Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856037
S. Balaji, R. Scholar
Image processing is a method of extracting some useful information by converting image into digital inform by performing some operations on it. Object detection and tracking are the task that is important and challenging such as video surveillance and vehicle navigation. Video surveillance is a technology which works in dynamic environment in various events such as sports, public safety, and management of traffic. This paper reviews the various challenges and aspects of detection and tracking of objects.
{"title":"A survey on moving object tracking using image processing","authors":"S. Balaji, R. Scholar","doi":"10.1109/ISCO.2017.7856037","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856037","url":null,"abstract":"Image processing is a method of extracting some useful information by converting image into digital inform by performing some operations on it. Object detection and tracking are the task that is important and challenging such as video surveillance and vehicle navigation. Video surveillance is a technology which works in dynamic environment in various events such as sports, public safety, and management of traffic. This paper reviews the various challenges and aspects of detection and tracking of objects.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"33 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120815616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856012
Saurabh Sharma, S. Gambhir
While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the efficient and secure delivery of data CRCMD&R (Cluster and Reputation based cooperative malicious node Detection and Removal) scheme is proposed in this paper. CRCMD&R suggests organising the MANET into a number of clusters and each node in the network has a specific prime number which acts as Node Identity. CRCMD&R uses Legitimacy value table and Reputation level table maintained by each node in the network to find and use a safe route between a source and a destination. The cornerstones of our work are the various metrics which can be further calculated by the values collected in Legitimacy value table and Reputation level table. Depending upon these metrics the cluster head nodes exclude or include the nodes from the discovered route and select the most reliable route to a specific destination.
{"title":"CRCMD&R: Cluster and Reputation based cooperative malicious node Detection & Removal scheme in MANETs","authors":"Saurabh Sharma, S. Gambhir","doi":"10.1109/ISCO.2017.7856012","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856012","url":null,"abstract":"While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the efficient and secure delivery of data CRCMD&R (Cluster and Reputation based cooperative malicious node Detection and Removal) scheme is proposed in this paper. CRCMD&R suggests organising the MANET into a number of clusters and each node in the network has a specific prime number which acts as Node Identity. CRCMD&R uses Legitimacy value table and Reputation level table maintained by each node in the network to find and use a safe route between a source and a destination. The cornerstones of our work are the various metrics which can be further calculated by the values collected in Legitimacy value table and Reputation level table. Depending upon these metrics the cluster head nodes exclude or include the nodes from the discovered route and select the most reliable route to a specific destination.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856043
P. Newton, R. N. Rio
Mobile Ad-hoc Networks (MANETs) is one kind of wireless mobile network. It helps to communicate between the mobile nodes (devices) any time and in any location. MANETs can change the locations and has the ability to discover the path dynamically. In other words, topology is updated rapidly due to the dynamic nature of the nodes. There are many issues associated with MANETs such as fading, multiuser interference, frequent topology change, optimum routing, etc., that affect the efficient data transfer. This paper proactively selects best optimum path among the multiple paths. Ultimately, the outcomes of the proposed technique, REHDIS increases the speed of data transfer, reduces the End-to-End delay, produces less Packet Drop and increases Packet Delivery Ratio. REHDIS has been evaluated using Network Simulator - 2.34(NS-2.34).
{"title":"REHDIS: Refined Hamming Distance technique to minimize data transfer delay in Mobile Ad-hoc Networks","authors":"P. Newton, R. N. Rio","doi":"10.1109/ISCO.2017.7856043","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856043","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) is one kind of wireless mobile network. It helps to communicate between the mobile nodes (devices) any time and in any location. MANETs can change the locations and has the ability to discover the path dynamically. In other words, topology is updated rapidly due to the dynamic nature of the nodes. There are many issues associated with MANETs such as fading, multiuser interference, frequent topology change, optimum routing, etc., that affect the efficient data transfer. This paper proactively selects best optimum path among the multiple paths. Ultimately, the outcomes of the proposed technique, REHDIS increases the speed of data transfer, reduces the End-to-End delay, produces less Packet Drop and increases Packet Delivery Ratio. REHDIS has been evaluated using Network Simulator - 2.34(NS-2.34).","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855995
V. Kanimozhi, S. Karthik
Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.
