Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942598
Ashwini B. Abhale, S. Khandelwal
Today transportation play important role and have major economic sector of world. In contrast, increase in number of vehicles can increase number of road accidents and human fatalities. In addition, we are facing traffic problem also. Under this condition, it is necessary to provide promising solution to prevent an accident and traffic on road. Vehicular cloud network is help to maintain the communication between vehicles and road side units. Vehicular cloud network is a hybrid solution for maintaining traffic information and providing road safety. In this paper, we focus on vehicular cloud network and provide simulation result explore the working of propose methodology.
{"title":"Intelligence transportation service using Vehicular Cloud Network","authors":"Ashwini B. Abhale, S. Khandelwal","doi":"10.1109/ICAECCT.2016.7942598","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942598","url":null,"abstract":"Today transportation play important role and have major economic sector of world. In contrast, increase in number of vehicles can increase number of road accidents and human fatalities. In addition, we are facing traffic problem also. Under this condition, it is necessary to provide promising solution to prevent an accident and traffic on road. Vehicular cloud network is help to maintain the communication between vehicles and road side units. Vehicular cloud network is a hybrid solution for maintaining traffic information and providing road safety. In this paper, we focus on vehicular cloud network and provide simulation result explore the working of propose methodology.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"154 1","pages":"277-282"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83828098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942629
P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi
Voting process takes the significant part of democratic systems. In most of the developing countries, paper ballot method is still being used. Information technology also has offered significant advantages and facilities to improve the quality of voting process. Digital recording electronic systems are developed replacing paper ballots. Although this is a great advancement, this process is prone to tampering threats and electoral frauds. This paper presents a new voting process which makes use of Raspberry Pi which has improved reliability and transparency over currently used systems. This system employs biometric identifiers in pursuit of authenticity. Pre collected details of all the voters in the country will be maintained as a central database by the government. This data is rechecked at the time of voting to ensure the identity of voters. Usage of Raspberry Pi for web casting the complete voting process and time to time display of polling percentage etc., details will tremendously affect the reliability of the process. Transparency and minimum usage of personnel is achieved at a cheaper cost and simpler process with this Raspberry Pi and its peripherals.
{"title":"Raspberry Pi voting system, a reliable technology for transparency in democracy","authors":"P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi","doi":"10.1109/ICAECCT.2016.7942629","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942629","url":null,"abstract":"Voting process takes the significant part of democratic systems. In most of the developing countries, paper ballot method is still being used. Information technology also has offered significant advantages and facilities to improve the quality of voting process. Digital recording electronic systems are developed replacing paper ballots. Although this is a great advancement, this process is prone to tampering threats and electoral frauds. This paper presents a new voting process which makes use of Raspberry Pi which has improved reliability and transparency over currently used systems. This system employs biometric identifiers in pursuit of authenticity. Pre collected details of all the voters in the country will be maintained as a central database by the government. This data is rechecked at the time of voting to ensure the identity of voters. Usage of Raspberry Pi for web casting the complete voting process and time to time display of polling percentage etc., details will tremendously affect the reliability of the process. Transparency and minimum usage of personnel is achieved at a cheaper cost and simpler process with this Raspberry Pi and its peripherals.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"36 1","pages":"443-449"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91426944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942610
Nilesh J. Uke, P. Futane
Detection and tracking of moving object in the video has turned into a fascinating zone of exploration in the field of computer vision and has wide applications in fields like video surveillance, service robots, public security and target recognition. Although researches have proposed many approaches for object detection, robustness remains a huge challenge. In this paper, we proposed hybrid method of object detection using motion estimation and tracking by parallel kalman filter. Detection of the moving object is performed by analyzing the moving parts by corner and the shape feature extraction. The parallel kalman filter is used to tracks the object that is detected by calculating the motion estimation in video. The object tracking using the shape and the corner feature helps in providing the extract tracking of the object.
{"title":"Efficient method for detecting and tracking moving objects in video","authors":"Nilesh J. Uke, P. Futane","doi":"10.1109/ICAECCT.2016.7942610","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942610","url":null,"abstract":"Detection and tracking of moving object in the video has turned into a fascinating zone of exploration in the field of computer vision and has wide applications in fields like video surveillance, service robots, public security and target recognition. Although researches have proposed many approaches for object detection, robustness remains a huge challenge. In this paper, we proposed hybrid method of object detection using motion estimation and tracking by parallel kalman filter. Detection of the moving object is performed by analyzing the moving parts by corner and the shape feature extraction. The parallel kalman filter is used to tracks the object that is detected by calculating the motion estimation in video. The object tracking using the shape and the corner feature helps in providing the extract tracking of the object.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"52 1","pages":"343-348"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85879729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942601
A. Desai, D. Gaikwad
In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use multiuser system by creating their own account, which is protected by unique id and password. Sometimes, authorized users attack system for some malicious purposes. Internal attacks include deleting some important files or data, altering some important data. For any intrusion detection system, it is very difficult to identify authorized internal intruders. SQL injection is one such attack, which can be launched by internal attacker. The purpose of external intruder is to perform malicious activities in remote system. To avoid these two types of attacks, the robust intrusion detection system is needed. In this paper, we have implemented hybrid intrusion detection system, which includes identification of both internal and external attacks. Signature matching algorithm is implemented to identify internal attacks. Fuzzy genetic algorithm is applied for implementation of external attacks detection. The system is hybrid and compatible in offline as well as online environment. Experimental results show that the accuracy of system is better than some of existing systems.
