Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032709
Roisul Islam Rumi, Monirul Islam Pavel, Ekhwan Islam, Mohsinul Bari Shakir, M. A. Hossain
The concept of the Internet of Things (IoT) integrated with embedded system and new technologies in the healthcare sector has opened a new era. The natural decrease in physical condition of senior citizens with aging prompts and expansion in frequencies of different diseases, for that reason they need to take medicine on time to improve their health conditions. In this research work we are focusing on the circumstances of senior citizens, we have proposed an IoT enabled smart medicine box equipped with camera for scanning the prescription. After the system scans the prescription through camera, a number of preprocessing techniques are applied on the prescription for better extraction of information. Following that, we applied Maximally Stable Extremal Regions (MSER). Later, string manipulation is done on the extracted text and relevant information is uploaded in the database. Afterwards, our medicine box uses the information to notify the patient using buzzer and shows the medication information on the LCD display. A patient has to verify his identity using fingerprint to take the medicine. Finally, the medicine box dispenses specific medicines and updates the consumption time in the database. Our system will also notify the patient if the dispenser is getting low on medicine using the display by showing message.
{"title":"IoT Enabled Prescription Reading Smart Medicine Dispenser Implementing Maximally Stable Extremal Regions and OCR","authors":"Roisul Islam Rumi, Monirul Islam Pavel, Ekhwan Islam, Mohsinul Bari Shakir, M. A. Hossain","doi":"10.1109/I-SMAC47947.2019.9032709","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032709","url":null,"abstract":"The concept of the Internet of Things (IoT) integrated with embedded system and new technologies in the healthcare sector has opened a new era. The natural decrease in physical condition of senior citizens with aging prompts and expansion in frequencies of different diseases, for that reason they need to take medicine on time to improve their health conditions. In this research work we are focusing on the circumstances of senior citizens, we have proposed an IoT enabled smart medicine box equipped with camera for scanning the prescription. After the system scans the prescription through camera, a number of preprocessing techniques are applied on the prescription for better extraction of information. Following that, we applied Maximally Stable Extremal Regions (MSER). Later, string manipulation is done on the extracted text and relevant information is uploaded in the database. Afterwards, our medicine box uses the information to notify the patient using buzzer and shows the medication information on the LCD display. A patient has to verify his identity using fingerprint to take the medicine. Finally, the medicine box dispenses specific medicines and updates the consumption time in the database. Our system will also notify the patient if the dispenser is getting low on medicine using the display by showing message.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032476
S. Malathi, J. Preethi
In the current world, the usage of car transportation has been increasing rapidly. Adults without proper identity are involved in road transportation, which leads to accidents and becomes a significant concern in our country. World Health Organization surveyed traffic collisions, India has the highest fatality rate of 16.6 per 100,000 people of which Tamil Nadu has more number of road collisions for a decade, and Chennai has more crashes in India than any other city. Based on the scenario of accidents and car thefts, various technologies have been designed for reducing the accident rate and also for identifying the car theft on average. Many researchers take several safety measures with recent technologies such as the clonal selection algorithm, artificial fish swarm algorithm, and intelligent car security system. Recognition of numbers in the license plate plays a significant role in identifying the car theft. This paper describes a detailed review on various technologies through which burglary of the car can be detected, and the rate of accidents can also be controlled.