{"title":"A survey on multi-constrained optimal path selection schemes and authentication schemes for VANET","authors":"V. Kanimozhi, S. Karthik","doi":"10.1109/ISCO.2017.7855995","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855995","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855652
Dhruba Kumar, P. Bhowmik
Islanding is a special type of open circuit fault where the distributed resource continues to feed local loads during loss of mains situation. This paper develops a technique to detect islanding in a six bus power system. The input to the technique is dependent on synchrophasor measurement. The decision made in the technique is based on IEC62116 standards and predefined threshold and of current phasors. Synchrophasor based islanding detection can be considered as communication based islanding detection where measurements from both islanded region and grid connected region are utilized for islanding detection. PMU based islanding detection is highly recommended to predetermine cascading line outage and to check voltage profile of islanded region.
{"title":"Wide area islanding detection using Phasor Measurement Unit","authors":"Dhruba Kumar, P. Bhowmik","doi":"10.1109/ISCO.2017.7855652","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855652","url":null,"abstract":"Islanding is a special type of open circuit fault where the distributed resource continues to feed local loads during loss of mains situation. This paper develops a technique to detect islanding in a six bus power system. The input to the technique is dependent on synchrophasor measurement. The decision made in the technique is based on IEC62116 standards and predefined threshold and of current phasors. Synchrophasor based islanding detection can be considered as communication based islanding detection where measurements from both islanded region and grid connected region are utilized for islanding detection. PMU based islanding detection is highly recommended to predetermine cascading line outage and to check voltage profile of islanded region.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130051908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856016
Avagaddi Prasad, J. Edward
This paper presents a survey on location of faults in overhead transmission lines using artificial neural networks. The demand for electricity is raising day by day, with proportional to increase of population, we need to generate more power to meet out the demand. It's a challenging task for power engineers to provide good quality of power to the consumers as per their requirement. In electrical power system maximum number of faults occurs in overhead transmission lines. Fault location is one of the major tasks in fault analysis. So the upgradation of old protective relaying systems is necessary due to the unexpected changes in electrical power systems. This survey presents the importance of artificial neural networks for fault location, because it has many advantages compared to other soft computing techniques namely fuzzy logic approach, wavelet technique, support vector machine and other conventional methods.
{"title":"Importance of artificial neural networks for location of faults in transmission systems: A survey","authors":"Avagaddi Prasad, J. Edward","doi":"10.1109/ISCO.2017.7856016","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856016","url":null,"abstract":"This paper presents a survey on location of faults in overhead transmission lines using artificial neural networks. The demand for electricity is raising day by day, with proportional to increase of population, we need to generate more power to meet out the demand. It's a challenging task for power engineers to provide good quality of power to the consumers as per their requirement. In electrical power system maximum number of faults occurs in overhead transmission lines. Fault location is one of the major tasks in fault analysis. So the upgradation of old protective relaying systems is necessary due to the unexpected changes in electrical power systems. This survey presents the importance of artificial neural networks for fault location, because it has many advantages compared to other soft computing techniques namely fuzzy logic approach, wavelet technique, support vector machine and other conventional methods.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856031
Manu A R, V. K. Agrawal, K. N. B. Murthy
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility perks up the advanced facilities to the existing assets. The security and privacy controlling of this utility (data centers, and data storage) is uniformly, vested with service patrons and suppliers, both stakeholders with shared responsibility of security implementation using multilateral relationship among them. In this paper, we propose the ontology of this vicinity, which demonstrates an interrelated layered architecture for a secured co-operative galactic computing utility. This computing architecture is proposed empirically based on our understanding and survey with various industry/academic professionals. We tried to understand the challenges they faced while using the cloud system. So, we conceptually propose this ally architecture which consists of multi-layer with multi-lateral co-operative multi-factor balanced security framework with common business interests along with shared responsibility among the stakeholders. Also we try to prove empirically multilateral balanced security which in-turn increases the strong defense measures among the multi-laterally allied bunch of users.
