Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934513
Sampad Banik, M. Mowla, I. Ahmad
Recently, agro sensor communications are getting popularity with the advent of wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). Infrastructure less MANETs are considered as a potential solution for agricultural domains to provide robust and effective operations in wireless networks by enabling routing characteristics at each mobile node. The efficient use of routing protocol is pivotal for network management in MANETs. In this research, we demonstrate a strategic routing analysis to evaluate the performance of different routing protocols, e.g., proactive and reactive in terms of various network quality of service (QoS) parameters for multiple data rate enabled agro sensor mobile nodes. Two different network scenarios (low-node and high-node) are simulated for various network parameters. Simulation results indicate that OLSR protocol provides higher throughput than others for all nodes. This investigation also shows that GRP has the highest network load capacity than other protocols for agro sensor applications. Another finding from this research i s t hat proactive protocols have the lower average end to end delay and MAC delay than reactive protocols.
{"title":"A Strategic Routing Analysis for Agro Sensor Communications in Mobile Ad hoc Networks","authors":"Sampad Banik, M. Mowla, I. Ahmad","doi":"10.1109/ICASERT.2019.8934513","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934513","url":null,"abstract":"Recently, agro sensor communications are getting popularity with the advent of wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). Infrastructure less MANETs are considered as a potential solution for agricultural domains to provide robust and effective operations in wireless networks by enabling routing characteristics at each mobile node. The efficient use of routing protocol is pivotal for network management in MANETs. In this research, we demonstrate a strategic routing analysis to evaluate the performance of different routing protocols, e.g., proactive and reactive in terms of various network quality of service (QoS) parameters for multiple data rate enabled agro sensor mobile nodes. Two different network scenarios (low-node and high-node) are simulated for various network parameters. Simulation results indicate that OLSR protocol provides higher throughput than others for all nodes. This investigation also shows that GRP has the highest network load capacity than other protocols for agro sensor applications. Another finding from this research i s t hat proactive protocols have the lower average end to end delay and MAC delay than reactive protocols.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89981105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934629
Md. Sabir Hossain, M. Zubair, Mohammad Obaidur Rahman, Muhammad Kamrul Hossain Patwary, Md. Golam Sarwar Rajib
The ever-growing problem which is threatening the current mailing system is spam. Spam is nothing but an unsolicited bulk e-mail frequently sent in a financial nature which generates the need for creating an anti-spam filter. Amongst many spam filtering techniques, the most advanced method "Naïve Bayesian filtering" using the Support Vector Machine (SVM) have been implemented. Spammers are very careful about the filtering techniques. For that very reason, dynamic filtering is needed and the proposed method meets the demand. The algorithm splits the received email into tokens and uses Bayes' theorem of probability to calculate the probability of spam for each token to determine the total spam probability of the mail. Implementation of SVM instead of corpora is one of the added features of the algorithm. The most challenging feature was to take the words as well as whole sentences as input in the SVM as tokens and feature vectors. The inclusion of sentences in the dataset training has increased the accuracy of detecting spam and ham. Natural Language Tool Kit (NLTK) has been used as a useful language processing tool to tokenize the sentences and also to understand the meaning of the same types of sentences to some extent. As a test mail is being compared by word to word and also sentence to sentence from the training datasets to determine if the mail is spam or not, it will improve the performance of the filter. With some simple modifications, the filter can be used in both server and client end. The efficiency increases gradually with the increased number of email it processes.
