological approach for identify the crime areas. The crime areas are mainly based on the crime type these identified crime areas are helpful to reduce the crime rate. This can be very easy to identify the crime areas, based on this process the crime rate can be analyzed. With the increasing of computer systems the crime data analysts can help to the crime investigators to analyze the crime. Based on the clustering and preprocessing extract the crime areas from a structured data. The cause of occurrences of crimes like crime details of person and other factors we are focusing mainly on crime factors of previous years. This system is mainly focus on in which area the crime will occur, does not focus on the identify the criminal. In the existing system naive bayes classification was used In the present system, the fuzzy C-Means algorithm will be use to cluster the crime data for total cognizable crimes such as Kidnapping, murder, Theft, Burglary, cheating, crime against women, robbery and other such crimes.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862528
Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das
In this work, Arduino Uno and Bluetooth controlled real time power measurement and control of household electrical appliances, was proposed. An android application was also been used to display the amount of real-time consumed power of each appliance separately and also to make the user aware the total billing amount. Along with measurement of total power consumed, this system also keeps a record of the total consumed electrical power in every hour and creates the load curve, which was used to estimate optimal billing amount based on two part tariff. The main focus in this work was imposed on reducing maximum demand power consumed by user so that total billing amount can be reduced. After estimation of load curve, system generates a time span within which all the appliances with relatively high power consumption capacity, should be used so that the average load curve becomes almost horizontal thus reducing maximum demand. The whole work was implemented on one tungsten bulb of 60 watt, two compact fluorescent light, each of 25 watt, one table fan of 40 watt and a DC electric motor of 1.2 HP. The optimal power consumption was displayed in an Android mobile phone through HC-05 Bluetooth module.
{"title":"Real-Time Monitoring and Control of Consumed Power for Household Appliances using Arduino Uno through Bluetooth and Android Application","authors":"Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das","doi":"10.1109/ICOEI.2019.8862528","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862528","url":null,"abstract":"In this work, Arduino Uno and Bluetooth controlled real time power measurement and control of household electrical appliances, was proposed. An android application was also been used to display the amount of real-time consumed power of each appliance separately and also to make the user aware the total billing amount. Along with measurement of total power consumed, this system also keeps a record of the total consumed electrical power in every hour and creates the load curve, which was used to estimate optimal billing amount based on two part tariff. The main focus in this work was imposed on reducing maximum demand power consumed by user so that total billing amount can be reduced. After estimation of load curve, system generates a time span within which all the appliances with relatively high power consumption capacity, should be used so that the average load curve becomes almost horizontal thus reducing maximum demand. The whole work was implemented on one tungsten bulb of 60 watt, two compact fluorescent light, each of 25 watt, one table fan of 40 watt and a DC electric motor of 1.2 HP. The optimal power consumption was displayed in an Android mobile phone through HC-05 Bluetooth module.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862640
Swati D. Shirke, C. Rajabhushnam
Now a days, Iris recognition is mostly used in biometrics for personal identification. It is the most powerful tool for person identification. But in real time it is quite difficult to capture the better quality of iris images. The images obtained are more degraded due to the lack of texture, blur. In this paper, a simple high instability technique is presented also this process is more convenient to use. This super-resolution algorithm is applied to the pixels of iris images to select the best frame from the iris image. A segmentation algorithm that segments the input iris images. Spatial FCM used for segmentation testing purpose. Iris image is framing 600 x 600 in sequence to calculate vessel area in each framework using for pattern abstraction using loop descriptor. The Hough transforms cast-off de-noising the image. The experimental results show that this proposed system successfully recognizes the iris about 4 to 8 meters long distance of a person. This proposed work is developed on MATLAB for “reading” the profile also for completing the Hough transforms performance. The database used for this purpose is CASIA V4. The simulation results show that the stable extraction of iris recognition.
{"title":"Biometric Personal Iris Recognition from an Image at Long Distance","authors":"Swati D. Shirke, C. Rajabhushnam","doi":"10.1109/ICOEI.2019.8862640","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862640","url":null,"abstract":"Now a days, Iris recognition is mostly used in biometrics for personal identification. It is the most powerful tool for person identification. But in real time it is quite difficult to capture the better quality of iris images. The images obtained are more degraded due to the lack of texture, blur. In this paper, a simple high instability technique is presented also this process is more convenient to use. This super-resolution algorithm is applied to the pixels of iris images to select the best frame from the iris image. A segmentation algorithm that segments the input iris images. Spatial FCM used for segmentation testing purpose. Iris image is framing 600 x 600 in sequence to calculate vessel area in each framework using for pattern abstraction using loop descriptor. The Hough transforms cast-off de-noising the image. The experimental results show that this proposed system successfully recognizes the iris about 4 to 8 meters long distance of a person. This proposed work is developed on MATLAB for “reading” the profile also for completing the Hough transforms performance. The database used for this purpose is CASIA V4. The simulation results show that the stable extraction of iris recognition.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862559
V. Gotarane, Sandeep Raskar
Internet of Things (IoT) is very fast-growing technology leading to speedy and better communication. Use of IoT in Military application has become necessity of today's world as anti-military activities have increased and become threat to Nations. Lives of warfighters are priceless, so it is important to protect their lives to the maximum we can. Military ammunition control is also an important and integral part of military activities. Different IoT applications and methodologies for Military activities are discussed and analyzed in this paper. This paper also discusses the protocols and methods of implementation used and presented by people over the globe.
