Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560969
V. Shanmugapriya, P. Manoharan
This paper analyze the Electrical, Optical and Thermal (EOT) characteristics of Organic Light Emitting Diode (OLED) using integrating sphere. From the data obtained, critical optical characteristics to be measured for OLED panel panels and suitable measurement methods and conditions for testing OLED panels are discussed. The 2π geometry of the integrating sphere has been employed for testing the OLED. A standardized testing procedure for OLED is developed.
{"title":"Analysis of EOT characteristics of OLED using integrating sphere","authors":"V. Shanmugapriya, P. Manoharan","doi":"10.1109/ICONSTEM.2016.7560969","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560969","url":null,"abstract":"This paper analyze the Electrical, Optical and Thermal (EOT) characteristics of Organic Light Emitting Diode (OLED) using integrating sphere. From the data obtained, critical optical characteristics to be measured for OLED panel panels and suitable measurement methods and conditions for testing OLED panels are discussed. The 2π geometry of the integrating sphere has been employed for testing the OLED. A standardized testing procedure for OLED is developed.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560972
A. Kamaraj, K. Radha, M. Priyanka, M. Punitha
The development of a semi-autonomous intimation system to parents about the presence of their child in school or college campus is the objective of this Project. If a student bunked his/her class or abducted from school or college, their parents might know that after 6pm only. Here we proposed a new solution to send quick intimation to their parents about the presence of students through school or college bus at 9.30am. By this we can track the children and save them early if any mischief is happening. For this we are using an RFID reader, GPS tracker and GSM module along with an Arduino mega 2560 and its software. RFID readers can read the RFID tags of the students. GSM system is used to send their presence to their parents through SMS. To achieve this, a passive or active tracking device with GPS is used. Passive devices store GPS location, speed and time. Once the vehicle returns to a predestined point, the device is removed and the data downloaded to a computer for evaluation. By this we can get arrival and departure locations of the students. Active devices also collect the same information, but usually transmit the data in near-real-time via cellular or satellite networks to a computer or data center for evaluation. It is used to track the location of a vehicle from organizing itself. This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet.
这个项目的目标是开发一个半自主的提示系统,让父母知道他们的孩子在学校或大学校园里。如果一个学生逃课或者从学校或大学被拐走,他们的父母可能只有在下午6点以后才知道。在这里,我们提出了一个新的解决方案,即在上午9点半通过学校或大学巴士向学生的父母发送关于学生存在的快速通知。这样,我们就可以跟踪孩子们,如果有任何恶作剧发生,我们就可以早点救他们。为此,我们使用RFID读取器,GPS跟踪器和GSM模块以及Arduino mega 2560及其软件。RFID阅读器可以读取学生的RFID标签。GSM系统是用来把他们的存在通过短信发送给他们的父母。为了实现这一点,使用了带有GPS的被动或主动跟踪设备。无源设备存储GPS位置、速度和时间。一旦车辆返回到预定地点,该装置就会被移除,并将数据下载到计算机中进行评估。通过这个我们可以得到学生到达和离开的地点。有源设备也收集相同的信息,但通常通过蜂窝或卫星网络将数据近实时地传输到计算机或数据中心进行评估。它用于从组织自身开始跟踪车辆的位置。这个电子文档是一个“活的”模板,它已经在样式表中定义了论文的组成部分[标题,正文,标题等]。
{"title":"Intelligent transport system using integrated GPS optimized reader","authors":"A. Kamaraj, K. Radha, M. Priyanka, M. Punitha","doi":"10.1109/ICONSTEM.2016.7560972","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560972","url":null,"abstract":"The development of a semi-autonomous intimation system to parents about the presence of their child in school or college campus is the objective of this Project. If a student bunked his/her class or abducted from school or college, their parents might know that after 6pm only. Here we proposed a new solution to send quick intimation to their parents about the presence of students through school or college bus at 9.30am. By this we can track the children and save them early if any mischief is happening. For this we are using an RFID reader, GPS tracker and GSM module along with an Arduino mega 2560 and its software. RFID readers can read the RFID tags of the students. GSM system is used to send their presence to their parents through SMS. To achieve this, a passive or active tracking device with GPS is used. Passive devices store GPS location, speed and time. Once the vehicle returns to a predestined point, the device is removed and the data downloaded to a computer for evaluation. By this we can get arrival and departure locations of the students. Active devices also collect the same information, but usually transmit the data in near-real-time via cellular or satellite networks to a computer or data center for evaluation. It is used to track the location of a vehicle from organizing itself. This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560862
J. F. Roseline, N. Sahoo, Ayush Abhinav
Shunt active power filter (SAPF) is a modern methodology for the power compensation. The primary focus of this paper is to eliminate the total harmonics distortions (THD) from the power system buses by implementing fuzzy logic control technique in the controller. This is compared with predictive control technique in the PID type controller with Non linear loads (RL, DC motor and Induction Motor). Introducing renewable power generations systems (Wind energy, solar energy) as external power supply for power compensation redefine the modern power transmission systems. Using of three leg voltage source inverter(VSI) as power converter posses less harmonics at load side compare to other converters. The voltage regulations and power quality in the bus bars is improved only after power compensations.
