Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262296
S. Sandhya, A. Suhasini, Mukul Kumar
Diabetic retinopathy is a bypassed infection and a diabetes confusion that influences eyes. It's brought about by harm to the veins of the light-touchy tissue at the rear of the eye (retina). The tremendous populace of diabetic patients and their huge screening necessities have brought forth enthusiasm for PC supported and totally programmed discovery of DR. Early detection of DR is critical for diagnosis and treatment of DR, which has led to a great deal of research towards the research of abnormal features related to DR that can be microneurysms, haemorrhages, hard exudates, etc. Most of the currently used classification techniques increases screening time, human error, complexity and reduce the accuracy. The proposed method involves feature extraction, augmentation and calculation of accuracy using CNN. The proposed model is implemented using Conda, along with Tensorflow and Keras Framework utilizing the Messidor dataset.
{"title":"Detection and Scrutiny of Diabetic Retinopathy Using Machine Learning Modus","authors":"S. Sandhya, A. Suhasini, Mukul Kumar","doi":"10.1109/ICSCAN49426.2020.9262296","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262296","url":null,"abstract":"Diabetic retinopathy is a bypassed infection and a diabetes confusion that influences eyes. It's brought about by harm to the veins of the light-touchy tissue at the rear of the eye (retina). The tremendous populace of diabetic patients and their huge screening necessities have brought forth enthusiasm for PC supported and totally programmed discovery of DR. Early detection of DR is critical for diagnosis and treatment of DR, which has led to a great deal of research towards the research of abnormal features related to DR that can be microneurysms, haemorrhages, hard exudates, etc. Most of the currently used classification techniques increases screening time, human error, complexity and reduce the accuracy. The proposed method involves feature extraction, augmentation and calculation of accuracy using CNN. The proposed model is implemented using Conda, along with Tensorflow and Keras Framework utilizing the Messidor dataset.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"30 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87936019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262301
Ritul Saini, Sanjana, Shubham Gairola, V. Vinayak, Kuldeep Singh
With the growing population, there has been a continuous increase in the demand of energy resources. This demand is met mainly by fossil fuels and its derivative but due to their scarcity they are unsustainable. There is a need for an alternative energy resources like Solar, Hydro, Wind, Tidal and Piezoelectricity etc. The goal of this paper is to develop a working model of a piezoelectric tile that stores energy when pressure is applied on it. The tile generates voltage and this voltage is further stored in a capacitor. As long as the capacitor is charged to rated voltage, which is maintained higher than the battery specification, the battery keeps on charging. This is finally used to meet different load requirements. Through our paper, we have tried to bring the solutions to the two major problems that are commercial viability and its easy storage. The tile construction makes the usage of piezoelectricity in our daily lives easy and viable.
{"title":"Energy Harvesting through Piezoelectric Tile","authors":"Ritul Saini, Sanjana, Shubham Gairola, V. Vinayak, Kuldeep Singh","doi":"10.1109/ICSCAN49426.2020.9262301","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262301","url":null,"abstract":"With the growing population, there has been a continuous increase in the demand of energy resources. This demand is met mainly by fossil fuels and its derivative but due to their scarcity they are unsustainable. There is a need for an alternative energy resources like Solar, Hydro, Wind, Tidal and Piezoelectricity etc. The goal of this paper is to develop a working model of a piezoelectric tile that stores energy when pressure is applied on it. The tile generates voltage and this voltage is further stored in a capacitor. As long as the capacitor is charged to rated voltage, which is maintained higher than the battery specification, the battery keeps on charging. This is finally used to meet different load requirements. Through our paper, we have tried to bring the solutions to the two major problems that are commercial viability and its easy storage. The tile construction makes the usage of piezoelectricity in our daily lives easy and viable.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"2002 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88386955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262407
R. Saranya, C. Karthikeyan, V.S.Yashwanth Kumar, Rahul Kumar
Real time suspicious activities have been taken place every day at public places which threatens people, for that identification of Criminal person or missing person is necessary for police to take necessary action immediately so the crime rate will be reduced. This Project helps police by identifying of persons from datasets provided and trained and matches using face recognition using Deep neural networks which gives better accuracy. After the identification it detects and sends message to police with respective details and by sharing location currently person spotted. This done by recognizing and identifying the persons from database using face recognition Algorithm to detect faces of person accurately. It can also able to detect the person from 14 feet distance and tells the person is spotted or not. this system really useful when we try to solve real time problems occurred immediately and all actions can be taken place by IOT.
