Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878688
K. Premkumar, K. Gokila Devi, B. Jamuna, G. Priyadharshini
Implementation of IOT is continued to be a challenging task in various industries. Power consumption for domestic purpose remains to a significant issue in modern era. The quickly growing conception of good home with good meters has its sizable amount of benefits. Our project is to monitor and control the usage of each and individual home appliances effectively. To consume the facility in good home terribly effectively automatic measuring threshold value (AMTV) formula is employed. By using this threshold value in AMTV algorithm, the user will notified about the consumption of electrical power. User can able to view the consumption of power in monthly, weekly and daily basis. Also, we can control each and every electrical appliance of our home from remote area. So the user can limit his usage of the appliances to avoid his EB bill amount without reaching the next slab in tariff table.
{"title":"Prototype Design For Energy Consumption In Smart Home Using IOT","authors":"K. Premkumar, K. Gokila Devi, B. Jamuna, G. Priyadharshini","doi":"10.1109/ICSCAN.2019.8878688","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878688","url":null,"abstract":"Implementation of IOT is continued to be a challenging task in various industries. Power consumption for domestic purpose remains to a significant issue in modern era. The quickly growing conception of good home with good meters has its sizable amount of benefits. Our project is to monitor and control the usage of each and individual home appliances effectively. To consume the facility in good home terribly effectively automatic measuring threshold value (AMTV) formula is employed. By using this threshold value in AMTV algorithm, the user will notified about the consumption of electrical power. User can able to view the consumption of power in monthly, weekly and daily basis. Also, we can control each and every electrical appliance of our home from remote area. So the user can limit his usage of the appliances to avoid his EB bill amount without reaching the next slab in tariff table.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878827
A. Suganthy, V. Prasanna Venkatesan
With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.
随着互联网及其相关技术的出现,组织越来越关注其资源的安全性。访问控制模型有助于在用户访问资源时对其进行访问限制,基于角色的访问控制(Role based Access control, RBAC)模型就是这样一种访问控制机制,用户根据在系统中获得的角色来访问资源。在动态环境中,用户在系统中获得的角色完全取决于用户发送访问请求的上下文。本文探讨了RBAC模型的概念及其扩展。本文的主要目的是通过识别访问控制模型在实际应用中的应用和局限性来分析访问控制模型。
{"title":"An Introspective Study on Dynamic Role-Centric RBAC Models","authors":"A. Suganthy, V. Prasanna Venkatesan","doi":"10.1109/ICSCAN.2019.8878827","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878827","url":null,"abstract":"With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878843
Dibyanshu Patnaik, Harsh Praharaj, K. Prakash, Prof. Krishna Samdani
The global transfer market in the field of football has long been devoid of technology. Over the last two decades, the economic dynamics have completely been changed, and the amount of money which has been pumped has increased exponentially. Valuations for any physical entity with a well-defined set of parameters is a challenge in itself and depends on numerous other things. And doing the same for an individual with varying parameters, based on the source of data, is even more challenging. With this paper, we attempt to find the most optimum way of fetching data of football players and applying the right model on it so as to extract meaningful information, thus reducing the gap between the estimated prices and the Final price. We do so by crowdsourcing the data and applying regression techniques along with Opta index. We also try to find the results using Neural Networks and conclude with a comparison between our models
{"title":"A study of Prediction models for football player valuations by quantifying statistical and economic attributes for the global transfer market","authors":"Dibyanshu Patnaik, Harsh Praharaj, K. Prakash, Prof. Krishna Samdani","doi":"10.1109/ICSCAN.2019.8878843","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878843","url":null,"abstract":"The global transfer market in the field of football has long been devoid of technology. Over the last two decades, the economic dynamics have completely been changed, and the amount of money which has been pumped has increased exponentially. Valuations for any physical entity with a well-defined set of parameters is a challenge in itself and depends on numerous other things. And doing the same for an individual with varying parameters, based on the source of data, is even more challenging. With this paper, we attempt to find the most optimum way of fetching data of football players and applying the right model on it so as to extract meaningful information, thus reducing the gap between the estimated prices and the Final price. We do so by crowdsourcing the data and applying regression techniques along with Opta index. We also try to find the results using Neural Networks and conclude with a comparison between our models","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878735
S. Ananth, Likhitha Varma, K. Sundari, Meghana Koduru, G. Charan, Nibi Maouriyan
Bluetooth, a short range communication standard, helps in sharing information between paired devices with high security, using Frequency Hopping Spread Spectrum (FHSS) technique. When a file is being transmitted, the link between the devices undergo any distraction, and if the link is broken, even after transmitting 70% more amount of data, there will 0% in the receiver device, or it cannot be opened as its not completely received. The proposed idea is to develop an effective communication that will help an individual to retrieve the data, first, by moving the receiving content to permanent memory soon after every N bits received in buffer. Secondly by fixing a timeslot after which the content will be moved to permanent memory. With the amount of information received, using bilinear interpolation technique, the left out data (if it is below 30%) is predicted to complete the process.