{"title":"IoT Practices in Military Applications","authors":"V. Gotarane, Sandeep Raskar","doi":"10.1109/ICOEI.2019.8862559","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862559","url":null,"abstract":"Internet of Things (IoT) is very fast-growing technology leading to speedy and better communication. Use of IoT in Military application has become necessity of today's world as anti-military activities have increased and become threat to Nations. Lives of warfighters are priceless, so it is important to protect their lives to the maximum we can. Military ammunition control is also an important and integral part of military activities. Different IoT applications and methodologies for Military activities are discussed and analyzed in this paper. This paper also discusses the protocols and methods of implementation used and presented by people over the globe.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133218599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862783
M. Reshma, B. Kannan
Face recognition technology has gained attention over past years owing to its broad applications. It is a potential research area in the scope of image analysis, computer vision and pattern recognition. The requirement of identifying an authentic user through different authentication mechanisms are increasing rapidly following the intense concerns about security, and rapid advancement in networking, communication, and mobility. Face recognition is an area which has attained attention over the last few decades. The traditional applications of face recognition system, especially those used for access control, authentication, and surveillance, usually need maximum information of face to attain exceptional performance in recognition. Occasionally it is difficult to get access of a full face under certain restricted situations. For example, a non-cooperative face can lead to face occlusion. For recognizing an arbitrary image captured in an unconstrained environment is a more challenging condition in video surveillance, handheld devices etc. Numerous methods have been devised for unconstrained face recognition with remarkable achievements. This paper provides an overview of different partial face recognition approaches proposed.
{"title":"Approaches on Partial Face Recognition: A Literature Review","authors":"M. Reshma, B. Kannan","doi":"10.1109/ICOEI.2019.8862783","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862783","url":null,"abstract":"Face recognition technology has gained attention over past years owing to its broad applications. It is a potential research area in the scope of image analysis, computer vision and pattern recognition. The requirement of identifying an authentic user through different authentication mechanisms are increasing rapidly following the intense concerns about security, and rapid advancement in networking, communication, and mobility. Face recognition is an area which has attained attention over the last few decades. The traditional applications of face recognition system, especially those used for access control, authentication, and surveillance, usually need maximum information of face to attain exceptional performance in recognition. Occasionally it is difficult to get access of a full face under certain restricted situations. For example, a non-cooperative face can lead to face occlusion. For recognizing an arbitrary image captured in an unconstrained environment is a more challenging condition in video surveillance, handheld devices etc. Numerous methods have been devised for unconstrained face recognition with remarkable achievements. This paper provides an overview of different partial face recognition approaches proposed.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862754
A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni
Adaptable Critical Patient Caring system is a key concern for hospitals in developing countries like Bangladesh. Most of the hospital in Bangladesh lack serving proper health service due to unavailability of appropriate, easy and scalable smart systems. The aim of this project is to build an adequate system for hospitals to serve critical patients with a real-time feedback method. In this paper, we propose a generic architecture, associated terminology and a classificatory model for observing critical patient's health condition with machine learning and IBM cloud computing as Platform as a service (PaaS). Machine Learning (ML) based health prediction of the patients is the key concept of this research. IBM Cloud, IBM Watson studio is the platform for this research to store and maintain our data and ml models. For our ml models, we have chosen the following Base Predictors: Naïve Bayes, Logistic Regression, KNeighbors Classifier, Decision Tree Classifier, Random Forest Classifier, Gradient Boosting Classifier, and MLP Classifier. For improving the accuracy of the model, the bagging method of ensemble learning has been used. The following algorithms are used for ensemble learning: Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC, and Bagging Ridge. We have developed a mobile application named “Critical Patient Management System - CPMS” for real-time data and information view. The system architecture is designed in such a way that the ml models can train and deploy in a real-time interval by retrieving the data from IBM Cloud and the cloud information can also be accessed through CPMS in a requested time interval. To help the doctors, the ml models will predict the condition of a patient. If the prediction based on the condition gets worse, the CPMS will send an SMS to the duty doctor and nurse for getting immediate attention to the patient. Combining with the ml models and mobile application, the project may serve as a smart healthcare solution for the hospitals.
