Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972274
S. Purushothaman, Nishant Kashyap, V. Singh, A. Bharti, Sanjeed Sawant
Using automation to ensure reliability of a tricky card based game application is not a child's play, especially when the underlying engine is cocos-2dx, which is the world's no. 1 open-source and a cross-platform game development platform. This paper explores the challenges that can be faced while automating a game developed using cocos-2dx, such as dynamic rendering of game elements, overcoming the limitations in using automation tools like selenium in the absence of any locators to identify the visible or active elements to perform any operation. This paper further discusses the approach to bring efficient, generic and re-usable solution for these challenges while automating a multiplayer card game developed using cocos-2dx. This multi-layered approach spans across the following areas: 1) The mechanism for working and communicating with cocos-2dx web and native game client. 2) Approach for automating multiplayer game using FSM. 3) Automating the game play based on game rules which follows a heuristic approach. The benefit of this automation approach is that it makes the code 'device agnostic, which helps to run the same code against multiple devices of varying screen size and resolutions. This approach also makes the code robust, reducing any false failures since the interaction with the client is done via Javascript, which lot of UI automation tool still does not guarantee.
{"title":"Automation approach for cocos-2dx based multi-player card game for web and mobile","authors":"S. Purushothaman, Nishant Kashyap, V. Singh, A. Bharti, Sanjeed Sawant","doi":"10.1109/ICCCT2.2017.7972274","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972274","url":null,"abstract":"Using automation to ensure reliability of a tricky card based game application is not a child's play, especially when the underlying engine is cocos-2dx, which is the world's no. 1 open-source and a cross-platform game development platform. This paper explores the challenges that can be faced while automating a game developed using cocos-2dx, such as dynamic rendering of game elements, overcoming the limitations in using automation tools like selenium in the absence of any locators to identify the visible or active elements to perform any operation. This paper further discusses the approach to bring efficient, generic and re-usable solution for these challenges while automating a multiplayer card game developed using cocos-2dx. This multi-layered approach spans across the following areas: 1) The mechanism for working and communicating with cocos-2dx web and native game client. 2) Approach for automating multiplayer game using FSM. 3) Automating the game play based on game rules which follows a heuristic approach. The benefit of this automation approach is that it makes the code 'device agnostic, which helps to run the same code against multiple devices of varying screen size and resolutions. This approach also makes the code robust, reducing any false failures since the interaction with the client is done via Javascript, which lot of UI automation tool still does not guarantee.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972254
M. Buvaneswari, M. Loganathan, S. Sangeetha
Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony optimization algorithm. Here each node will be communicating using heart beat messages reporting their individual status to nearby node and master node. The application or data will be requested from the servers. Upon the requested services they will be provided in secure manner by DMZ(De-militarized zone) techniques. They provide three layer of security to the data requestition. They provide security to data leakage in 3 layers with various algorithm.
{"title":"Cloud challenges of load balancing and security issues using ICLoS algorithm","authors":"M. Buvaneswari, M. Loganathan, S. Sangeetha","doi":"10.1109/ICCCT2.2017.7972254","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972254","url":null,"abstract":"Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony optimization algorithm. Here each node will be communicating using heart beat messages reporting their individual status to nearby node and master node. The application or data will be requested from the servers. Upon the requested services they will be provided in secure manner by DMZ(De-militarized zone) techniques. They provide three layer of security to the data requestition. They provide security to data leakage in 3 layers with various algorithm.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127322362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972251
U. M., B. Ramakrishnan, J. Sathiamoorthy
VANETs are vehicular ad hoc networks where vehicles are the transmitting nodes. The radio channels through which these nodes send messages are valuable resources which need to be used diligently. These resources need to be shared fairly among all. To facilitate equal sharing of the radio channels cognitive radio is used. Cognitive radio is capable of sensing the channels and utilizing them. Spectrum sensing is an essential part of cognitive radio which helps in identifying the free channels and allocate them to the nodes who want to use these channels. In this paper we have analyzed the performance of three essential spectrum sensing techniques, namely, cooperative spectrum sensing, distributive spectrum sensing and fuzzy distributed spectrum sensing. We have compared these spectrum sensing techniques to determine their efficiency‥ We have done this by comparing their efficiency to locate free channels, speed and mode of operation. We have also recorded our findings and illustrated those using graphs.
