Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916655
B. Kamalakannan, K. Naresh, P. Sakthivel
This paper presents how the protection of innocent fishermen's from the shooting and arresting by the other country navy is possible. An Embedded technology which uses GSM (Global System for Mobile), and LPC2148 Arm microcontroller and RFID (Radio Frequency IDentification) can avoid this. There are three boundaries of borders taken. Final state boundary will be the border between the two countries and other two borders before that comes under the parental country circumstances. First two border crossing will be monitored by Indian government. The fishermen's are warned by the warning devices such as speaker (a buzzer) and an LCD display while they crossing the first two borders. If warning system fails there is another option. While crossing third border, the motor in the boat turns off automatically. Now Information about the fishermen's will be acknowledged to both the government.
{"title":"Protecting fishermen's by detecting and warning them while crossing sea borders using GSM and RFID technologies","authors":"B. Kamalakannan, K. Naresh, P. Sakthivel","doi":"10.1109/GET.2016.7916655","DOIUrl":"https://doi.org/10.1109/GET.2016.7916655","url":null,"abstract":"This paper presents how the protection of innocent fishermen's from the shooting and arresting by the other country navy is possible. An Embedded technology which uses GSM (Global System for Mobile), and LPC2148 Arm microcontroller and RFID (Radio Frequency IDentification) can avoid this. There are three boundaries of borders taken. Final state boundary will be the border between the two countries and other two borders before that comes under the parental country circumstances. First two border crossing will be monitored by Indian government. The fishermen's are warned by the warning devices such as speaker (a buzzer) and an LCD display while they crossing the first two borders. If warning system fails there is another option. While crossing third border, the motor in the boat turns off automatically. Now Information about the fishermen's will be acknowledged to both the government.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916804
Divya Vijay, U. Sabura Banu
An attitude control system is proposed for an assured crew re-entry vehicle, where the control law is based PID controller tuned using Simulated Annealing. The controller designed ensures robustness properties with respect to parametric uncertainties and environmental disturbances. The system state remains in the neighborhood of a reference attitude and the control signal is close to a well-defined equivalent control. To ensure the effectiveness of the system, the PID controller tuned using Simulated Annealing is compared with conventional PID controller results. The reference attitude is obtained in terms of the command angles and the outputs given by the trajectory controller. A pulse width pulse frequency (PWPF) modulator is designed to modulate the thrust torque commanded by the attitude controller. The simulation results show the effectiveness of the proposed method in meeting the various requirement parameters.
{"title":"PID controller tuned using Simulated Annealing for assured crew re-entry vehicle with PWPF thruster firing","authors":"Divya Vijay, U. Sabura Banu","doi":"10.1109/GET.2016.7916804","DOIUrl":"https://doi.org/10.1109/GET.2016.7916804","url":null,"abstract":"An attitude control system is proposed for an assured crew re-entry vehicle, where the control law is based PID controller tuned using Simulated Annealing. The controller designed ensures robustness properties with respect to parametric uncertainties and environmental disturbances. The system state remains in the neighborhood of a reference attitude and the control signal is close to a well-defined equivalent control. To ensure the effectiveness of the system, the PID controller tuned using Simulated Annealing is compared with conventional PID controller results. The reference attitude is obtained in terms of the command angles and the outputs given by the trajectory controller. A pulse width pulse frequency (PWPF) modulator is designed to modulate the thrust torque commanded by the attitude controller. The simulation results show the effectiveness of the proposed method in meeting the various requirement parameters.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916815
Shaily Agarwal, Kalyan Acharjya, S. Sharma, Shiksha Pandita
One of the major consequence of diabetic disease is diabetic retinopathy (DR), which effect on retina of diabetic people and the critical phase of diabetic retinopathy can lead to permanent vision loss. The early detection and monitoring of diabetic retinopathy is important to prevent it or for effective treatment, but the problem associated to early detection of DR is very minor changes on retinal fundus image, it includes-hemorrhages, exudates, red lesion, cotton wool spots, drusen etc. To early detection or screening of changes on retinal image is very challenging and time consuming for ophthalmologists, as the size and color changes are initially matched with local blood vessels in retinal image. This paper presented the exhaustive review on various latest trends on computer aided diagnosis screening systems to automated and integrated DR detection and monitoring system; the detection result will help out to take the fast decision for automatic referrals to the ompthologists. This paper also presented the comparison the performance of various predecessor DR detection systems based on quality metrics, such as sensitivity, specificity and AUC (Area under Curve). This review paper will assist to researcher to quickly analyze the latest trend of various DR screening methodologists in medical engineering.