{"title":"Analysis of Drawbacks in 802.X and Significant Methodologies on Data Recovery","authors":"S. Ananth, Likhitha Varma, K. Sundari, Meghana Koduru, G. Charan, Nibi Maouriyan","doi":"10.1109/ICSCAN.2019.8878735","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878735","url":null,"abstract":"Bluetooth, a short range communication standard, helps in sharing information between paired devices with high security, using Frequency Hopping Spread Spectrum (FHSS) technique. When a file is being transmitted, the link between the devices undergo any distraction, and if the link is broken, even after transmitting 70% more amount of data, there will 0% in the receiver device, or it cannot be opened as its not completely received. The proposed idea is to develop an effective communication that will help an individual to retrieve the data, first, by moving the receiving content to permanent memory soon after every N bits received in buffer. Secondly by fixing a timeslot after which the content will be moved to permanent memory. With the amount of information received, using bilinear interpolation technique, the left out data (if it is below 30%) is predicted to complete the process.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878836
V. Aravind, M. Anbarasi, P. Maragathavalli, M. Suresh, M. Suresh
In Smart Grid, the Smart meters assume different role with smart capacities so as to satisfy the consumer’s needs. The Smart meter can gauge and impart detailed real time power utilization, empower remote continuous checking and control utilizations. The consumers are given ongoing valuing and analyses devoured data, with its technical information which is transmitted from the network, and furthermore give progressively itemized input on every machine to the consumer. This paper gives a review of the prediction and monitoring with respect to control utilization. It is focused to real time scenario like Smart metering and home apparatus like home sight and sound substance over the power utilization grid.
{"title":"Smart Electricity meter on Real time Price Forecasting and Monitoring system","authors":"V. Aravind, M. Anbarasi, P. Maragathavalli, M. Suresh, M. Suresh","doi":"10.1109/ICSCAN.2019.8878836","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878836","url":null,"abstract":"In Smart Grid, the Smart meters assume different role with smart capacities so as to satisfy the consumer’s needs. The Smart meter can gauge and impart detailed real time power utilization, empower remote continuous checking and control utilizations. The consumers are given ongoing valuing and analyses devoured data, with its technical information which is transmitted from the network, and furthermore give progressively itemized input on every machine to the consumer. This paper gives a review of the prediction and monitoring with respect to control utilization. It is focused to real time scenario like Smart metering and home apparatus like home sight and sound substance over the power utilization grid.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878811
D. Mohanapriya, V. Nandhini, A. Ramyha, T. Vijayasanthy
Cloud computing has become a major computing service platform in the computer science field. However it has drawbacks and challenges related to the privacy of data on cloud. Even though scholars researched over it, proper solutions have not yet been proposed that facilitate searching over encrypted data stored on cloud server. Data breach is also one major threat to cloud storage. In this project, we provide a phrase search scheme using bloom filter to search encrypted data from cloud server using multiple keywords. Besides, we also introduce the Proxy Re-encryption scheme that enables data owner to provide access rights to their desired data users. This scheme assures high speed searching and faster response time at a low cost of communication.
{"title":"Instantaneous Articulate Seeker For Cryptographic Cloud Storage","authors":"D. Mohanapriya, V. Nandhini, A. Ramyha, T. Vijayasanthy","doi":"10.1109/ICSCAN.2019.8878811","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878811","url":null,"abstract":"Cloud computing has become a major computing service platform in the computer science field. However it has drawbacks and challenges related to the privacy of data on cloud. Even though scholars researched over it, proper solutions have not yet been proposed that facilitate searching over encrypted data stored on cloud server. Data breach is also one major threat to cloud storage. In this project, we provide a phrase search scheme using bloom filter to search encrypted data from cloud server using multiple keywords. Besides, we also introduce the Proxy Re-encryption scheme that enables data owner to provide access rights to their desired data users. This scheme assures high speed searching and faster response time at a low cost of communication.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878849
G. Shanmugasundaram, A. Kalaimathy, M. Johnvee, S. Pavithra
Detection of fake votes is a major problem in current voting system. Traditionally, Electronic voting machines have been developed to improve the reliability of the electoral process. Generally EVM’s requires more manpower. Some of the recent technologies have been contributed much to improve the Election process with different voting concepts. But still there is a difficulty in detecting the fake votes. In this article we examine the various concepts to achieve transparency over the database and also explores various key challenges in digital voting.