{"title":"Implementation of fuzzy logic in shunt active power filter for renewable power generation system","authors":"J. F. Roseline, N. Sahoo, Ayush Abhinav","doi":"10.1109/ICONSTEM.2016.7560862","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560862","url":null,"abstract":"Shunt active power filter (SAPF) is a modern methodology for the power compensation. The primary focus of this paper is to eliminate the total harmonics distortions (THD) from the power system buses by implementing fuzzy logic control technique in the controller. This is compared with predictive control technique in the PID type controller with Non linear loads (RL, DC motor and Induction Motor). Introducing renewable power generations systems (Wind energy, solar energy) as external power supply for power compensation redefine the modern power transmission systems. Using of three leg voltage source inverter(VSI) as power converter posses less harmonics at load side compare to other converters. The voltage regulations and power quality in the bus bars is improved only after power compensations.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560934
T. Manjula, R. Rajeswari
A graph G is said to have a dominator coloring if it has a proper coloring in which every vertex of the graph dominates all vertices of atleast one color class. The dominator chromatic number Xd (G) is the least number of colors required for a dominator coloring of G. The dominator chromatic number for Quadrilateral Snake graph, Triangle Snake graph and Barbell graph are derived and also the relationship between chromatic number, domination number and dominator chromatic number of these graphs are shown in this paper.
{"title":"Dominator coloring of Quadrilateral Snake, Triangle Snake graph and Barbell graph","authors":"T. Manjula, R. Rajeswari","doi":"10.1109/ICONSTEM.2016.7560934","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560934","url":null,"abstract":"A graph G is said to have a dominator coloring if it has a proper coloring in which every vertex of the graph dominates all vertices of atleast one color class. The dominator chromatic number Xd (G) is the least number of colors required for a dominator coloring of G. The dominator chromatic number for Quadrilateral Snake graph, Triangle Snake graph and Barbell graph are derived and also the relationship between chromatic number, domination number and dominator chromatic number of these graphs are shown in this paper.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560932
Dr. M. Nandhini, Bikram Bikash Das
Online Social Network provides a simple and easier way to connect with our friends and relatives to share daily activities and event of our day to day life. Most of us cannot live without social network. But just like other online activity, even social networks are having lot of security threats to its users. Most of Research on Social Network reveals that Social Network are the primary sources for getting confidential information of the victim so that they can do numerous fraudulent activities like cyber bullying, money laundering, spreading fake or false messages to create panic situation in public or to fool other user. They already have set their target on social networking website to do their fraudulent activities. Fraudsters are always trying to find any loopholes in the existing system so that they can get access to the system to launch various social engineering attack and scam activities. The security and privacy on these networks has been increasing as the amount of personal information posted by millions of users in their profile is made public. A social networking site allows millions of users to communicate online and large amount of information has been posted daily. So in every few seconds a large amount of data has been generated around the world. This necessitates the adaptation of new methodology to provide security of online data. Social network users are not aware of the various security threats and the associated risks exist in these networks. This paper presents an assessment of classification different social network and different attacks present on those social networks and methodology has been proposed which help the online users to be safe from numerous fraudulent and malicious activities on the web.
{"title":"An assessment and methodology for fraud detection in online social network","authors":"Dr. M. Nandhini, Bikram Bikash Das","doi":"10.1109/ICONSTEM.2016.7560932","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560932","url":null,"abstract":"Online Social Network provides a simple and easier way to connect with our friends and relatives to share daily activities and event of our day to day life. Most of us cannot live without social network. But just like other online activity, even social networks are having lot of security threats to its users. Most of Research on Social Network reveals that Social Network are the primary sources for getting confidential information of the victim so that they can do numerous fraudulent activities like cyber bullying, money laundering, spreading fake or false messages to create panic situation in public or to fool other user. They already have set their target on social networking website to do their fraudulent activities. Fraudsters are always trying to find any loopholes in the existing system so that they can get access to the system to launch various social engineering attack and scam activities. The security and privacy on these networks has been increasing as the amount of personal information posted by millions of users in their profile is made public. A social networking site allows millions of users to communicate online and large amount of information has been posted daily. So in every few seconds a large amount of data has been generated around the world. This necessitates the adaptation of new methodology to provide security of online data. Social network users are not aware of the various security threats and the associated risks exist in these networks. This paper presents an assessment of classification different social network and different attacks present on those social networks and methodology has been proposed which help the online users to be safe from numerous fraudulent and malicious activities on the web.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560926
D. K. Aarthy, S. Vandanaa, M. Varshini, K. Tijitha
In recent times, violating traffic rules have become predominant on Indian roads. The heartbreaking fact is that 16 people die on road accidents every hour in India and the Global status road safety 2013 has published a report on top 10 cities with the highest number of road crash death. The following are the cities listed: Delhi, Chennai, Jaipur, Bangalore, Mumbai, Kanpur, Lucknow, Agra, Hyderabad and Pune. And in 2015 it has become worse with death rate 130,000 annually [18]. This is because people fail to obey the traffic rules since there is no enough security systems to enforce on problems like extending the speed limit, crossing the red signal. This proposal uses the RFID Technology to deal with the traffic problems. The major components of this proposal are RFID reader, a camera that is used to track and take picture of the vehicle, RFID tag, a database server which contains the details of the red signal violators and uses GSM technology to send warning message. This proposal minimizes the conflict and confusion between people and the vehicle and which will automatically reduce the number of accidents on roads. As well as this technology is used to reduce the theft and control the speed of the vehicles (i.e. rash driving).