威胁当前邮件系统的日益严重的问题是垃圾邮件。垃圾邮件只不过是未经请求的大量电子邮件,经常以金融性质发送,因此需要创建反垃圾邮件过滤器。在众多垃圾邮件过滤技术中,使用支持向量机(SVM)的最先进的方法“Naïve贝叶斯过滤”已经实现。垃圾邮件发送者对过滤技术非常小心。因此,需要进行动态滤波,所提出的方法满足了这一要求。该算法将收到的电子邮件分成令牌,并利用贝叶斯概率定理计算每个令牌的垃圾邮件概率,从而确定该邮件的总垃圾邮件概率。支持向量机代替语料库的实现是该算法的附加特征之一。最具挑战性的特征是将单词和整个句子作为支持向量机的输入作为标记和特征向量。在数据集训练中加入句子提高了检测spam和ham的准确性。自然语言工具箱(Natural Language Tool Kit, NLTK)是一种有用的语言处理工具,用于对句子进行标记,并在一定程度上理解同类型句子的意义。由于测试邮件会从训练数据集中逐字逐句地进行比较,以确定邮件是否为垃圾邮件,这将提高过滤器的性能。通过一些简单的修改,过滤器可以在服务器端和客户端使用。效率随着它处理的电子邮件数量的增加而逐渐提高。
{"title":"A Modified Naïve Bayesian-based Spam Filter using Support Vector Machine","authors":"Md. Sabir Hossain, M. Zubair, Mohammad Obaidur Rahman, Muhammad Kamrul Hossain Patwary, Md. Golam Sarwar Rajib","doi":"10.1109/ICASERT.2019.8934629","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934629","url":null,"abstract":"The ever-growing problem which is threatening the current mailing system is spam. Spam is nothing but an unsolicited bulk e-mail frequently sent in a financial nature which generates the need for creating an anti-spam filter. Amongst many spam filtering techniques, the most advanced method \"Naïve Bayesian filtering\" using the Support Vector Machine (SVM) have been implemented. Spammers are very careful about the filtering techniques. For that very reason, dynamic filtering is needed and the proposed method meets the demand. The algorithm splits the received email into tokens and uses Bayes' theorem of probability to calculate the probability of spam for each token to determine the total spam probability of the mail. Implementation of SVM instead of corpora is one of the added features of the algorithm. The most challenging feature was to take the words as well as whole sentences as input in the SVM as tokens and feature vectors. The inclusion of sentences in the dataset training has increased the accuracy of detecting spam and ham. Natural Language Tool Kit (NLTK) has been used as a useful language processing tool to tokenize the sentences and also to understand the meaning of the same types of sentences to some extent. As a test mail is being compared by word to word and also sentence to sentence from the training datasets to determine if the mail is spam or not, it will improve the performance of the filter. With some simple modifications, the filter can be used in both server and client end. The efficiency increases gradually with the increased number of email it processes.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"30 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83320660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934538
Md. Faisal Kader, Md. Awal Khan, Md. Habibul Huq
A hybrid photovoltaic (PVT) solar thermal system combines a simultaneous conversion of the absorbed solar radiation into electricity and heat. In this study the design of an experimental PVT dual system, both air and water circulation with modifications in the air channel is presented. First modification is to place a thin flat metallic sheet (TMS) inside the air channel and second one is to use painted Black ribbed surfaces at the bottom of the air channel. To observe the variations of heat transmittance with change of the shape of the ribs four experimental setups with a Trapezoidal, Saw teeth forward, a Saw teeth backward ribbed surfaces and a flat plate have been used. Natural convection is applied instead of forced convection to increase the system’s net electrical output & thereby the overall system efficiency. All setups were of the same capacity, projected area, and water heat extraction method and average depth. Performance study was carried out during the months of February to June, 2012 at IUT campus, Gazipur, Bangladesh. Significant performance has been observed with the above stated modifications. In an intense sunny day of March, the maximum temperature of water was found to be 45°C for Trapezoidal, 44°C for Saw teeth forward, 43°C for Saw teeth backward and 41°C for flat plate setup. Maximum temperature of air inside the air channel was found to be 39°C for Trapezoidal, 38°C for Saw teeth forward, 37°C for Saw teeth backward ribbed surfaces and 36°C for flat plate in an intense sunny day of march 2012 with an ambient temperature of 34°C. The average efficiency from all calculated values is found to be 64% for Trapezoidal, 62% for Saw teeth forward, 61% for Saw teeth backward and 58% for flat plate setup.
{"title":"Thermal Characteristics of Hybrid Photovoltaic Solar Thermal System during Summer.","authors":"Md. Faisal Kader, Md. Awal Khan, Md. Habibul Huq","doi":"10.1109/ICASERT.2019.8934538","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934538","url":null,"abstract":"A hybrid photovoltaic (PVT) solar thermal system combines a simultaneous conversion of the absorbed solar radiation into electricity and heat. In this study the design of an experimental PVT dual system, both air and water circulation with modifications in the air channel is presented. First modification is to place a thin flat metallic sheet (TMS) inside the air channel and second one is to use painted Black ribbed surfaces at the bottom of the air channel. To observe the variations of heat transmittance with change of the shape of the ribs four experimental setups with a Trapezoidal, Saw teeth forward, a Saw teeth backward ribbed surfaces and a flat plate have been used. Natural convection is applied instead of forced convection to increase the system’s net electrical output & thereby the overall system efficiency. All setups were of the same capacity, projected area, and water heat extraction method and average depth. Performance study was carried out during the months of February to June, 2012 at IUT campus, Gazipur, Bangladesh. Significant performance has been observed with the above stated modifications. In an intense sunny day of March, the maximum temperature of water was found to be 45°C for Trapezoidal, 44°C for Saw teeth forward, 43°C for Saw teeth backward and 41°C for flat plate setup. Maximum temperature of air inside the air channel was found to be 39°C for Trapezoidal, 38°C for Saw teeth forward, 37°C for Saw teeth backward ribbed surfaces and 36°C for flat plate in an intense sunny day of march 2012 with an ambient temperature of 34°C. The average efficiency from all calculated values is found to be 64% for Trapezoidal, 62% for Saw teeth forward, 61% for Saw teeth backward and 58% for flat plate setup.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"34 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83680276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surveillance of international border areas, industries, banks, shopping malls, and any other suspected areas is a difficult task to be done. It is not possible to scrutinize everything at each and every moment. In this case, a requisite solution can be a robot which automatically detects any suspicious activity or condition and reports to the control unit. This paper is on a bipedal surveillance robot which can budge in an area, send images and videos even in caliginous condition by using night vision mode of the Wi-Fi camera as well as the installed sensor on this robot provides gaseous parameters of the area such as the amount of Methane, LPG, Carbon mono-Oxide. The robot has a wireless Bluetooth module for communication and collection of data. The whole process can be run on a voice command system. After the data collected from the robot, data are appraised and analyzed to get an understandable idea of the surveilled area.