{"title":"Performance analysis of spectrum sensing techniques in cognitive radio based vehicular ad hoc networks (VANET)","authors":"U. M., B. Ramakrishnan, J. Sathiamoorthy","doi":"10.1109/ICCCT2.2017.7972251","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972251","url":null,"abstract":"VANETs are vehicular ad hoc networks where vehicles are the transmitting nodes. The radio channels through which these nodes send messages are valuable resources which need to be used diligently. These resources need to be shared fairly among all. To facilitate equal sharing of the radio channels cognitive radio is used. Cognitive radio is capable of sensing the channels and utilizing them. Spectrum sensing is an essential part of cognitive radio which helps in identifying the free channels and allocate them to the nodes who want to use these channels. In this paper we have analyzed the performance of three essential spectrum sensing techniques, namely, cooperative spectrum sensing, distributive spectrum sensing and fuzzy distributed spectrum sensing. We have compared these spectrum sensing techniques to determine their efficiency‥ We have done this by comparing their efficiency to locate free channels, speed and mode of operation. We have also recorded our findings and illustrated those using graphs.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972252
A. K. Lall, Jai Utkarsh, D. K. Upadhyay, G. K. Mishra
Bandwidth reconfigurable microstrip rectangular patch antenna with operating frequency (ƒc), 5.8 GHz has been presented in this paper. Network morphing method has been used to achieve reconfigurability. The bandwidth (BW) of the antenna varies from 107 MHz to 153 MHz i.e. a bandwidth variation of 46 MHz at almost constant frequency is observed. The VSWR achieved in this structure is 1.19. All this is confined within a compact size of 17.8 ×12.1 mm2.
{"title":"Reconfigurable patch antenna for bandwidth control for point to point communication","authors":"A. K. Lall, Jai Utkarsh, D. K. Upadhyay, G. K. Mishra","doi":"10.1109/ICCCT2.2017.7972252","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972252","url":null,"abstract":"Bandwidth reconfigurable microstrip rectangular patch antenna with operating frequency (ƒc), 5.8 GHz has been presented in this paper. Network morphing method has been used to achieve reconfigurability. The bandwidth (BW) of the antenna varies from 107 MHz to 153 MHz i.e. a bandwidth variation of 46 MHz at almost constant frequency is observed. The VSWR achieved in this structure is 1.19. All this is confined within a compact size of 17.8 ×12.1 mm2.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972267
B. Abinaya, S. Gurupriya, M. Pooja
The system is mainly used for smart and weather adaptive lighting in street lights. The project is implemented with smart embedded system that controls the street light based on detection of sunlight. During the night time the street light gets automatically ON and during the day time it gets automatically OFF. The ON/OFF can be accessed anywhere anytime through internet. A camera is placed on top of the street light to track the actions performed on the road where the footages are stored in a server. In addition to this, a panic button is placed on the pole, in-case of any emergency or danger, the person in danger can press this button which raises an alarm at the nearby police station. Whenever the panic button is pressed, the footage at that time recorded by the camera is sent directly to the cloud account. The access of the account is given to the particular police station by which they can view the incident's spot. Each area's street lights are connected to the particular area's police station and each of them has a cloud accessible account. The manual operation using GSM technology is completely eliminated. Thus the system is mainly designed to ensure safety and to prevent energy wastage.
{"title":"Iot based smart and adaptive lighting in street lights","authors":"B. Abinaya, S. Gurupriya, M. Pooja","doi":"10.1109/ICCCT2.2017.7972267","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972267","url":null,"abstract":"The system is mainly used for smart and weather adaptive lighting in street lights. The project is implemented with smart embedded system that controls the street light based on detection of sunlight. During the night time the street light gets automatically ON and during the day time it gets automatically OFF. The ON/OFF can be accessed anywhere anytime through internet. A camera is placed on top of the street light to track the actions performed on the road where the footages are stored in a server. In addition to this, a panic button is placed on the pole, in-case of any emergency or danger, the person in danger can press this button which raises an alarm at the nearby police station. Whenever the panic button is pressed, the footage at that time recorded by the camera is sent directly to the cloud account. The access of the account is given to the particular police station by which they can view the incident's spot. Each area's street lights are connected to the particular area's police station and each of them has a cloud accessible account. The manual operation using GSM technology is completely eliminated. Thus the system is mainly designed to ensure safety and to prevent energy wastage.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972312
F. Basha, C. Kumar, Sindhu J. Kumaar
we introduced a variant in several types of queries such as equivalence, membership, exhaustiveness, subset and superset queries called antithetical reply in the language learnability theory. It is considered that the notion of “minimal adequate teacher” in order to build a efficient learning algorithm, which can answer antithetical reply to the learner about the set helps to generate non synchronized pure pattern languages.