{"title":"Automatic identification of traffic violations and theft avoidance","authors":"D. K. Aarthy, S. Vandanaa, M. Varshini, K. Tijitha","doi":"10.1109/ICONSTEM.2016.7560926","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560926","url":null,"abstract":"In recent times, violating traffic rules have become predominant on Indian roads. The heartbreaking fact is that 16 people die on road accidents every hour in India and the Global status road safety 2013 has published a report on top 10 cities with the highest number of road crash death. The following are the cities listed: Delhi, Chennai, Jaipur, Bangalore, Mumbai, Kanpur, Lucknow, Agra, Hyderabad and Pune. And in 2015 it has become worse with death rate 130,000 annually [18]. This is because people fail to obey the traffic rules since there is no enough security systems to enforce on problems like extending the speed limit, crossing the red signal. This proposal uses the RFID Technology to deal with the traffic problems. The major components of this proposal are RFID reader, a camera that is used to track and take picture of the vehicle, RFID tag, a database server which contains the details of the red signal violators and uses GSM technology to send warning message. This proposal minimizes the conflict and confusion between people and the vehicle and which will automatically reduce the number of accidents on roads. As well as this technology is used to reduce the theft and control the speed of the vehicles (i.e. rash driving).","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125407857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560941
R. Deebalakshmi, V. Jyothi
Network traffic in the world wide is calculated to rise every year twice the times. To keep pace and profit from this increased amount of flows efficiently. And offer new services. Some efficient techniques needed. Day by day new applications are invented and they have heterogeneous nature in network environment and communication between these new devices also a critical part. improving the network performance, establish proper service policies in router, handling network security risks, management of network operations and provide Qos services to users in internet. To solve these issues classification techniques are used. In this survey different classification algorithms are discussed. K-means algorithm, classification using clustering algorithm, Classification based on Fuzzy Kernel K-means Clustering, Support vector machine algorithm, and self-learning classifier Bayesian classification, C5.0 and traffic classification using correlation information and robust network traffic algorithms are presented.
{"title":"A survey of classification algorithms for network traffic","authors":"R. Deebalakshmi, V. Jyothi","doi":"10.1109/ICONSTEM.2016.7560941","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560941","url":null,"abstract":"Network traffic in the world wide is calculated to rise every year twice the times. To keep pace and profit from this increased amount of flows efficiently. And offer new services. Some efficient techniques needed. Day by day new applications are invented and they have heterogeneous nature in network environment and communication between these new devices also a critical part. improving the network performance, establish proper service policies in router, handling network security risks, management of network operations and provide Qos services to users in internet. To solve these issues classification techniques are used. In this survey different classification algorithms are discussed. K-means algorithm, classification using clustering algorithm, Classification based on Fuzzy Kernel K-means Clustering, Support vector machine algorithm, and self-learning classifier Bayesian classification, C5.0 and traffic classification using correlation information and robust network traffic algorithms are presented.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560959
R. Nithiya, S. Veluchamy
In recent years Image forgery plays important role in many areas like Internet, Forensic department, Passports, License, and Educational certificates etc. Several types of Image forgeries are available such as copy-move, copy-paste, cut-copy. In our work we focused on copy-move image forgery. To identify the forgery region in an image we proposed the adaptive over segmentation and key point matching algorithm. Lots of researchers already proposed algorithm for copy move forgery scheme. But still now the computational complexity is high. It can be reduced in our work by dividing image into non overlapping blocks of image region. The blocks of SIFT features are matched with neighboring block features and locate the forgery region. The experimental shows that we achieved high recall rate under different transform (DCT, SVD, FMT).