{"title":"A Review on RFID based Image recognition for Driver Eligibility and Car Security","authors":"S. Malathi, J. Preethi","doi":"10.1109/I-SMAC47947.2019.9032476","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032476","url":null,"abstract":"In the current world, the usage of car transportation has been increasing rapidly. Adults without proper identity are involved in road transportation, which leads to accidents and becomes a significant concern in our country. World Health Organization surveyed traffic collisions, India has the highest fatality rate of 16.6 per 100,000 people of which Tamil Nadu has more number of road collisions for a decade, and Chennai has more crashes in India than any other city. Based on the scenario of accidents and car thefts, various technologies have been designed for reducing the accident rate and also for identifying the car theft on average. Many researchers take several safety measures with recent technologies such as the clonal selection algorithm, artificial fish swarm algorithm, and intelligent car security system. Recognition of numbers in the license plate plays a significant role in identifying the car theft. This paper describes a detailed review on various technologies through which burglary of the car can be detected, and the rate of accidents can also be controlled.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032708
Abhilasha Sharma, S. Bhadauria, Rekha Gupta
This paper proposes the image compression techniques by using multilevel wavelet transform with different wavelet filters and sparsity measurement, which is the essential requirement in the arena of Compressive Sensing (CS). CS is an innovative technique, which is used to state that one can reconstruct the signals from considerably fewer samples as compared to the customary method called Nyquist Sampling theorem. When a vector or matrix has mostly zero pixel value, then it is called sparsity of a matrix and multilevel wavelet transform is used for this purpose.
{"title":"Image Compression and Sparsity Measurement by using Multilevel and Different Wavelet Functions","authors":"Abhilasha Sharma, S. Bhadauria, Rekha Gupta","doi":"10.1109/I-SMAC47947.2019.9032708","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032708","url":null,"abstract":"This paper proposes the image compression techniques by using multilevel wavelet transform with different wavelet filters and sparsity measurement, which is the essential requirement in the arena of Compressive Sensing (CS). CS is an innovative technique, which is used to state that one can reconstruct the signals from considerably fewer samples as compared to the customary method called Nyquist Sampling theorem. When a vector or matrix has mostly zero pixel value, then it is called sparsity of a matrix and multilevel wavelet transform is used for this purpose.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129815886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032706
P. Pattanaik, B. Panigrahi, S. Pati, S. K. Sanyal, J. J. Mahakud
This paper presents fault classification technique based on superimposed components of current signals. The classifier refers sequence networks of different fault type for developing classification logics. The superimposed sequences of current data are used to determine fault type and faulted phases that are selected through superimposed components of phase currents. This method is tested with different system conditions and effect of fault resistance, fault location, fault inception angle and load angle variation are studied. A two terminal 50 Hz system in Matlab®/Simulink™ environment is considered for simulation. The proposed algorithm is easy to implement in microprocessor based relay.
{"title":"Transmission Line Fault Classification Using Superimposed Components","authors":"P. Pattanaik, B. Panigrahi, S. Pati, S. K. Sanyal, J. J. Mahakud","doi":"10.1109/I-SMAC47947.2019.9032706","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032706","url":null,"abstract":"This paper presents fault classification technique based on superimposed components of current signals. The classifier refers sequence networks of different fault type for developing classification logics. The superimposed sequences of current data are used to determine fault type and faulted phases that are selected through superimposed components of phase currents. This method is tested with different system conditions and effect of fault resistance, fault location, fault inception angle and load angle variation are studied. A two terminal 50 Hz system in Matlab®/Simulink™ environment is considered for simulation. The proposed algorithm is easy to implement in microprocessor based relay.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032699
M Zahid Hasan, Dipto Saha, J. Ferdosh, Fernaz Narin Nur, Nazmun Nessa Moon, M. Saifuzzaman
Recent advancements in wireless technologies have evolved the growth of smart systems in day to day life. Nowadays, people are using WiFi connectivity for accessing the Internet or local hub inside home or office. A smart phone based checking system for monitoring class attendance through WiFi signal is developed in this work. Student, Teacher & Admin need to be installing the application. Most challenging part in this system is to make software design and send notification in smartphone. When Admin set specific time and students Smartphone connected with specific WiFi that time then they get notification for class attendance.