{"title":"Automatic computer aided diagnosis for early diabetic retinopathy detection and monitoring: A comprehensive review","authors":"Shaily Agarwal, Kalyan Acharjya, S. Sharma, Shiksha Pandita","doi":"10.1109/GET.2016.7916815","DOIUrl":"https://doi.org/10.1109/GET.2016.7916815","url":null,"abstract":"One of the major consequence of diabetic disease is diabetic retinopathy (DR), which effect on retina of diabetic people and the critical phase of diabetic retinopathy can lead to permanent vision loss. The early detection and monitoring of diabetic retinopathy is important to prevent it or for effective treatment, but the problem associated to early detection of DR is very minor changes on retinal fundus image, it includes-hemorrhages, exudates, red lesion, cotton wool spots, drusen etc. To early detection or screening of changes on retinal image is very challenging and time consuming for ophthalmologists, as the size and color changes are initially matched with local blood vessels in retinal image. This paper presented the exhaustive review on various latest trends on computer aided diagnosis screening systems to automated and integrated DR detection and monitoring system; the detection result will help out to take the fast decision for automatic referrals to the ompthologists. This paper also presented the comparison the performance of various predecessor DR detection systems based on quality metrics, such as sensitivity, specificity and AUC (Area under Curve). This review paper will assist to researcher to quickly analyze the latest trend of various DR screening methodologists in medical engineering.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916664
Sandeep Gupta, Abhishek Mathur
Opportunistic networks have gained popularity, when we come to conclusion that there are several things which MANET can't handle. Delay tolerant is one of the concepts of opportunistic network in which we connect those nodes which are actually not connected. In our work we are arranging nodes in a hexagonal patterns, the one main node in this pattern is moves in the fixed area i.e. the region that is covered by the ship. This node receives signals from the ship, satellite and sonar device in turn the node amplifies the received signal. Our work is conducted using Spray and wait routing protocol and enhances the protocol. The opportunistic network environment tool is used for simulation
{"title":"Improved spray & wait routing protocol for under water acoustic network","authors":"Sandeep Gupta, Abhishek Mathur","doi":"10.1109/GET.2016.7916664","DOIUrl":"https://doi.org/10.1109/GET.2016.7916664","url":null,"abstract":"Opportunistic networks have gained popularity, when we come to conclusion that there are several things which MANET can't handle. Delay tolerant is one of the concepts of opportunistic network in which we connect those nodes which are actually not connected. In our work we are arranging nodes in a hexagonal patterns, the one main node in this pattern is moves in the fixed area i.e. the region that is covered by the ship. This node receives signals from the ship, satellite and sonar device in turn the node amplifies the received signal. Our work is conducted using Spray and wait routing protocol and enhances the protocol. The opportunistic network environment tool is used for simulation","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116427974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916769
Bharti S. Yerne, Fazeel I. Z. Qureshi
Up till now numerous shoulder surfing safe graphical watchword plans have been proposed. On the other hand, as the greater part of the clients are more acquainted with literary passwords than the immaculate graphical passwords plot hence the content based graphical secret key plans have been proposed. However, none of the current content based shoulder surfing safe graphical watchword plans is both secure and sufficiently proficient. In this paper, we propose an enhanced content based shoulder using so as to surf safe graphical secret key plan hues in view of that the client can without much of a stretch and proficiently login framework. Next, we give the security and ease of use of the proposed plan, and demonstrate the resistance of the proposed plan to shoulder surfing and incidental login. Presently we propose a system that is 3D secret word with session based strategy for login security in advanced mobile phone implies we are going to utilize two level confirmations that is basic content based shoulder surfing graphical watchword as a first level. At whatever point we are going to login in advanced mobile phone there is one circle happen with numerous arbitrary shading and hover isolated into eight part which contain characters and alphanumerical which we select as a secret key. Furthermore, 3D pictures as a second level in which at whatever point client going to begin a session in advanced cell, number of time 3D pictures will be change yet question will be same which is utilized as a secret key on 3D pictures, which give more security to the client in PDA.