{"title":"Design & Implementation of Voice Command Based Bipedal Surveillance Robot","authors":"Himel Das, Himel Chakraborty, Md Sarwar Uddin Chowdhury","doi":"10.1109/ICASERT.2019.8934551","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934551","url":null,"abstract":"Surveillance of international border areas, industries, banks, shopping malls, and any other suspected areas is a difficult task to be done. It is not possible to scrutinize everything at each and every moment. In this case, a requisite solution can be a robot which automatically detects any suspicious activity or condition and reports to the control unit. This paper is on a bipedal surveillance robot which can budge in an area, send images and videos even in caliginous condition by using night vision mode of the Wi-Fi camera as well as the installed sensor on this robot provides gaseous parameters of the area such as the amount of Methane, LPG, Carbon mono-Oxide. The robot has a wireless Bluetooth module for communication and collection of data. The whole process can be run on a voice command system. After the data collected from the robot, data are appraised and analyzed to get an understandable idea of the surveilled area.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"65 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84437496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934650
Al- Nadhian Bin Emran, Aman Ullah Juman, G. Z. Islam
Not all internet service providers provide the same amount of bandwidth to their users. Based on bandwidth allocation, location and price service providers capped their users’ bandwidth. As a result, we observe bandwidth limitation among the users. In this paper, we will implement a technique to bypass bandwidth and firewall restriction using virtual private network where we will use common IXP route to avoid the initial level of the bandwidth cap. In this project, we show that internet speed of international route i.e. global bandwidth can bypass, if there are multiple ISPs use a common IXP and at least one of those ISP provide robust global bandwidth. Usually, regional ISPs use common IXP to route their local traffic within the region. We utilize IXP to bypass global bandwidth cap of users who have better local bandwidth allocation. We show that using our proposed method global internet speed of a user can raise several times effectively.
{"title":"Enhancement of Global Bandwidth of Internet Users Employing Internet Exchange Point Leveraging VPN Technology","authors":"Al- Nadhian Bin Emran, Aman Ullah Juman, G. Z. Islam","doi":"10.1109/ICASERT.2019.8934650","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934650","url":null,"abstract":"Not all internet service providers provide the same amount of bandwidth to their users. Based on bandwidth allocation, location and price service providers capped their users’ bandwidth. As a result, we observe bandwidth limitation among the users. In this paper, we will implement a technique to bypass bandwidth and firewall restriction using virtual private network where we will use common IXP route to avoid the initial level of the bandwidth cap. In this project, we show that internet speed of international route i.e. global bandwidth can bypass, if there are multiple ISPs use a common IXP and at least one of those ISP provide robust global bandwidth. Usually, regional ISPs use common IXP to route their local traffic within the region. We utilize IXP to bypass global bandwidth cap of users who have better local bandwidth allocation. We show that using our proposed method global internet speed of a user can raise several times effectively.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"18 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83682335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934758
N. I. Hossain, Ali Reza Galib, Raihan Bin Mofidul, Dhiman Kumar Sarker
In developing countries, traditional access management systems ubiquitously use either keypad based password protection or radio frequency identification (RFID) card based protection. With the increased number of threats in recent years, these systems are becoming more vulnerable. If the password or the RFID card is somehow compromised, any unauthorized person can breach the system with ease. Considering and analyzing these issues, a cost-effective prototype of a vision based three-layer access management system with IoT connectivity was developed. In this paper, an access management system architecture is proposed based on the fusion of radio frequency identification, back propagation based face recognition and password protection. The system is also connected to a Node JS based web server. Whenever an access is granted or any unauthorized access is detected, an SMS and an email are sent to both the user and the system administrator. Data security is ensured by exploiting AES encryption on the system side and AES decryption on the server side. In case of face recognition, the access is granted if the achieved confidence level is over 80%.