适应性强的重症病人护理系统是孟加拉国等发展中国家医院关注的一个关键问题。由于没有适当、简便和可扩展的智能系统,孟加拉国的大多数医院缺乏适当的卫生服务。该项目的目的是为医院建立一个适当的系统,以实时反馈的方式为危重患者服务。在本文中,我们提出了一个通用架构、相关术语和分类模型,用于使用机器学习和IBM云计算即平台即服务(PaaS)来观察危重患者的健康状况。基于机器学习的患者健康预测是本研究的关键概念。IBM Cloud、IBM Watson studio是本研究存储和维护数据和ml模型的平台。对于我们的ml模型,我们选择了以下基本预测器:Naïve贝叶斯,逻辑回归,KNeighbors分类器,决策树分类器,随机森林分类器,梯度增强分类器和MLP分类器。为了提高模型的准确性,采用了集成学习的bagging方法。以下算法用于集成学习:Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC和Bagging Ridge。我们开发了一款名为“重症患者管理系统- CPMS”的移动应用程序,用于实时数据和信息查看。系统架构的设计使得ml模型可以通过从IBM Cloud检索数据来进行实时训练和部署,并且还可以在请求的时间间隔内通过CPMS访问云信息。为了帮助医生,机器学习模型将预测病人的病情。如果基于病情的预测变得更糟,CPMS会向值班医生和护士发送短信,让他们立即关注患者。结合ml模型和移动应用程序,该项目可作为医院的智能医疗解决方案。
{"title":"Machine Learning based Health Prediction System using IBM Cloud as PaaS","authors":"A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni","doi":"10.1109/ICOEI.2019.8862754","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862754","url":null,"abstract":"Adaptable Critical Patient Caring system is a key concern for hospitals in developing countries like Bangladesh. Most of the hospital in Bangladesh lack serving proper health service due to unavailability of appropriate, easy and scalable smart systems. The aim of this project is to build an adequate system for hospitals to serve critical patients with a real-time feedback method. In this paper, we propose a generic architecture, associated terminology and a classificatory model for observing critical patient's health condition with machine learning and IBM cloud computing as Platform as a service (PaaS). Machine Learning (ML) based health prediction of the patients is the key concept of this research. IBM Cloud, IBM Watson studio is the platform for this research to store and maintain our data and ml models. For our ml models, we have chosen the following Base Predictors: Naïve Bayes, Logistic Regression, KNeighbors Classifier, Decision Tree Classifier, Random Forest Classifier, Gradient Boosting Classifier, and MLP Classifier. For improving the accuracy of the model, the bagging method of ensemble learning has been used. The following algorithms are used for ensemble learning: Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC, and Bagging Ridge. We have developed a mobile application named “Critical Patient Management System - CPMS” for real-time data and information view. The system architecture is designed in such a way that the ml models can train and deploy in a real-time interval by retrieving the data from IBM Cloud and the cloud information can also be accessed through CPMS in a requested time interval. To help the doctors, the ml models will predict the condition of a patient. If the prediction based on the condition gets worse, the CPMS will send an SMS to the duty doctor and nurse for getting immediate attention to the patient. Combining with the ml models and mobile application, the project may serve as a smart healthcare solution for the hospitals.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862767
Keyur Patel
As the technology is growing rapidly, the development of systems and software are becoming more complex. For this reason, the security of software and web applications become more vulnerable. In the last two decades, the use of internet application and security hacking activities are on top of the glance. The organizations are having the biggest challenge that how to secure their web applications from the rapidly increasing cyber threats because the organization can't compromise the security of their sensitive information. Vulnerability Assessment and Penetration Testing techniques may help organizations to find security loopholes. The weakness can be the asset for the attacker if the organizations are not aware of this. Vulnerability Assessment and Penetration Testing helps an organization to cover the security loopholes and determine their security arrangements are working as per defined policies or not. To cover the tracks and mitigate the threats it is necessary to install security patches. This paper includes the survey on the current vulnerabilities, determination of those vulnerabilities, the methodology used for determination, tools used to determine the vulnerabilities to secure the organizations from cyber threat.