{"title":"Design 3D Password with session based technique for login security in Smartphone","authors":"Bharti S. Yerne, Fazeel I. Z. Qureshi","doi":"10.1109/GET.2016.7916769","DOIUrl":"https://doi.org/10.1109/GET.2016.7916769","url":null,"abstract":"Up till now numerous shoulder surfing safe graphical watchword plans have been proposed. On the other hand, as the greater part of the clients are more acquainted with literary passwords than the immaculate graphical passwords plot hence the content based graphical secret key plans have been proposed. However, none of the current content based shoulder surfing safe graphical watchword plans is both secure and sufficiently proficient. In this paper, we propose an enhanced content based shoulder using so as to surf safe graphical secret key plan hues in view of that the client can without much of a stretch and proficiently login framework. Next, we give the security and ease of use of the proposed plan, and demonstrate the resistance of the proposed plan to shoulder surfing and incidental login. Presently we propose a system that is 3D secret word with session based strategy for login security in advanced mobile phone implies we are going to utilize two level confirmations that is basic content based shoulder surfing graphical watchword as a first level. At whatever point we are going to login in advanced mobile phone there is one circle happen with numerous arbitrary shading and hover isolated into eight part which contain characters and alphanumerical which we select as a secret key. Furthermore, 3D pictures as a second level in which at whatever point client going to begin a session in advanced cell, number of time 3D pictures will be change yet question will be same which is utilized as a secret key on 3D pictures, which give more security to the client in PDA.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916826
Anupriya K, J. E., Jerrin Yomas, H. P, Tulasi Dwarakanath
Internet of Things (IoT) is the latest technology in this era of wireless communication, which connects the devices to internet for control and monitoring applications. The complete world is now looking forward to use this technology at cities and in other fields, which make them smart. The main objective of this work is to identify communication modules under sub GHz that can provide coverage in the range of few kilometers under the license free spectrum. A single protocol cannot satisfy all the requirements together. So the advantages of more than one standards/ protocols are combined. Few main standards that help in this requirement are LoRa, Weightless, IEEE802.22, Sub GHz spectrum operation etc. The theoretical analysis of all these standards is presented in this paper. And how the sub GHz technology with the ZigBee protocol can be integrated in order to achieve a better transmission scenario is also described.