{"title":"A Vision Based Three-Layer Access Management System with IoT Integration","authors":"N. I. Hossain, Ali Reza Galib, Raihan Bin Mofidul, Dhiman Kumar Sarker","doi":"10.1109/ICASERT.2019.8934758","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934758","url":null,"abstract":"In developing countries, traditional access management systems ubiquitously use either keypad based password protection or radio frequency identification (RFID) card based protection. With the increased number of threats in recent years, these systems are becoming more vulnerable. If the password or the RFID card is somehow compromised, any unauthorized person can breach the system with ease. Considering and analyzing these issues, a cost-effective prototype of a vision based three-layer access management system with IoT connectivity was developed. In this paper, an access management system architecture is proposed based on the fusion of radio frequency identification, back propagation based face recognition and password protection. The system is also connected to a Node JS based web server. Whenever an access is granted or any unauthorized access is detected, an SMS and an email are sent to both the user and the system administrator. Data security is ensured by exploiting AES encryption on the system side and AES decryption on the server side. In case of face recognition, the access is granted if the achieved confidence level is over 80%.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"28 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83749030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934600
Tae-Ho Kwon, Ki-Soo An, Partha Pratim Banik, Ki-Doo Kim
For daily health checkup, wearable device plays an important role in healthcare applications. In this manuscript, we develop a visual multiple-input multiple-output (visual-MIMO) system for healthcare application. As a demo of healthcare device, we design a pulse oximeter device that can measure heart rate (HR) and blood oxygenation (BO) of a person. The HR and BO data are used to send through light-emitting diode (LED) to camera communication. We have used generalized color modulation (GCM) technique to modulate the HR and BO data into the LED array for transmission and smartphone camera is used as the receiver to demodulate the transmitted data. We demonstrate our proposed visual-MIMO system by developing an android app on smartphone.
{"title":"Wearable Visual-MIMO for Healthcare Applications","authors":"Tae-Ho Kwon, Ki-Soo An, Partha Pratim Banik, Ki-Doo Kim","doi":"10.1109/ICASERT.2019.8934600","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934600","url":null,"abstract":"For daily health checkup, wearable device plays an important role in healthcare applications. In this manuscript, we develop a visual multiple-input multiple-output (visual-MIMO) system for healthcare application. As a demo of healthcare device, we design a pulse oximeter device that can measure heart rate (HR) and blood oxygenation (BO) of a person. The HR and BO data are used to send through light-emitting diode (LED) to camera communication. We have used generalized color modulation (GCM) technique to modulate the HR and BO data into the LED array for transmission and smartphone camera is used as the receiver to demodulate the transmitted data. We demonstrate our proposed visual-MIMO system by developing an android app on smartphone.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"13 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87209078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934754
S. Hossain, Mazid Ishtique Ahmed, Md. Niaz Mostakim
In this paper, an enhanced security solution is proposed for industry grade safety vault system. Electronic security and safety have been offering robust mechanism for implementation in ensuring proper shelter of key documents and goods in offices, banks, institutions, libraries, laboratories etc. Development of various sensors have enabled systems to have preventive and corrective measures in this regard significantly. In order to deliver a concrete security solution for critically important and confidential documents and goods, we proposed an Automated Safety Vault with Double Layered Defense Mechanism. The solution comprised of an Electronic Lock driven by password verification and a Biometric authentication for users using a Fingerprint scanning and sensing tool. Both of these two layers ensured the authenticity of the user by preventing any unauthorized access to the Vault. Moreover, actions of PIR and LDR sensors would also safeguard the vault from any breakout access other than the double layered defenses by being positioned within the periphery of the vault. The system was then implemented in a prototype scope for testing and validation of the proposals. The implemented system and testing data showed that the Automated Safety Vault with all its security features had successful operation. The specification of the whole system as well as the results are documented in this paper.