{"title":"Key point descriptor based copy and move image forgery detection system","authors":"R. Nithiya, S. Veluchamy","doi":"10.1109/ICONSTEM.2016.7560959","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560959","url":null,"abstract":"In recent years Image forgery plays important role in many areas like Internet, Forensic department, Passports, License, and Educational certificates etc. Several types of Image forgeries are available such as copy-move, copy-paste, cut-copy. In our work we focused on copy-move image forgery. To identify the forgery region in an image we proposed the adaptive over segmentation and key point matching algorithm. Lots of researchers already proposed algorithm for copy move forgery scheme. But still now the computational complexity is high. It can be reduced in our work by dividing image into non overlapping blocks of image region. The blocks of SIFT features are matched with neighboring block features and locate the forgery region. The experimental shows that we achieved high recall rate under different transform (DCT, SVD, FMT).","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560917
Archana. S. Ha, Godfrey Winster
In the recent years, social media have emerged as major platforms for sharing information in medical field, business, education etc. Social media provides limitless opportunities for patients to share experiences with their drug usage. In current scenarios and with available new technologies, Twitter can be used effectively for gathering information rather than gathering information in traditional method. Twitter is the most popular online social networking service that enable user to share and gain knowledge. Doctors says that the medical information shared by doctors and patients on their social media is valuable and trustable. Twitter is used as a prominent Social Media to share their experience based on drugs and diseases. The Drugs Categorization based on Sentence Polarity Analyzer (DCSPA) collects the drugs and disease related tweets from Twitter. Tweet collection is done using Twitter API. The collected tweets are preprocessed and then classifying the tweets related to drugs and diseases is done using Support Vector Classification (SVM). After classification, the tweets are analyzed based on polarity of the sentence. The sentence polarity analyzer is used to categorize the drugs or disease as positive, negative or neutral feedback. The experimental results shows that the sentence polarity analyzer provides better categorization of tweets based on its polarity.
{"title":"Drugs categorization based on sentence polarity analyzer for Twitter data","authors":"Archana. S. Ha, Godfrey Winster","doi":"10.1109/ICONSTEM.2016.7560917","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560917","url":null,"abstract":"In the recent years, social media have emerged as major platforms for sharing information in medical field, business, education etc. Social media provides limitless opportunities for patients to share experiences with their drug usage. In current scenarios and with available new technologies, Twitter can be used effectively for gathering information rather than gathering information in traditional method. Twitter is the most popular online social networking service that enable user to share and gain knowledge. Doctors says that the medical information shared by doctors and patients on their social media is valuable and trustable. Twitter is used as a prominent Social Media to share their experience based on drugs and diseases. The Drugs Categorization based on Sentence Polarity Analyzer (DCSPA) collects the drugs and disease related tweets from Twitter. Tweet collection is done using Twitter API. The collected tweets are preprocessed and then classifying the tweets related to drugs and diseases is done using Support Vector Classification (SVM). After classification, the tweets are analyzed based on polarity of the sentence. The sentence polarity analyzer is used to categorize the drugs or disease as positive, negative or neutral feedback. The experimental results shows that the sentence polarity analyzer provides better categorization of tweets based on its polarity.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-30DOI: 10.1109/ICONSTEM.2016.7560952
B. V. Santhosh Krishna, J. Oviya, S. Gowri, M. Varshini
Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. Our project is a cloud robot which is used in industrial and manufacturing environment. It works on a ROS platform. Here we use Raspberry Pi controller to control the various devices attached to it. For testing this implementation, Android phone, camera, DC motor, sensors and a Raspberry pi controller have been used. The movement of the robot is provided by DC motors and the direction is controlled from an android environment using Robot Operating System (ROS). The controller and the receiver end is connected by Wi-Fi. The data input from the gas, temperature and Infra Red sensors is given to the Raspberry Pi controller. A camera is used to provide visual input of the surrounding environment to the robot. The data obtained by the sensors and camera are processed by the controller and stored in cloud.
{"title":"Cloud robotics in industry using Raspberry Pi","authors":"B. V. Santhosh Krishna, J. Oviya, S. Gowri, M. Varshini","doi":"10.1109/ICONSTEM.2016.7560952","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560952","url":null,"abstract":"Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. Our project is a cloud robot which is used in industrial and manufacturing environment. It works on a ROS platform. Here we use Raspberry Pi controller to control the various devices attached to it. For testing this implementation, Android phone, camera, DC motor, sensors and a Raspberry pi controller have been used. The movement of the robot is provided by DC motors and the direction is controlled from an android environment using Robot Operating System (ROS). The controller and the receiver end is connected by Wi-Fi. The data input from the gas, temperature and Infra Red sensors is given to the Raspberry Pi controller. A camera is used to provide visual input of the surrounding environment to the robot. The data obtained by the sensors and camera are processed by the controller and stored in cloud.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}