{"title":"An empirical hunt for ally co-operative cloud computing utility","authors":"Manu A R, V. K. Agrawal, K. N. B. Murthy","doi":"10.1109/ISCO.2017.7856031","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856031","url":null,"abstract":"A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility perks up the advanced facilities to the existing assets. The security and privacy controlling of this utility (data centers, and data storage) is uniformly, vested with service patrons and suppliers, both stakeholders with shared responsibility of security implementation using multilateral relationship among them. In this paper, we propose the ontology of this vicinity, which demonstrates an interrelated layered architecture for a secured co-operative galactic computing utility. This computing architecture is proposed empirically based on our understanding and survey with various industry/academic professionals. We tried to understand the challenges they faced while using the cloud system. So, we conceptually propose this ally architecture which consists of multi-layer with multi-lateral co-operative multi-factor balanced security framework with common business interests along with shared responsibility among the stakeholders. Also we try to prove empirically multilateral balanced security which in-turn increases the strong defense measures among the multi-laterally allied bunch of users.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856028
S. Joshi, Niko Maas, D. Schramm
Driver evaluation and performance monitoring is crucial for safety and risk assessment. This paper proposes a novel algorithm for evaluating driver performance using vehicle state data. This indirect method of evaluation has the advantage of being unobtrusive and cheap as it uses only the easily accessible real time vehicle data. The proposed algorithm can eliminate subjectivity and automate the evaluation process. The driver being evaluated is asked to maintain lane center and drive smoothly while steering input, pedal position and acceleration data is collected. Steering activity is evaluated by defining an optimal input for lane keeping and comparing driver's input. Wheel slip and cornering conditions are considered for pedal activity evaluation. Vehicle acceleration data is used for estimating passenger comfort. An instantaneous and average index of performance is generated in real time as a final evaluation metric combining the three evaluation criteria. The Algorithm was validated using a vehicle simulator and the results are discussed.
{"title":"A vehicle dynamics based algorithm for driver evaluation","authors":"S. Joshi, Niko Maas, D. Schramm","doi":"10.1109/ISCO.2017.7856028","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856028","url":null,"abstract":"Driver evaluation and performance monitoring is crucial for safety and risk assessment. This paper proposes a novel algorithm for evaluating driver performance using vehicle state data. This indirect method of evaluation has the advantage of being unobtrusive and cheap as it uses only the easily accessible real time vehicle data. The proposed algorithm can eliminate subjectivity and automate the evaluation process. The driver being evaluated is asked to maintain lane center and drive smoothly while steering input, pedal position and acceleration data is collected. Steering activity is evaluated by defining an optimal input for lane keeping and comparing driver's input. Wheel slip and cornering conditions are considered for pedal activity evaluation. Vehicle acceleration data is used for estimating passenger comfort. An instantaneous and average index of performance is generated in real time as a final evaluation metric combining the three evaluation criteria. The Algorithm was validated using a vehicle simulator and the results are discussed.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7855962
Harsh Lal, Gaurav Pahwa
Code review is systematic examination of a software system's source code. It is intended to find mistakes overlooked in the initial development phase, improving the overall quality of software and reducing the risk of bugs among other benefits. Reviews are done in various forms such as pair programming, informal walk-through, and formal inspections. Code review has been found to accelerate and streamline the process of software development like very few other practices in software development can. In this paper we propose a machine learning approach for the code reviews in a software system. This would help in faster and a cleaner reviews of the checked in code. The proposed approach is evaluated for feasibility on an open source system eclipse. [1], [2], [3]