{"title":"A Prototype of Automated Vault Locker Solution for Industrial Application","authors":"S. Hossain, Mazid Ishtique Ahmed, Md. Niaz Mostakim","doi":"10.1109/ICASERT.2019.8934754","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934754","url":null,"abstract":"In this paper, an enhanced security solution is proposed for industry grade safety vault system. Electronic security and safety have been offering robust mechanism for implementation in ensuring proper shelter of key documents and goods in offices, banks, institutions, libraries, laboratories etc. Development of various sensors have enabled systems to have preventive and corrective measures in this regard significantly. In order to deliver a concrete security solution for critically important and confidential documents and goods, we proposed an Automated Safety Vault with Double Layered Defense Mechanism. The solution comprised of an Electronic Lock driven by password verification and a Biometric authentication for users using a Fingerprint scanning and sensing tool. Both of these two layers ensured the authenticity of the user by preventing any unauthorized access to the Vault. Moreover, actions of PIR and LDR sensors would also safeguard the vault from any breakout access other than the double layered defenses by being positioned within the periphery of the vault. The system was then implemented in a prototype scope for testing and validation of the proposals. The implemented system and testing data showed that the Automated Safety Vault with all its security features had successful operation. The specification of the whole system as well as the results are documented in this paper.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"66 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90923472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934529
Nusrat Kabir Samia, Rifah Tamanna Usha, Anindita Kundu, Sadia Nowshin, Sharmin Sultana Sharmee, Sanjida Nasreen Tumpa, M. F. Fazle Rabbi, Col Md Mahboob Karim
Bangladesh railway system mostly relies on manual maintenance system. At present, a trolley car is used in which people go in person to examine the railway system depending only on their vision. Mostly, these checking include detection of rail line cracks and obstacles, existence of sleepers in the proper places etc. However, the inadequacy of this kind of maintenance system is one of the vital reasons of railway accidents. The current procedure is also time consuming and costly. Besides, one of the leading causes of railway accidents is attributed to human error which can be reduced through automation. This paper attempts to improve the railway maintenance system and convert this into an automated one. Here, we are introducing a sensor based arrangement which reveals problems like surface crack, unaligned rail lines, obstacles on the railway and also inspects the correct position, presence and absence of the sleepers with the convenience of sending the location and distance to the proper authority.
{"title":"Automated Railway Maintenance System in Context of Bangladesh","authors":"Nusrat Kabir Samia, Rifah Tamanna Usha, Anindita Kundu, Sadia Nowshin, Sharmin Sultana Sharmee, Sanjida Nasreen Tumpa, M. F. Fazle Rabbi, Col Md Mahboob Karim","doi":"10.1109/ICASERT.2019.8934529","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934529","url":null,"abstract":"Bangladesh railway system mostly relies on manual maintenance system. At present, a trolley car is used in which people go in person to examine the railway system depending only on their vision. Mostly, these checking include detection of rail line cracks and obstacles, existence of sleepers in the proper places etc. However, the inadequacy of this kind of maintenance system is one of the vital reasons of railway accidents. The current procedure is also time consuming and costly. Besides, one of the leading causes of railway accidents is attributed to human error which can be reduced through automation. This paper attempts to improve the railway maintenance system and convert this into an automated one. Here, we are introducing a sensor based arrangement which reveals problems like surface crack, unaligned rail lines, obstacles on the railway and also inspects the correct position, presence and absence of the sleepers with the convenience of sending the location and distance to the proper authority.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79156864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There will be high energy wastage and CO2 emissions will be increased in 5G network because of dense deployment of small cell base stations. This paper brings an efficient energy management technique for 5G green small cell network which switches on as such number of antennas from the array as needed. This is done by monitoring and counting the amount of data traffic within the area of the small cell. It is shown that the proposed scheme is capable to improve energy saving significantly. We have found that the scheme consumes up to 96.875% less energy than without energy management technique. Besides, the emission of CO2 is reduced by 2.3166kg per day when the small cell is operated by a diesel power source and for all kinds of power sources on average CO2 emission can be reduced by 1.612 kg per day.
{"title":"Traffic Load Based Efficient Energy Management Technique for 5G Small Cell Network","authors":"Syed Zahidur Rashid, A. Gafur, Atikur Rahaman, Yaheya Solaiman, Erfanul Hoque Bahadur","doi":"10.1109/ICASERT.2019.8934585","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934585","url":null,"abstract":"There will be high energy wastage and CO2 emissions will be increased in 5G network because of dense deployment of small cell base stations. This paper brings an efficient energy management technique for 5G green small cell network which switches on as such number of antennas from the array as needed. This is done by monitoring and counting the amount of data traffic within the area of the small cell. It is shown that the proposed scheme is capable to improve energy saving significantly. We have found that the scheme consumes up to 96.875% less energy than without energy management technique. Besides, the emission of CO2 is reduced by 2.3166kg per day when the small cell is operated by a diesel power source and for all kinds of power sources on average CO2 emission can be reduced by 1.612 kg per day.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"66 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77821112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}