{"title":"Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA","authors":"A. Desai, D. Gaikwad","doi":"10.1109/ICAECCT.2016.7942601","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942601","url":null,"abstract":"In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use multiuser system by creating their own account, which is protected by unique id and password. Sometimes, authorized users attack system for some malicious purposes. Internal attacks include deleting some important files or data, altering some important data. For any intrusion detection system, it is very difficult to identify authorized internal intruders. SQL injection is one such attack, which can be launched by internal attacker. The purpose of external intruder is to perform malicious activities in remote system. To avoid these two types of attacks, the robust intrusion detection system is needed. In this paper, we have implemented hybrid intrusion detection system, which includes identification of both internal and external attacks. Signature matching algorithm is implemented to identify internal attacks. Fuzzy genetic algorithm is applied for implementation of external attacks detection. The system is hybrid and compatible in offline as well as online environment. Experimental results show that the accuracy of system is better than some of existing systems.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"291-294"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85796821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942577
S. Shete, G. Bhide, M. Jadhav
With rapid growth in communication orthogonal frequency division multiplexing (OFDM) is multi-carrier communication technique becomes more popular which is used in both wired and wireless communication. OFDM consist of multiple carriers over single channel for signal transmission. OFDM is the time domain signal which is made up of several sinusoids and due to this sinusoids Peak to Average Power Ratio (PAPR)of OFDM signal increases. Due to this high PAPR transmission efficiency reduces so PAPR is major drawback of OFDM. There are several PAPR reduction techniques but, pre-coding techniques shows better result. In this paper, we propose Walsh Hadamard Transform (WHT) and Double Walsh Hadamard Transform (Double WHT). The proposed scheme shows the better results.
{"title":"WHT and Double WHT: An effective PAPR reduction approach in OFDM","authors":"S. Shete, G. Bhide, M. Jadhav","doi":"10.1109/ICAECCT.2016.7942577","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942577","url":null,"abstract":"With rapid growth in communication orthogonal frequency division multiplexing (OFDM) is multi-carrier communication technique becomes more popular which is used in both wired and wireless communication. OFDM consist of multiple carriers over single channel for signal transmission. OFDM is the time domain signal which is made up of several sinusoids and due to this sinusoids Peak to Average Power Ratio (PAPR)of OFDM signal increases. Due to this high PAPR transmission efficiency reduces so PAPR is major drawback of OFDM. There are several PAPR reduction techniques but, pre-coding techniques shows better result. In this paper, we propose Walsh Hadamard Transform (WHT) and Double Walsh Hadamard Transform (Double WHT). The proposed scheme shows the better results.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"16 1","pages":"172-175"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87048612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942594
R. Rajesh, P. Malathi
Digital images are likely to suffer from impulse noise during the process of acquisition and subsequent transmission. In this brief a decision tree based method (DTBM) is presented which effectively removes random valued impulse noise from gray scale images. The pixels corrupted by noise are detected by an impulse detector and are reconstructed using an edge preserving image filter. The reconstructed pixels are written back in an adaptive manner so that they will be available for the next computation. The desirable feature of DTBM is that the design requires simple mathematical computations which results in a cost effective implementation of the system. The quantifiable evaluation and visual quality results of the presented system prove that the system's performance is good in both respects. Image enhancement is done on the denoised image using discrete cosine transform (DCT) which improves the visual quality of the image.
{"title":"An effective denoising and enhancement technique for removal of random impulse noise in images","authors":"R. Rajesh, P. Malathi","doi":"10.1109/ICAECCT.2016.7942594","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942594","url":null,"abstract":"Digital images are likely to suffer from impulse noise during the process of acquisition and subsequent transmission. In this brief a decision tree based method (DTBM) is presented which effectively removes random valued impulse noise from gray scale images. The pixels corrupted by noise are detected by an impulse detector and are reconstructed using an edge preserving image filter. The reconstructed pixels are written back in an adaptive manner so that they will be available for the next computation. The desirable feature of DTBM is that the design requires simple mathematical computations which results in a cost effective implementation of the system. The quantifiable evaluation and visual quality results of the presented system prove that the system's performance is good in both respects. Image enhancement is done on the denoised image using discrete cosine transform (DCT) which improves the visual quality of the image.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"3 1","pages":"256-261"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82564743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942557
V. Gutte, Amol N. Jadhav, Pramod Mundhe
Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.