{"title":"A Survey on Vulnerability Assessment & Penetration Testing for Secure Communication","authors":"Keyur Patel","doi":"10.1109/ICOEI.2019.8862767","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862767","url":null,"abstract":"As the technology is growing rapidly, the development of systems and software are becoming more complex. For this reason, the security of software and web applications become more vulnerable. In the last two decades, the use of internet application and security hacking activities are on top of the glance. The organizations are having the biggest challenge that how to secure their web applications from the rapidly increasing cyber threats because the organization can't compromise the security of their sensitive information. Vulnerability Assessment and Penetration Testing techniques may help organizations to find security loopholes. The weakness can be the asset for the attacker if the organizations are not aware of this. Vulnerability Assessment and Penetration Testing helps an organization to cover the security loopholes and determine their security arrangements are working as per defined policies or not. To cover the tracks and mitigate the threats it is necessary to install security patches. This paper includes the survey on the current vulnerabilities, determination of those vulnerabilities, the methodology used for determination, tools used to determine the vulnerabilities to secure the organizations from cyber threat.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862658
S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh
For improving the transmission of data between the cross layers, we propose an efficient Opportunistic routing in Mobile Adhoc Network (MANET) using Cross Layer Reliable Opportunistic Routing (CBRT) Algorithm and Link Lifetime prediction, in which the fuzzy logic topologies are used. We use the fuzzy logics to regenerate the dead nodes using, if-then rule. Using this, we will reactivate the dead nodes for transmission. For the increased reliability and reduced cost of control, we propose a method of finding degree of node sensing, which senses the degree of the node which helps in sensing the shortest path of the highest lifetime node. Additionally, we propose the link lifetime prediction algorithm which finds the lifetime of the node so that the shortest path can be maintained with the source node and the highest lifetime node. Processing this method will reduce the data loss and balance the efficiency of transmission. Link lifetime prediction algorithm also takes the moving speed and moving direction. Then finally LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is added which consumes less energy during the transmission.
{"title":"Efficient and Opportunistic Routing in MANET using Link Lifetime Prediction","authors":"S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh","doi":"10.1109/ICOEI.2019.8862658","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862658","url":null,"abstract":"For improving the transmission of data between the cross layers, we propose an efficient Opportunistic routing in Mobile Adhoc Network (MANET) using Cross Layer Reliable Opportunistic Routing (CBRT) Algorithm and Link Lifetime prediction, in which the fuzzy logic topologies are used. We use the fuzzy logics to regenerate the dead nodes using, if-then rule. Using this, we will reactivate the dead nodes for transmission. For the increased reliability and reduced cost of control, we propose a method of finding degree of node sensing, which senses the degree of the node which helps in sensing the shortest path of the highest lifetime node. Additionally, we propose the link lifetime prediction algorithm which finds the lifetime of the node so that the shortest path can be maintained with the source node and the highest lifetime node. Processing this method will reduce the data loss and balance the efficiency of transmission. Link lifetime prediction algorithm also takes the moving speed and moving direction. Then finally LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is added which consumes less energy during the transmission.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-23DOI: 10.1109/ICOEI.2019.8862647
Jithina Jose, T. Sasipraba
The effect of air quality on wellbeing and on life comfort is entrenched. Indoor air quality parameters are critical to make a gainful and sound indoor condition anyway by and large the air quality parameters are altogether different from those characterized as solid qualities. Taking into account that we spend about 90% of our lives inside, it is critical to screen the indoor air quality progressively to distinguish issues in the nature of air and plan intercessions in the building, or in the ventilation frameworks so as to enhance air quality. In this paper we are identifying the indoor air quality with the help of internet of things by using the sensors BME680 from bosch, SGP30 and CCS811 and low power wide area network (LPWAN) for the data transfer. Here we are separating the gases CO2 equivalent, Ethanol, TVoC and so on. For transmitting this IOT information, we require high vitality productive sensor hubs that can impart crosswise over long separation. This propels the improvement of some Low-Power Wide Area Networks (LPWAN) advances, for example, LoRa, to satisfy these requirements. The reports are exhibiting the destructiveness of air that we are taking in step by step. Here we are trying to give a social awareness by using this paper.
{"title":"Indoor air quality monitors using IOT sensors and LPWAN","authors":"Jithina Jose, T. Sasipraba","doi":"10.1109/ICOEI.2019.8862647","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862647","url":null,"abstract":"The effect of air quality on wellbeing and on life comfort is entrenched. Indoor air quality parameters are critical to make a gainful and sound indoor condition anyway by and large the air quality parameters are altogether different from those characterized as solid qualities. Taking into account that we spend about 90% of our lives inside, it is critical to screen the indoor air quality progressively to distinguish issues in the nature of air and plan intercessions in the building, or in the ventilation frameworks so as to enhance air quality. In this paper we are identifying the indoor air quality with the help of internet of things by using the sensors BME680 from bosch, SGP30 and CCS811 and low power wide area network (LPWAN) for the data transfer. Here we are separating the gases CO2 equivalent, Ethanol, TVoC and so on. For transmitting this IOT information, we require high vitality productive sensor hubs that can impart crosswise over long separation. This propels the improvement of some Low-Power Wide Area Networks (LPWAN) advances, for example, LoRa, to satisfy these requirements. The reports are exhibiting the destructiveness of air that we are taking in step by step. Here we are trying to give a social awareness by using this paper.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134341930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}