物联网(IoT)是无线通信时代的最新技术,它将设备连接到互联网以进行控制和监控应用。整个世界现在都期待着在城市和其他领域使用这项技术,这将使它们变得智能。这项工作的主要目标是确定在GHz以下的通信模块,这些模块可以在免许可频谱下提供几公里范围的覆盖。单个协议不能同时满足所有需求。因此,多个标准/协议的优点被结合在一起。帮助满足这一要求的几个主要标准是LoRa, Weightless, IEEE802.22, Sub GHz频谱操作等。本文对这些标准进行了理论分析。并介绍了如何将sub - GHz技术与ZigBee协议相结合,以实现更好的传输场景。
{"title":"Integrating ZigBee and Sub GHz devices for long range networks","authors":"Anupriya K, J. E., Jerrin Yomas, H. P, Tulasi Dwarakanath","doi":"10.1109/GET.2016.7916826","DOIUrl":"https://doi.org/10.1109/GET.2016.7916826","url":null,"abstract":"Internet of Things (IoT) is the latest technology in this era of wireless communication, which connects the devices to internet for control and monitoring applications. The complete world is now looking forward to use this technology at cities and in other fields, which make them smart. The main objective of this work is to identify communication modules under sub GHz that can provide coverage in the range of few kilometers under the license free spectrum. A single protocol cannot satisfy all the requirements together. So the advantages of more than one standards/ protocols are combined. Few main standards that help in this requirement are LoRa, Weightless, IEEE802.22, Sub GHz spectrum operation etc. The theoretical analysis of all these standards is presented in this paper. And how the sub GHz technology with the ZigBee protocol can be integrated in order to achieve a better transmission scenario is also described.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916660
P. Anitha, P. Parvathi
An inventory model is considered for deteriorating items with a variable rate of deterioration, where deterioration means decay, damage or spoilage such that the item cannot be used for its original purpose. An EPQ model for Weibull deteriorating items with stock dependent demand rate is developed in this paper in fuzzy environment. Three different cases with complete, partial, no backlogging are considered. The optimal analytical model is derived. To retain the confidence of the buyers the machine reliability, flexibility and packaging cost are considered. Mathematical model has been presented to find the optimum total cost. The holding cost, setup cost, deterioration cost, labour cost for packing, material cost for packing, shortage cost, production cost involved in this model are taken as pentagonal fuzzy numbers. Graded mean representation method is used to defuzzify the model. To validate the optimal solution, suitable numerical example has been discussed. The effect of variations in the optimal solution with respect to the change in one parameter at a time is analyzed and sensitivity analysis is carried out.
{"title":"An inventory model with stock dependent demand, two parameter Weibull distribution deterioration in a fuzzy environment","authors":"P. Anitha, P. Parvathi","doi":"10.1109/GET.2016.7916660","DOIUrl":"https://doi.org/10.1109/GET.2016.7916660","url":null,"abstract":"An inventory model is considered for deteriorating items with a variable rate of deterioration, where deterioration means decay, damage or spoilage such that the item cannot be used for its original purpose. An EPQ model for Weibull deteriorating items with stock dependent demand rate is developed in this paper in fuzzy environment. Three different cases with complete, partial, no backlogging are considered. The optimal analytical model is derived. To retain the confidence of the buyers the machine reliability, flexibility and packaging cost are considered. Mathematical model has been presented to find the optimum total cost. The holding cost, setup cost, deterioration cost, labour cost for packing, material cost for packing, shortage cost, production cost involved in this model are taken as pentagonal fuzzy numbers. Graded mean representation method is used to defuzzify the model. To validate the optimal solution, suitable numerical example has been discussed. The effect of variations in the optimal solution with respect to the change in one parameter at a time is analyzed and sensitivity analysis is carried out.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128637711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916806
R. K, Nidhi Gupta, Harshendra N Shet
The commercial building sector accounts for 15% of the electricity demand and is set increase three fold by the year 2030 [1]. This increase in demand coupled with rising energy cost and increased green house emissions offer not only challenges but also opportunities to employ energy efficient design practices. This paper investigates the methods to reduce the energy consumption of a commercial building by incorporating energy conservation techniques in the design stage of the building. By comparing the design buildings energy use with a baseline building, a percentage estimate of the energy savings can be obtained. Energy modeling tool eQuest is used to model these energy conservation techniques in the building and to predict the energy savings. A comparative analysis of different energy conservation techniques is made to estimate the reduction in energy use.