{"title":"Computer Vision on Identifying Persons under Real Time Surveillance using IOT","authors":"R. Saranya, C. Karthikeyan, V.S.Yashwanth Kumar, Rahul Kumar","doi":"10.1109/ICSCAN49426.2020.9262407","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262407","url":null,"abstract":"Real time suspicious activities have been taken place every day at public places which threatens people, for that identification of Criminal person or missing person is necessary for police to take necessary action immediately so the crime rate will be reduced. This Project helps police by identifying of persons from datasets provided and trained and matches using face recognition using Deep neural networks which gives better accuracy. After the identification it detects and sends message to police with respective details and by sharing location currently person spotted. This done by recognizing and identifying the persons from database using face recognition Algorithm to detect faces of person accurately. It can also able to detect the person from 14 feet distance and tells the person is spotted or not. this system really useful when we try to solve real time problems occurred immediately and all actions can be taken place by IOT.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"10 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75437647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262395
R. Parthiban, V. Abarna, M. Banupriya, S. Keerthana, D. Saravanan
Phishing is a process ofimitating payment and other account login pages to get the actual user credentials. Phishing, attacks mostly executed on banking logins, because they are most valuable for money motive hackers. It's mostly targeted on senior citizens, Because they are not assertive on checking page SSL signatures and don't want to increase the steps to login account. So here phishing prevention is a idea to make dynamic signature on regular account authentication page. It's achieved by image as signature chosen by user. Every user account having this image as signature to verify at the time of login. Users no need to put more effort to identify the phishing page. It prevents generic phishing page and also can prevent from web bot scripts.
{"title":"Web Folder Phishing Discovery and Prevention with Customer Image Verification","authors":"R. Parthiban, V. Abarna, M. Banupriya, S. Keerthana, D. Saravanan","doi":"10.1109/ICSCAN49426.2020.9262395","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262395","url":null,"abstract":"Phishing is a process ofimitating payment and other account login pages to get the actual user credentials. Phishing, attacks mostly executed on banking logins, because they are most valuable for money motive hackers. It's mostly targeted on senior citizens, Because they are not assertive on checking page SSL signatures and don't want to increase the steps to login account. So here phishing prevention is a idea to make dynamic signature on regular account authentication page. It's achieved by image as signature chosen by user. Every user account having this image as signature to verify at the time of login. Users no need to put more effort to identify the phishing page. It prevents generic phishing page and also can prevent from web bot scripts.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"7 9","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72618952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262347
R. Keerthana, Dr. T. Ananth kumar, P. Manjubala, M. Pavithra
This paper examines the imminent of a voice empowered route aide for an individual client in an obscure landscape. This paper opens up the chance of the route framework for the individual clients to give the exact area data in the new landscape. It is probably going to grip a substantially more critical blow in broad daylight places, for example, clinics, transport stations, railroad stations, air terminals and shopping-shopping centres. This paper utilizes Google Map API to give data. This framework is a self-overseeing program which is cost ideal and permits the local clients to get to this program. Local clients who don't know about the exact area in the tremendous territory will discover this administration as the most useful one. The essential target in the plan of this paper depends on the Human-Machine communication. This route framework utilizes Text-to-Speech to aid the route administration through voice. Right now, consider the sound-related contribution from an individual and produce the discourse which is proportionate with watchwords accessible in the database and react utilizing already stored messages to guide the client to the ideal goal. The headings are offered to the client through sound signs. The positions are spoken to as longitude and scope focuses by the GPS collector. By giving the fitting directions the client can get the reaction through the method of sound sign. The created framework likewise supplements the local client with an illustrative help for headings to the goal.
{"title":"An Interactive Voice Assistant System for Guiding the Tourists in Historical places","authors":"R. Keerthana, Dr. T. Ananth kumar, P. Manjubala, M. Pavithra","doi":"10.1109/ICSCAN49426.2020.9262347","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262347","url":null,"abstract":"This paper examines the imminent of a voice empowered route aide for an individual client in an obscure landscape. This paper opens up the chance of the route framework for the individual clients to give the exact area data in the new landscape. It is probably going to grip a substantially more critical blow in broad daylight places, for example, clinics, transport stations, railroad stations, air terminals and shopping-shopping centres. This paper utilizes Google Map API to give data. This framework is a self-overseeing program which is cost ideal and permits the local clients to get to this program. Local clients who don't know about the exact area in the tremendous territory will discover this administration as the most useful one. The essential target in the plan of this paper depends on the Human-Machine communication. This route framework utilizes Text-to-Speech to aid the route administration through voice. Right now, consider the sound-related contribution from an individual and produce the discourse which is proportionate with watchwords accessible in the database and react utilizing already stored messages to guide the client to the ideal goal. The headings are offered to the client through sound signs. The positions are spoken to as longitude and scope focuses by the GPS collector. By giving the fitting directions the client can get the reaction through the method of sound sign. The created framework likewise supplements the local client with an illustrative help for headings to the goal.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75548121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262309
G. Vallathan, Vetriveeran Rajamani, M. P. Harinee
The rapid advancement of Multimedia Communication Technology offers a unified resource of distributing and remote access to patient data. Monitoring the patients at their home can extensively minimize the increasing traffic at medical centres and hospitals. However, when medical data is sent across internet, the question of retaining patient data confidentially and reliability is suspicious. This aspect serves as a motivation for this paper. The proposed framework exploits contourlet transform coefficients to choose contour regions of the medical image which combines steganography and encryption technique to protect patient confidential data. In this system, a unified iterative process is proposed to resolve such difficulty. Moreover, we have employed a renowned Encryption algorithm in order to secure patient related data. This framework allows medical image to conceal its resultant patient confidential information and other medical data to assure the combination between medical image and the rest. Experimental results illustrates that the proposed framework proves to offer minimum retrieval error rate and as well perform better for a variety of biomedical images including CT scan, MRI and X-rays than the existing schemes. The performance parameter namely Peak signal to noise ratio, Payload, SSIM and Mean square error values are computed for the reconstructed image. The outcome of the proposed framework is exceptionally gainful and serves as a solution for healthcare services.