{"title":"Learnability of language identification using antithetical reply","authors":"F. Basha, C. Kumar, Sindhu J. Kumaar","doi":"10.1109/ICCCT2.2017.7972312","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972312","url":null,"abstract":"we introduced a variant in several types of queries such as equivalence, membership, exhaustiveness, subset and superset queries called antithetical reply in the language learnability theory. It is considered that the notion of “minimal adequate teacher” in order to build a efficient learning algorithm, which can answer antithetical reply to the learner about the set helps to generate non synchronized pure pattern languages.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116678490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972314
P. PonPriya, E. Priya
The surface electromyogram (sEMG) signal is widely used to control externally powered prosthesis, robot, and human-computer interfaces (HCI) as it contains important neuro muscular information. A prosthetic device is a biomimetic device that replaces a missing body part of an amputee which may be lost due to trauma, disease or congenital conditions. A myoelectric prosthesis is controlled by sEMG signals. The sEMG signals are electrical manifestation of neuro muscular activities which is recorded non-invasively using bio-potential electrodes. In this work, three surface electrodes are placed on the forearm over the relevant muscles. The acquired sEMG signals are filtered, amplified and converted into the digital signal when the forearm muscles get contracted and relaxed. The output of the processed is further transmitted to the controller to which the five DC motor of the prosthetic hand are connected. These DC motors are intended to control each of the finger of the prosthetic hand. Depending upon the controller output, appropriate DC motor is actuated to perform the hand movement.
{"title":"Design and control of prosthetic hand using myoelectric signal","authors":"P. PonPriya, E. Priya","doi":"10.1109/ICCCT2.2017.7972314","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972314","url":null,"abstract":"The surface electromyogram (sEMG) signal is widely used to control externally powered prosthesis, robot, and human-computer interfaces (HCI) as it contains important neuro muscular information. A prosthetic device is a biomimetic device that replaces a missing body part of an amputee which may be lost due to trauma, disease or congenital conditions. A myoelectric prosthesis is controlled by sEMG signals. The sEMG signals are electrical manifestation of neuro muscular activities which is recorded non-invasively using bio-potential electrodes. In this work, three surface electrodes are placed on the forearm over the relevant muscles. The acquired sEMG signals are filtered, amplified and converted into the digital signal when the forearm muscles get contracted and relaxed. The output of the processed is further transmitted to the controller to which the five DC motor of the prosthetic hand are connected. These DC motors are intended to control each of the finger of the prosthetic hand. Depending upon the controller output, appropriate DC motor is actuated to perform the hand movement.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"18 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972266
A. Helen, M. F. Fathila, R. Rijwana, Kalaiselvi V.K.G.
Today, in the current global scenario, Women were facing lot of challenges. We can hear the news of women harassments than their achievements. There are many existing apps and devices for women security via smart phones. Though the smart phones have increased rapidly, it is not possible to have the phone all the time in our hand to make a call or click on it, so here we introduced a new technique via smart watches. When a women or child wearing this ‘watch me’ is exposed to sexual or vulnerable attack, the sensor present in it detects the heart beat rate of a person which will be high at the moment by the secretion of epinephrine hormone from hpa axis and gets activated, this will not only provide a alarm sound to the attention of nearby people, it will automatically make an call to our registered contact and also through GPS/GSM it will detect the nearby police station and make an ring there so it will be helpful for police to arrive soon at the spot by tracking the GPS, such a system will lead to safer and better environment.