{"title":"Analysis of measures to improve energy performance of a commercial building by energy modeling","authors":"R. K, Nidhi Gupta, Harshendra N Shet","doi":"10.1109/GET.2016.7916806","DOIUrl":"https://doi.org/10.1109/GET.2016.7916806","url":null,"abstract":"The commercial building sector accounts for 15% of the electricity demand and is set increase three fold by the year 2030 [1]. This increase in demand coupled with rising energy cost and increased green house emissions offer not only challenges but also opportunities to employ energy efficient design practices. This paper investigates the methods to reduce the energy consumption of a commercial building by incorporating energy conservation techniques in the design stage of the building. By comparing the design buildings energy use with a baseline building, a percentage estimate of the energy savings can be obtained. Energy modeling tool eQuest is used to model these energy conservation techniques in the building and to predict the energy savings. A comparative analysis of different energy conservation techniques is made to estimate the reduction in energy use.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129318553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916716
I. A., B. Priyalakshmi
The typical design of the RFID system deals with mainly two components which are RFID tag and the RFID reader, in which both the system consists of an antenna in it. So the antenna design is much concerned to give the expected level of radiation properties. Therefore, in this proposed paper, the RFID antenna was designed according and the Dipole Spiral antenna structure was used to produce for the RFID application. And an innovative approach of chipless RFID Tag was introduced, which was again innovated by using conductive ink technology and paper substrate to produce a typical RFID tag. So, that the replacement of EMF coil (conductive material) is done here, to eliminate the loss that occurs in the tag. And also it was approached the simplest way of system design for various RFID applications.
{"title":"Design and fabrication of rfid antenna tag using paper substrate for low-cost RFID applications","authors":"I. A., B. Priyalakshmi","doi":"10.1109/GET.2016.7916716","DOIUrl":"https://doi.org/10.1109/GET.2016.7916716","url":null,"abstract":"The typical design of the RFID system deals with mainly two components which are RFID tag and the RFID reader, in which both the system consists of an antenna in it. So the antenna design is much concerned to give the expected level of radiation properties. Therefore, in this proposed paper, the RFID antenna was designed according and the Dipole Spiral antenna structure was used to produce for the RFID application. And an innovative approach of chipless RFID Tag was introduced, which was again innovated by using conductive ink technology and paper substrate to produce a typical RFID tag. So, that the replacement of EMF coil (conductive material) is done here, to eliminate the loss that occurs in the tag. And also it was approached the simplest way of system design for various RFID applications.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-01DOI: 10.1109/GET.2016.7916857
C. Mohamedaslam, A. T., Mohamed Sahal M.T., Najeeb N.A., N. K
The main aim of this project is to construct an smart vehicle system with minimizing the limitations of existing methods and also enhancing the security of vehicles and human beings and also reduces the accidental injuries. smart vehicle system will entail a speed and other parameters of vehicle sensing mechanism which automatically messages to traffic police with the details of vehicle position when a accident occurs using the GSM/GPRS system. The system also contains seat belt sensor, vehicle black box, and a eye blink sensor. This method is an advanced version of speed detection, seat belt alarms system and it is placed in vehicles. A speed sensor, seat belt sensor and various sensors which senses various parameters of the vehicle is connected to a microcontroller which detects when the abnormal conditions occur or any accidents occur then sends text message, using GSM technology, to a police ambulance services and the drivers relatives. The text send to various authorities contains the details of the vehicle and its position.
{"title":"A smart vehicle for accident prevention using wireless blackbox and eyeblink sensing technology along with seat belt controlled ignition system","authors":"C. Mohamedaslam, A. T., Mohamed Sahal M.T., Najeeb N.A., N. K","doi":"10.1109/GET.2016.7916857","DOIUrl":"https://doi.org/10.1109/GET.2016.7916857","url":null,"abstract":"The main aim of this project is to construct an smart vehicle system with minimizing the limitations of existing methods and also enhancing the security of vehicles and human beings and also reduces the accidental injuries. smart vehicle system will entail a speed and other parameters of vehicle sensing mechanism which automatically messages to traffic police with the details of vehicle position when a accident occurs using the GSM/GPRS system. The system also contains seat belt sensor, vehicle black box, and a eye blink sensor. This method is an advanced version of speed detection, seat belt alarms system and it is placed in vehicles. A speed sensor, seat belt sensor and various sensors which senses various parameters of the vehicle is connected to a microcontroller which detects when the abnormal conditions occur or any accidents occur then sends text message, using GSM technology, to a police ambulance services and the drivers relatives. The text send to various authorities contains the details of the vehicle and its position.","PeriodicalId":441280,"journal":{"name":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126653099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}