{"title":"Perspective Analysis of Digital Voting Systems","authors":"G. Shanmugasundaram, A. Kalaimathy, M. Johnvee, S. Pavithra","doi":"10.1109/ICSCAN.2019.8878849","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878849","url":null,"abstract":"Detection of fake votes is a major problem in current voting system. Traditionally, Electronic voting machines have been developed to improve the reliability of the electoral process. Generally EVM’s requires more manpower. Some of the recent technologies have been contributed much to improve the Election process with different voting concepts. But still there is a difficulty in detecting the fake votes. In this article we examine the various concepts to achieve transparency over the database and also explores various key challenges in digital voting.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878824
M. Shanmugam, V. Venkatesan, R. Abinaya, E. Udayasri, C. Sharanya
Augmented Reality (AR) is a technology that provides the composite view of an environment, thus presenting quite amazing experience for the user who utilizes the applications that apply it. Coloring is always fun and if Augmented Reality is embedded with coloring, then it is definitely an amusement. Coloring owns an important part in autistic children as they detect colors with higher intensity and have strong ability to associate colors with entities. Hence, we will create a model that will deploy Augmented Reality, providing a learning experience along with coloring to engage the autistic children at home.
{"title":"Tinge within the Fringe","authors":"M. Shanmugam, V. Venkatesan, R. Abinaya, E. Udayasri, C. Sharanya","doi":"10.1109/ICSCAN.2019.8878824","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878824","url":null,"abstract":"Augmented Reality (AR) is a technology that provides the composite view of an environment, thus presenting quite amazing experience for the user who utilizes the applications that apply it. Coloring is always fun and if Augmented Reality is embedded with coloring, then it is definitely an amusement. Coloring owns an important part in autistic children as they detect colors with higher intensity and have strong ability to associate colors with entities. Hence, we will create a model that will deploy Augmented Reality, providing a learning experience along with coloring to engage the autistic children at home.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878753
H. Krishnan, P. K., G. M, M. N, S. Vijayananth, P. Sudhakar
Recognizable proof of plant ailment is troublesome in horticulture field. In the event that recognizable proof is mistaken, at that point there is an enormous misfortune on the generation of yield and efficient estimation of market. Leaf infection recognition requires tremendous sum of work, information in the plant sicknesses, and furthermore require the additionally preparing time. So we can utilize picture handling for recognizable proof of leaf infection in MATLAB. Recognizable proof of ailment pursues the means like stacking the picture, differentiate upgrade, changing over RGB to HSI, extricating of highlights and SVM.
{"title":"Plant disease analysis using image processing in MATLAB","authors":"H. Krishnan, P. K., G. M, M. N, S. Vijayananth, P. Sudhakar","doi":"10.1109/ICSCAN.2019.8878753","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878753","url":null,"abstract":"Recognizable proof of plant ailment is troublesome in horticulture field. In the event that recognizable proof is mistaken, at that point there is an enormous misfortune on the generation of yield and efficient estimation of market. Leaf infection recognition requires tremendous sum of work, information in the plant sicknesses, and furthermore require the additionally preparing time. So we can utilize picture handling for recognizable proof of leaf infection in MATLAB. Recognizable proof of ailment pursues the means like stacking the picture, differentiate upgrade, changing over RGB to HSI, extricating of highlights and SVM.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICSCAN.2019.8878773
S. Pariselvam, M. Swarnamukhi
Cloud-based Personal Health Record systems (CB-PHR)’s majorly used for management of patient’s individual health records. Cloud computing are providing real-time healthcare data sharing in a cost-effective manner. Data security and privacy of maintaining personal health records are main obstacles for the wide adoption of CB-PHR systems, since health information is highly sensitive, so it needed to be protected in highly secured manner. In this paper, we propose a novel scheme using Data Encryption Standard (DES) technique for maintaining health record based on challenges and various securities in existing system. In this scheme, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing with a single data query submitted by data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content.
{"title":"Encrypted Cloud Based Personal Health Record Management Using DES Scheme","authors":"S. Pariselvam, M. Swarnamukhi","doi":"10.1109/ICSCAN.2019.8878773","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878773","url":null,"abstract":"Cloud-based Personal Health Record systems (CB-PHR)’s majorly used for management of patient’s individual health records. Cloud computing are providing real-time healthcare data sharing in a cost-effective manner. Data security and privacy of maintaining personal health records are main obstacles for the wide adoption of CB-PHR systems, since health information is highly sensitive, so it needed to be protected in highly secured manner. In this paper, we propose a novel scheme using Data Encryption Standard (DES) technique for maintaining health record based on challenges and various securities in existing system. In this scheme, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing with a single data query submitted by data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121299277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}