Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487507
Sanjay Kumar, Stuti Pandey, R. Gupta
Nowadays, social, natural, technological and information systems can be exhibited by complex networks having millions of nodes interconnected to each other. The extraction of comprehensive information from these massive networks call for computationally efficient methods. A promising approach to accomplish this task is to disintegrate the network into sub-units or communities and then using these identified communities to uncover relevant information. Thus, identifying communities in large scale networks plays a pivotal role in several scientific domains. In this paper, we extensively evaluate the functioning of two known algorithms and propose an improvement over one of them, in order to overcome its shortcomings to some extent, for optimal identification of community structure. We also present experimental results and evidences indicating that both the established algorithms, as well as our suggested approach, when applied to large social network datasets yields different results in terms of goodness and performance.
{"title":"Evaluation and Customization of Community Detection Algorithms in Large Social Networks","authors":"Sanjay Kumar, Stuti Pandey, R. Gupta","doi":"10.1109/ICCMC.2018.8487507","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487507","url":null,"abstract":"Nowadays, social, natural, technological and information systems can be exhibited by complex networks having millions of nodes interconnected to each other. The extraction of comprehensive information from these massive networks call for computationally efficient methods. A promising approach to accomplish this task is to disintegrate the network into sub-units or communities and then using these identified communities to uncover relevant information. Thus, identifying communities in large scale networks plays a pivotal role in several scientific domains. In this paper, we extensively evaluate the functioning of two known algorithms and propose an improvement over one of them, in order to overcome its shortcomings to some extent, for optimal identification of community structure. We also present experimental results and evidences indicating that both the established algorithms, as well as our suggested approach, when applied to large social network datasets yields different results in terms of goodness and performance.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"1036-1040"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90977479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487802
B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari
Now a days train accidents is a major issue in all over the world due to increase in rash driving. Accidents are responsible for a large number of collision, derailment, fire in trains, level crossing accident each year. In some cases deaths are caused due to unavailability of immediate medical facility to the injured passengers which can be avoided with the help of an automated system that will reduce the time consumed in activities such as taking the victim to the nearest hospital completing formalities such as filling forms and also involving police in case of major crashes. So the proposed system is using motion (accelerometer) and smoke/fire detection sensor based on IOT application integrated with android (GSM technology) to send information about train accident location to local citizens and administration using google map/GSM location system.
{"title":"IOT Based Railway Disaster Management System","authors":"B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari","doi":"10.1109/ICCMC.2018.8487802","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487802","url":null,"abstract":"Now a days train accidents is a major issue in all over the world due to increase in rash driving. Accidents are responsible for a large number of collision, derailment, fire in trains, level crossing accident each year. In some cases deaths are caused due to unavailability of immediate medical facility to the injured passengers which can be avoided with the help of an automated system that will reduce the time consumed in activities such as taking the victim to the nearest hospital completing formalities such as filling forms and also involving police in case of major crashes. So the proposed system is using motion (accelerometer) and smoke/fire detection sensor based on IOT application integrated with android (GSM technology) to send information about train accident location to local citizens and administration using google map/GSM location system.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"78 1","pages":"680-685"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90124039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8488070
Rinki Gupta, Karush Suri
Surface electromyography (sEMG) has gained significant importance during recent advancements in consumer electronics for healthcare systems, gesture analysis and recognition and sign language communication. For such a system, it is imperative to determine the regions of activity in a continuously recorded sEMG signal. The proposed work provides a novel activity detection approach based on Hidden Markov Models (HMM) using sEMG signals recorded when various hand gestures are performed. Detection procedure is designed based on a probabilistic outlook by making use of mathematical models. The requirement of a threshold for activity detection is obviated making it subject and activity independent. Correctness of the predicted outputs is asserted by classifying the signal segments around the detected transition regions as activity or rest. Classified outputs are compared with the transition regions in a stimulus given to the subject to perform the activity. The activity onsets are detected with an average of 96.25% accuracy whereas the activity termination regions with an average of 87.5% accuracy with the considered set of six activities and four subjects.
{"title":"Activity Detection from Wearable Electromyogram Sensors using Hidden Markov Model","authors":"Rinki Gupta, Karush Suri","doi":"10.1109/ICCMC.2018.8488070","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488070","url":null,"abstract":"Surface electromyography (sEMG) has gained significant importance during recent advancements in consumer electronics for healthcare systems, gesture analysis and recognition and sign language communication. For such a system, it is imperative to determine the regions of activity in a continuously recorded sEMG signal. The proposed work provides a novel activity detection approach based on Hidden Markov Models (HMM) using sEMG signals recorded when various hand gestures are performed. Detection procedure is designed based on a probabilistic outlook by making use of mathematical models. The requirement of a threshold for activity detection is obviated making it subject and activity independent. Correctness of the predicted outputs is asserted by classifying the signal segments around the detected transition regions as activity or rest. Classified outputs are compared with the transition regions in a stimulus given to the subject to perform the activity. The activity onsets are detected with an average of 96.25% accuracy whereas the activity termination regions with an average of 87.5% accuracy with the considered set of six activities and four subjects.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"340-345"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90152766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487245
Tilahun Ayalew Tareke, Sujoy Datta
Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.