{"title":"Image management and data access control for Multi-authority cloud storage with use of certificate less encryption","authors":"V. Gutte, Amol N. Jadhav, Pramod Mundhe","doi":"10.1109/ICAECCT.2016.7942557","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942557","url":null,"abstract":"Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"136 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86310007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942585
S. Patil, A. Dani
Image search re-ranking is a powerful method to enhanced result we get from text-based search. We get noisy data from text-based search. The objective of this work is to enhance the system which re-arrange the images which user get from simple text-based search in such a way that, resultant image set contains relevant images. On this challenge, this paper proposed to use the semantic attributes for re-ranking. Every image describe through specific attribute. These attributes have already ready classifiers. User will gets responses from these classifiers on the basis of attribute. Every image in responses have relation with each other by mean of its attribute. This relation supposed to be shown by hypergraph. Images in the hypergraph ranked as per their ranking score. Ranking score represents similarity factor with respect to common attribute of images in hypergraph. This paper use attribute learning of images and hypergraph formation method to get valuable result.
{"title":"Attribute based image retrieval and hypergraph learning based image search reranking","authors":"S. Patil, A. Dani","doi":"10.1109/ICAECCT.2016.7942585","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942585","url":null,"abstract":"Image search re-ranking is a powerful method to enhanced result we get from text-based search. We get noisy data from text-based search. The objective of this work is to enhance the system which re-arrange the images which user get from simple text-based search in such a way that, resultant image set contains relevant images. On this challenge, this paper proposed to use the semantic attributes for re-ranking. Every image describe through specific attribute. These attributes have already ready classifiers. User will gets responses from these classifiers on the basis of attribute. Every image in responses have relation with each other by mean of its attribute. This relation supposed to be shown by hypergraph. Images in the hypergraph ranked as per their ranking score. Ranking score represents similarity factor with respect to common attribute of images in hypergraph. This paper use attribute learning of images and hypergraph formation method to get valuable result.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"44 1","pages":"216-220"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78127038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942633
Mazher Khan, D. M., Sayyad Ajij D.
In Mobile Ad-hoc Network (MANET), there is no centralized infrastructure. Nodes are free to move anywhere in the network so routing is very challenging task. Mobile nodes are responsible for link failure, interference and congestion. Congestion is one of the main reasons for degradation of performance of network. When traffic in the network increases over the stipulated capacity, congestion takes place. The traditional routing protocols are not effective for addressing the received signal strength related problems. In this paper, authors designed a new algorithm using the combination of Ad-hoc on Demand Distance Vector (AODV) and Cross layer design approach. It is referred as Congestion Control AODV (CCAODV) approach. It is used to avoid link break in MANET. Received signal strength is used as cross layer design parameter. The CCAODV protocol creates strong and stable route by using signal strength of node. The signal strength mainly depends on the parameters like transmission power of node and distance between two nodes. The cross layer design approach is tested by using Ns 2.35 simulator and compared with the AODV routing protocol.
{"title":"Cross layer design approach for Congestion Control in MANETs","authors":"Mazher Khan, D. M., Sayyad Ajij D.","doi":"10.1109/ICAECCT.2016.7942633","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942633","url":null,"abstract":"In Mobile Ad-hoc Network (MANET), there is no centralized infrastructure. Nodes are free to move anywhere in the network so routing is very challenging task. Mobile nodes are responsible for link failure, interference and congestion. Congestion is one of the main reasons for degradation of performance of network. When traffic in the network increases over the stipulated capacity, congestion takes place. The traditional routing protocols are not effective for addressing the received signal strength related problems. In this paper, authors designed a new algorithm using the combination of Ad-hoc on Demand Distance Vector (AODV) and Cross layer design approach. It is referred as Congestion Control AODV (CCAODV) approach. It is used to avoid link break in MANET. Received signal strength is used as cross layer design parameter. The CCAODV protocol creates strong and stable route by using signal strength of node. The signal strength mainly depends on the parameters like transmission power of node and distance between two nodes. The cross layer design approach is tested by using Ns 2.35 simulator and compared with the AODV routing protocol.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"464-468"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78876972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942595
Y. Angal, A. Jagtap
Fall is a major health issue among older adults. Fall may cause serious injury to the older adults such as heap fractures and head traumas. A method for detecting falls among older adults is presented which uses the Microsoft Kinect sensor. The system consists of two parts. The first one is to detect fall using Kinect sensor and second part is to generate control signal to send message. To detect fall condition, motion related features are calculated. For this sensor's color and depth output is used. Ground event segmentation is done to detect moving objects from the video stream followed by feature extraction and event classification. After fall detection, help message will send to the registered number so that immediate medical assistance will get. The system works on real time data.
{"title":"Fall detection system for older adults","authors":"Y. Angal, A. Jagtap","doi":"10.1109/ICAECCT.2016.7942595","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942595","url":null,"abstract":"Fall is a major health issue among older adults. Fall may cause serious injury to the older adults such as heap fractures and head traumas. A method for detecting falls among older adults is presented which uses the Microsoft Kinect sensor. The system consists of two parts. The first one is to detect fall using Kinect sensor and second part is to generate control signal to send message. To detect fall condition, motion related features are calculated. For this sensor's color and depth output is used. Ground event segmentation is done to detect moving objects from the video stream followed by feature extraction and event classification. After fall detection, help message will send to the registered number so that immediate medical assistance will get. The system works on real time data.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"32 1","pages":"262-266"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73360587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}