{"title":"Code review analysis of software system using machine learning techniques","authors":"Harsh Lal, Gaurav Pahwa","doi":"10.1109/ISCO.2017.7855962","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7855962","url":null,"abstract":"Code review is systematic examination of a software system's source code. It is intended to find mistakes overlooked in the initial development phase, improving the overall quality of software and reducing the risk of bugs among other benefits. Reviews are done in various forms such as pair programming, informal walk-through, and formal inspections. Code review has been found to accelerate and streamline the process of software development like very few other practices in software development can. In this paper we propose a machine learning approach for the code reviews in a software system. This would help in faster and a cleaner reviews of the checked in code. The proposed approach is evaluated for feasibility on an open source system eclipse. [1], [2], [3]","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"17 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2017.7856036
Shweta A.S
The task to discover useful systems (electronic home appliances) to simplify our lives, is one of the main purpose of intelligent systems. Intelligent appliances with multimedia capability have been emerging into our daily life. Thanks to the fast advance of computing technology. Smart home is one of the most prominent areas of intelligent appliances. Kitchen is one of the places where such intelligent appliances have been used. At the same time it has been a practice for all of us to use the junk foods, or too old vegetables and fruits in our daily life due to the busy scheduled life that we lead. Or some possibilities where we do not remember the vegetables/fruits we have not been eating for a long time. This in turn leads to lack of nutrition or, some hazardous infections or might disturb the imunity power in each of us. Why don't we come across an attempt to have a device to indicate what we have (food/vegetables/fruits) and how old is it. Of course it is not possible for us to determine the exact age of the vegetable, since it is to be calculated from the day it is grown, but yet we could come across one small effort to at-least have an eye on how old is the vegetable from the day it was fetched from the vendor. Existing systems used barcode or RFID scanning to keep track of the stock. The products currently available are expensive as the user has to purchase the whole refrigerator. The Intelligent Refrigerator module is designed to convert any existing refrigerator into an intelligent cost effective appliance using ARTIFICIAL INTELLIGENCE. The intelligent refrigerator is capable of sensing and monitoring its contents and counts the age of the contents. The smart refrigerator is also able to remotely notify the user about old products via SMS (Short Message Service). Additional functionality includes indication of items we have not been eating for long time. The core functionality of the intelligent refrigerator is to maintain, with minimum effort, an inventory list of food items which might want to be purchased as soon as they turn too old. As a result, the user is notified every day about the count and age of vegetables, and the unloaded vegetables.
{"title":"Intelligent refrigerator using ARTIFICIAL INTELLIGENCE","authors":"Shweta A.S","doi":"10.1109/ISCO.2017.7856036","DOIUrl":"https://doi.org/10.1109/ISCO.2017.7856036","url":null,"abstract":"The task to discover useful systems (electronic home appliances) to simplify our lives, is one of the main purpose of intelligent systems. Intelligent appliances with multimedia capability have been emerging into our daily life. Thanks to the fast advance of computing technology. Smart home is one of the most prominent areas of intelligent appliances. Kitchen is one of the places where such intelligent appliances have been used. At the same time it has been a practice for all of us to use the junk foods, or too old vegetables and fruits in our daily life due to the busy scheduled life that we lead. Or some possibilities where we do not remember the vegetables/fruits we have not been eating for a long time. This in turn leads to lack of nutrition or, some hazardous infections or might disturb the imunity power in each of us. Why don't we come across an attempt to have a device to indicate what we have (food/vegetables/fruits) and how old is it. Of course it is not possible for us to determine the exact age of the vegetable, since it is to be calculated from the day it is grown, but yet we could come across one small effort to at-least have an eye on how old is the vegetable from the day it was fetched from the vendor. Existing systems used barcode or RFID scanning to keep track of the stock. The products currently available are expensive as the user has to purchase the whole refrigerator. The Intelligent Refrigerator module is designed to convert any existing refrigerator into an intelligent cost effective appliance using ARTIFICIAL INTELLIGENCE. The intelligent refrigerator is capable of sensing and monitoring its contents and counts the age of the contents. The smart refrigerator is also able to remotely notify the user about old products via SMS (Short Message Service). Additional functionality includes indication of items we have not been eating for long time. The core functionality of the intelligent refrigerator is to maintain, with minimum effort, an inventory list of food items which might want to be purchased as soon as they turn too old. As a result, the user is notified every day about the count and age of vegetables, and the unloaded vegetables.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}