{"title":"A smart watch for women security based on iot concept ‘watch me’","authors":"A. Helen, M. F. Fathila, R. Rijwana, Kalaiselvi V.K.G.","doi":"10.1109/ICCCT2.2017.7972266","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972266","url":null,"abstract":"Today, in the current global scenario, Women were facing lot of challenges. We can hear the news of women harassments than their achievements. There are many existing apps and devices for women security via smart phones. Though the smart phones have increased rapidly, it is not possible to have the phone all the time in our hand to make a call or click on it, so here we introduced a new technique via smart watches. When a women or child wearing this ‘watch me’ is exposed to sexual or vulnerable attack, the sensor present in it detects the heart beat rate of a person which will be high at the moment by the secretion of epinephrine hormone from hpa axis and gets activated, this will not only provide a alarm sound to the attention of nearby people, it will automatically make an call to our registered contact and also through GPS/GSM it will detect the nearby police station and make an ring there so it will be helpful for police to arrive soon at the spot by tracking the GPS, such a system will lead to safer and better environment.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972255
G., Navin, Siva Kumar, S. R. Thilak
Road traffic congestion becomes a major issues for highly crowded metropolitan cities like, Chennai. Ambulance service is one of the major services which gets affected by traffic jams. To smoothen the ambulance movement this paper have come up with the solution of “Intelligent automatic traffic control for ambulance”. The proposed system creates a android app that connects both the ambulance and the traffic signal station using cloud network. This system makes uses RFID (radio frequency identification) technology to implement the Intelligent traffic signal control. The basic idea behind the proposed system is, if the Ambulance halts on the way due to a traffic signal, RFID installed at the traffic signal tracks the RFID tagged ambulance and sends the data to the cloud. After the acknowledgment for the user through the mobile app, the particular signal is made Green for some time and after the ambulance passes by, it regains its original flow of sequence of signaling If, this scheme is fully automated, it finds the ambulance spot, controls the traffic lights. This system control the traffic lights and save the time in emergency periods. Thus it acts as a life saver project.
{"title":"Intelligent traffic signal control system for ambulance using RFID and cloud","authors":"G., Navin, Siva Kumar, S. R. Thilak","doi":"10.1109/ICCCT2.2017.7972255","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972255","url":null,"abstract":"Road traffic congestion becomes a major issues for highly crowded metropolitan cities like, Chennai. Ambulance service is one of the major services which gets affected by traffic jams. To smoothen the ambulance movement this paper have come up with the solution of “Intelligent automatic traffic control for ambulance”. The proposed system creates a android app that connects both the ambulance and the traffic signal station using cloud network. This system makes uses RFID (radio frequency identification) technology to implement the Intelligent traffic signal control. The basic idea behind the proposed system is, if the Ambulance halts on the way due to a traffic signal, RFID installed at the traffic signal tracks the RFID tagged ambulance and sends the data to the cloud. After the acknowledgment for the user through the mobile app, the particular signal is made Green for some time and after the ambulance passes by, it regains its original flow of sequence of signaling If, this scheme is fully automated, it finds the ambulance spot, controls the traffic lights. This system control the traffic lights and save the time in emergency periods. Thus it acts as a life saver project.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972263
M. Yogesh, C. Ramachandran, K. Venkatraman, VKG. Kalaiselvi
“The true sign of knowledge is not intelligence but imagination”-Albert Einstein. One of the most common and noticeable accidents is bomb blast which takes away the lives of millions of people. The major percentage of death rate which has occurred due to the bomb blasts is in the period of 1996–1998 with a death toll of nearly 2500. Our proposed system (lavie enregistrer) aims at providing security through advanced sensor technology. The word lavie enregistrer means “to save life” or “life saver”. The main objective of our system is to safeguard the lives of people through technology. Our proposed system relays on three sensor systems which is going to be the core part of this system. It has been named as TOP sensors which is nothing but Terahertz-Optical-Photoluminiscence sensors for detecting IED's which will be designed using Quantum dots. Thus this system will assure security and will be a milestone in defence administration.
{"title":"La vie enregistrer","authors":"M. Yogesh, C. Ramachandran, K. Venkatraman, VKG. Kalaiselvi","doi":"10.1109/ICCCT2.2017.7972263","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972263","url":null,"abstract":"“The true sign of knowledge is not intelligence but imagination”-Albert Einstein. One of the most common and noticeable accidents is bomb blast which takes away the lives of millions of people. The major percentage of death rate which has occurred due to the bomb blasts is in the period of 1996–1998 with a death toll of nearly 2500. Our proposed system (lavie enregistrer) aims at providing security through advanced sensor technology. The word lavie enregistrer means “to save life” or “life saver”. The main objective of our system is to safeguard the lives of people through technology. Our proposed system relays on three sensor systems which is going to be the core part of this system. It has been named as TOP sensors which is nothing but Terahertz-Optical-Photoluminiscence sensors for detecting IED's which will be designed using Quantum dots. Thus this system will assure security and will be a milestone in defence administration.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}