{"title":"Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations","authors":"Tilahun Ayalew Tareke, Sujoy Datta","doi":"10.1109/ICCMC.2018.8487245","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487245","url":null,"abstract":"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"40 1","pages":"533-538"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487494
Prakriti Aggarwal, Ashish Khatter, Garima Vyas
Malaria is a perilous disease in charge for around 400 to 1000 deaths annually in India. The conventional technique to diagnose malaria is through microscopy. It takes few hours by an expert to examine and diagnose malarial parasites in the blood smear. The diagnosis report may vary when the blood smears are analyzed by different experts. In proposed work, an image processing based robust algorithm is designed to diagnose malarial parasites with minimal intervention of an expert. Initially, the images are enhanced by using green channel and histogram equalization, and the background subtraction is performed to get the clear vision of the region of interest. After preprocessing, a median filter is employed to eliminate the noise from the images. Then Otsu’s method for segmentation is implemented on the filtered images. The database from world health organization is used in this research. The experiments give encouraging results and an accuracy up to 93%.
{"title":"An Intensity Threshold based Image Segmentation of Malaria Infected Cells","authors":"Prakriti Aggarwal, Ashish Khatter, Garima Vyas","doi":"10.1109/ICCMC.2018.8487494","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487494","url":null,"abstract":"Malaria is a perilous disease in charge for around 400 to 1000 deaths annually in India. The conventional technique to diagnose malaria is through microscopy. It takes few hours by an expert to examine and diagnose malarial parasites in the blood smear. The diagnosis report may vary when the blood smears are analyzed by different experts. In proposed work, an image processing based robust algorithm is designed to diagnose malarial parasites with minimal intervention of an expert. Initially, the images are enhanced by using green channel and histogram equalization, and the background subtraction is performed to get the clear vision of the region of interest. After preprocessing, a median filter is employed to eliminate the noise from the images. Then Otsu’s method for segmentation is implemented on the filtered images. The database from world health organization is used in this research. The experiments give encouraging results and an accuracy up to 93%.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"549-553"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81026882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487857
Aashi Rastogi, Swadha Vanikar, N. Jeyanthi
Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.
{"title":"Anonymous User Authentication and Implicit Background Checks in Cloud Environment","authors":"Aashi Rastogi, Swadha Vanikar, N. Jeyanthi","doi":"10.1109/ICCMC.2018.8487857","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487857","url":null,"abstract":"Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8488043
N. Archana, K. I. Anupamma
The rise in the use of alternate energy sources such as solar, wind, geothermal, fuel cell, etc. is due to the fast depletion of conventional energy sources. However these sources are less reliable due to their intermittent nature. To effectively utilise these energy sources, hybrid power systems with more than one renewable energy is used. One type of hybrid power system is a combination of PV energy and battery. The battery is utilized whenever the power from the solar panel is unavailable. Another type of hybrid system is the combination of photovoltaic and wind systems. This paper presents one such combination of hybrid power system with wind and solar energy as two inputs to a multi-input inverter which is supplying a load of 1kW. The simulation of the model is created using MATLAB/Simulink for input dc sources and for solar and wind sources.
{"title":"Multi-input Inverter for Hybrid Wind-Photovoltaic Standalone System","authors":"N. Archana, K. I. Anupamma","doi":"10.1109/ICCMC.2018.8488043","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488043","url":null,"abstract":"The rise in the use of alternate energy sources such as solar, wind, geothermal, fuel cell, etc. is due to the fast depletion of conventional energy sources. However these sources are less reliable due to their intermittent nature. To effectively utilise these energy sources, hybrid power systems with more than one renewable energy is used. One type of hybrid power system is a combination of PV energy and battery. The battery is utilized whenever the power from the solar panel is unavailable. Another type of hybrid system is the combination of photovoltaic and wind systems. This paper presents one such combination of hybrid power system with wind and solar energy as two inputs to a multi-input inverter which is supplying a load of 1kW. The simulation of the model is created using MATLAB/Simulink for input dc sources and for solar and wind sources.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"106 1","pages":"451-455"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75793946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487749
Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi
A recommendation system is broadly used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days is competing with each other by considering many attributes. In this paper, we describe traditional approaches and explain what kind of modern approaches have been developed. We will also try to explain approaches and their problems for the book/novels recommendations. This paper also presents book/novels recommendation in which we are proposing hybrid algorithm, so it helps the recommendation system to recommend the books or novels based on the buyer’s interest.