{"title":"BSSID based Monitoring Class Attendance System Using WiFi","authors":"M Zahid Hasan, Dipto Saha, J. Ferdosh, Fernaz Narin Nur, Nazmun Nessa Moon, M. Saifuzzaman","doi":"10.1109/I-SMAC47947.2019.9032699","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032699","url":null,"abstract":"Recent advancements in wireless technologies have evolved the growth of smart systems in day to day life. Nowadays, people are using WiFi connectivity for accessing the Internet or local hub inside home or office. A smart phone based checking system for monitoring class attendance through WiFi signal is developed in this work. Student, Teacher & Admin need to be installing the application. Most challenging part in this system is to make software design and send notification in smartphone. When Admin set specific time and students Smartphone connected with specific WiFi that time then they get notification for class attendance.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032635
K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri
Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.
{"title":"A Study of Distnict Image Encryption Techniques","authors":"K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri","doi":"10.1109/I-SMAC47947.2019.9032635","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032635","url":null,"abstract":"Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032594
Liying Shen, Hongyu Liu
The increasing influence of Internet of Things in the intelligent training research under the background of the healthy china is presented in this paper. In this regard, we firstly optimize the traditional IoT system. In the process of construction, various networks have formed many heterogeneous IoT due to the different hardware devices, software modules and even programming methods. We give the 2 core major modifications. (1) Re-design the function call and load mode for the cache feature of the function page. The register relative addressing mode is used instead of the direct addressing mode. By centrally managing the function address in the function page, the read and write operations caused by the cache function page can be effectively reduced. (2) The algorithm based on function page between transfer relations establishment mapping structure drawing, and analyzes each function page using the markov chain in the preliminary stage the possibility which renews, may enhance effectively promotes continuously the preliminary stage buffer hit probability. Then, we apply the idea with the healthy china construction. The intelligent system for the health monitoring is presented. The simulation results prove that the proposed model has the satisfactory performance.
{"title":"Influence of Internet of Things Technology on Intelligent Training Research under the Background of Healthy China","authors":"Liying Shen, Hongyu Liu","doi":"10.1109/I-SMAC47947.2019.9032594","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032594","url":null,"abstract":"The increasing influence of Internet of Things in the intelligent training research under the background of the healthy china is presented in this paper. In this regard, we firstly optimize the traditional IoT system. In the process of construction, various networks have formed many heterogeneous IoT due to the different hardware devices, software modules and even programming methods. We give the 2 core major modifications. (1) Re-design the function call and load mode for the cache feature of the function page. The register relative addressing mode is used instead of the direct addressing mode. By centrally managing the function address in the function page, the read and write operations caused by the cache function page can be effectively reduced. (2) The algorithm based on function page between transfer relations establishment mapping structure drawing, and analyzes each function page using the markov chain in the preliminary stage the possibility which renews, may enhance effectively promotes continuously the preliminary stage buffer hit probability. Then, we apply the idea with the healthy china construction. The intelligent system for the health monitoring is presented. The simulation results prove that the proposed model has the satisfactory performance.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032489
P. Vijayaraman, P. Jayarin
Road traffic causes a lot of inconvenience to the society and environment at an unexpected level. The amount of time being wasted at traffic signals could save a lot of human hours which in turn could help the productivity of the country. The consequences of road traffic not just wastes human hours but pollute the environment at a very high level. Thus addressing road traffic issues could save the economy, people's health and the environment. These will bring in changes like better living conditions and sustainable development in society. This paper proposes an Internet of Things based solution to effectively handle the heavy road traffic conditions.
{"title":"Prediction and Automation of Road Traffic using Internet of Things","authors":"P. Vijayaraman, P. Jayarin","doi":"10.1109/I-SMAC47947.2019.9032489","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032489","url":null,"abstract":"Road traffic causes a lot of inconvenience to the society and environment at an unexpected level. The amount of time being wasted at traffic signals could save a lot of human hours which in turn could help the productivity of the country. The consequences of road traffic not just wastes human hours but pollute the environment at a very high level. Thus addressing road traffic issues could save the economy, people's health and the environment. These will bring in changes like better living conditions and sustainable development in society. This paper proposes an Internet of Things based solution to effectively handle the heavy road traffic conditions.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032690
N. Giri, Rahul Jaisinghani, Rohit Kriplani, Tarun Ramrakhyani, V. Bhatia
A DDoS attack is a spiteful attempt to disrupt legitimate traffic to a server by overwhelming the target with a flood of requests from geographically dispersed systems. Today attackers prefer DDoS attack methods to disrupt target services as they generate GBs to TBs of random data to flood the target. In existing mitigation strategies, because of lack of resources and not having the flexibility to cope with attacks by themselves, they are not considered to be that effective. So effective DDoS mitigation techniques can be provided using emerging technologies such as blockchain and SDN(Software-Defined Networking). We propose an architecture where a smart contract is deployed in a private blockchain, which facilitates a collaborative DDoS mitigation architecture across multiple network domains. Blockchain application is used as an additional security service. With Blockchain, shared protection is enabled among all hosts. With help of smart contracts, rules are distributed among all hosts. In addition, SDN can effectively enable services and security policies dynamically. This mechanism provides ASes(Autonomous Systems) the possibility to deploy their own DPS(DDoS Prevention Service) and there is no need to transfer control of the network to the third party. This paper focuses on the challenges of protecting a hybridized enterprise from the ravages of rapidly evolving Distributed Denial of Service(DDoS) attack.
{"title":"Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain","authors":"N. Giri, Rahul Jaisinghani, Rohit Kriplani, Tarun Ramrakhyani, V. Bhatia","doi":"10.1109/I-SMAC47947.2019.9032690","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032690","url":null,"abstract":"A DDoS attack is a spiteful attempt to disrupt legitimate traffic to a server by overwhelming the target with a flood of requests from geographically dispersed systems. Today attackers prefer DDoS attack methods to disrupt target services as they generate GBs to TBs of random data to flood the target. In existing mitigation strategies, because of lack of resources and not having the flexibility to cope with attacks by themselves, they are not considered to be that effective. So effective DDoS mitigation techniques can be provided using emerging technologies such as blockchain and SDN(Software-Defined Networking). We propose an architecture where a smart contract is deployed in a private blockchain, which facilitates a collaborative DDoS mitigation architecture across multiple network domains. Blockchain application is used as an additional security service. With Blockchain, shared protection is enabled among all hosts. With help of smart contracts, rules are distributed among all hosts. In addition, SDN can effectively enable services and security policies dynamically. This mechanism provides ASes(Autonomous Systems) the possibility to deploy their own DPS(DDoS Prevention Service) and there is no need to transfer control of the network to the third party. This paper focuses on the challenges of protecting a hybridized enterprise from the ravages of rapidly evolving Distributed Denial of Service(DDoS) attack.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/I-SMAC47947.2019.9032653
Harshita Agarwal, Pankaj Tiwari, R. Tiwari
When we attempt to trace a mobile robot relative to its surroundings, this phenomenon is delineated as Robot localization. Localization is regarded as most significant task for an independent robot on the basis of knowledge of the robot's location, decisions about future actions can be derived. In this paper we propose an approach to determine accurate position of mobile robotic devices by integrating data received from different kind of sensors. We use data from accelerometers, gyroscopes and low-cost encoders to get information about robot traffic.
{"title":"Exploiting Sensor Fusion for Mobile Robot Localization","authors":"Harshita Agarwal, Pankaj Tiwari, R. Tiwari","doi":"10.1109/I-SMAC47947.2019.9032653","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032653","url":null,"abstract":"When we attempt to trace a mobile robot relative to its surroundings, this phenomenon is delineated as Robot localization. Localization is regarded as most significant task for an independent robot on the basis of knowledge of the robot's location, decisions about future actions can be derived. In this paper we propose an approach to determine accurate position of mobile robotic devices by integrating data received from different kind of sensors. We use data from accelerometers, gyroscopes and low-cost encoders to get information about robot traffic.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}