{"title":"Review Paper on Novel Recommendation","authors":"Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi","doi":"10.1109/ICCMC.2018.8487749","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487749","url":null,"abstract":"A recommendation system is broadly used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days is competing with each other by considering many attributes. In this paper, we describe traditional approaches and explain what kind of modern approaches have been developed. We will also try to explain approaches and their problems for the book/novels recommendations. This paper also presents book/novels recommendation in which we are proposing hybrid algorithm, so it helps the recommendation system to recommend the books or novels based on the buyer’s interest.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"346-348"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77971599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487512
Utkarsha Bagde, Priyanka Tripathi
This paper examines various clustering algorithms for corporate bond. The corporate bond is a bond issued by the corporations with certain time limit after which the bond will get mature. In order to raise funding such as explanation of business and for many other reasons corporation issues bond to the organization. A few years ago, the corporate bond market had to face very poor clustered default events in comparison to those experienced throughout the recession. The purpose of bond clustering, any organization can choose the bond with high ratings and high yields. Clustering is the technique to group data by identifying the common characteristics on a large dataset.In the proposed work K-Means, Hierarchical, Self Organizing Map, Fuzzy-C Mean and Gaussian Mixture Model clustering algorithms have been used to segment the bonds. The Portuguese retail bank with data collected from 2008 to 2013 is used for the presented work. The proposed work results, K-Means gives the most efficient result in terms of time and accuracy.
{"title":"A Comprehensive Analysis of Traditional Clustering Algorithms On Corporate Bond Data","authors":"Utkarsha Bagde, Priyanka Tripathi","doi":"10.1109/ICCMC.2018.8487512","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487512","url":null,"abstract":"This paper examines various clustering algorithms for corporate bond. The corporate bond is a bond issued by the corporations with certain time limit after which the bond will get mature. In order to raise funding such as explanation of business and for many other reasons corporation issues bond to the organization. A few years ago, the corporate bond market had to face very poor clustered default events in comparison to those experienced throughout the recession. The purpose of bond clustering, any organization can choose the bond with high ratings and high yields. Clustering is the technique to group data by identifying the common characteristics on a large dataset.In the proposed work K-Means, Hierarchical, Self Organizing Map, Fuzzy-C Mean and Gaussian Mixture Model clustering algorithms have been used to segment the bonds. The Portuguese retail bank with data collected from 2008 to 2013 is used for the presented work. The proposed work results, K-Means gives the most efficient result in terms of time and accuracy.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82647638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ICCMC.2018.8487710
K. Roy, V. Banninthaya K., S. M. Prabhu, Arun Koomar, Disha Karnataki, G. Shankar
The number of smart meter users in this present day world is still limited. The traditional and conventional application of the smart meters was mainly to establish a bi-channel communication – one is to provide the billing details of the energy consumed via GSM modules to the end users and the other is to provide energy data and other related information that are of concern to the supplying utility. The modifications incorporated in this project are - Avoid two different channels of communication and instead concentrate the entire data into one storage system i.e. a server, that facilitates both the users and the concerned utility with access to the the real-time data from anywhere in the world and also an upgradation has been made to automatically detect and protect loads from transients in the line such as overvoltage, undervoltage and overcurrent with a load management algorithm utilizing the features of the smart energy meter IC.
{"title":"Smart IoT based Energy Metering System for Microgrids with Load Management Algorithm","authors":"K. Roy, V. Banninthaya K., S. M. Prabhu, Arun Koomar, Disha Karnataki, G. Shankar","doi":"10.1109/ICCMC.2018.8487710","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487710","url":null,"abstract":"The number of smart meter users in this present day world is still limited. The traditional and conventional application of the smart meters was mainly to establish a bi-channel communication – one is to provide the billing details of the energy consumed via GSM modules to the end users and the other is to provide energy data and other related information that are of concern to the supplying utility. The modifications incorporated in this project are - Avoid two different channels of communication and instead concentrate the entire data into one storage system i.e. a server, that facilitates both the users and the concerned utility with access to the the real-time data from anywhere in the world and also an upgradation has been made to automatically detect and protect loads from transients in the line such as overvoltage, undervoltage and overcurrent with a load management algorithm utilizing the features of the smart energy meter IC.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"49 1","pages":"252-256"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82219291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}