{"title":"Enhanced Medical Data Security and Perceptual Quality for Healthcare services","authors":"G. Vallathan, Vetriveeran Rajamani, M. P. Harinee","doi":"10.1109/ICSCAN49426.2020.9262309","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262309","url":null,"abstract":"The rapid advancement of Multimedia Communication Technology offers a unified resource of distributing and remote access to patient data. Monitoring the patients at their home can extensively minimize the increasing traffic at medical centres and hospitals. However, when medical data is sent across internet, the question of retaining patient data confidentially and reliability is suspicious. This aspect serves as a motivation for this paper. The proposed framework exploits contourlet transform coefficients to choose contour regions of the medical image which combines steganography and encryption technique to protect patient confidential data. In this system, a unified iterative process is proposed to resolve such difficulty. Moreover, we have employed a renowned Encryption algorithm in order to secure patient related data. This framework allows medical image to conceal its resultant patient confidential information and other medical data to assure the combination between medical image and the rest. Experimental results illustrates that the proposed framework proves to offer minimum retrieval error rate and as well perform better for a variety of biomedical images including CT scan, MRI and X-rays than the existing schemes. The performance parameter namely Peak signal to noise ratio, Payload, SSIM and Mean square error values are computed for the reconstructed image. The outcome of the proposed framework is exceptionally gainful and serves as a solution for healthcare services.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73203004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262349
R. Abirami, E. Gnanamanoharan, S. Sivagnanam, K. Priya
A slotted circular shaped patch antenna with microstrip line feed is printed on FR4(Field Retardant material) epoxy substrate which has a constant dielectric 4.4. The designed antenna covers a bandwidth of (13.6-27.2GHz) having three resonance frequency with perfect return loss (VSWR ≤2) and maximum gain of 2.28dBi. The proposed antenna is being simulated by HFSS(High Frequency Structural Simulator) in which we get good return loss, VSWR, radiation pattern, gain and surface current of the antenna. Moreover the antenna can be used in K band and KU band communications along with other communication channels such as C band (4-8GHz), X band (8-12GHz),Wi-Fi, WLAN, WiMAX, and MVDDS wireless communication systems.
{"title":"Design of Compact Microstrip Patch Antenna for K Band and KU Band Applications","authors":"R. Abirami, E. Gnanamanoharan, S. Sivagnanam, K. Priya","doi":"10.1109/ICSCAN49426.2020.9262349","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262349","url":null,"abstract":"A slotted circular shaped patch antenna with microstrip line feed is printed on FR4(Field Retardant material) epoxy substrate which has a constant dielectric 4.4. The designed antenna covers a bandwidth of (13.6-27.2GHz) having three resonance frequency with perfect return loss (VSWR ≤2) and maximum gain of 2.28dBi. The proposed antenna is being simulated by HFSS(High Frequency Structural Simulator) in which we get good return loss, VSWR, radiation pattern, gain and surface current of the antenna. Moreover the antenna can be used in K band and KU band communications along with other communication channels such as C band (4-8GHz), X band (8-12GHz),Wi-Fi, WLAN, WiMAX, and MVDDS wireless communication systems.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"20 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73656188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262302
C. Sundaram, M. Abiraman
Combustion is a process that occurs place &creates heat which transforms heat energy to Kinetic energy. We generally familiar to use IC-Engines in Vehicles and transportation. But in general we knew that combustion will not take place complete and produces unwanted toxic gases, which is one of the major causes of environment pollution. The introduction of clean air act amendments (CAAA) of 1990, Kyoto protocol of 1996 and Conference of the Parties (COP-21) of 2015 force many limitations on the emission level of pollutants also, the development of the Automobile Technology has initiated many positive steps for reduction the emission control. With newer technologies which paves way and time to convert all convention transportation into e-bikes, e-Scooters and e-Cars. The batteries of e-vehicles can also rapid charge like electronics gadgets. They require very less running cost & 100% pollution free. But they can't share load capability and not convenient for prolong run. So, it's necessary to prefer the engines with high power and large running capacity.
{"title":"Magnetic Piston Operated Engine","authors":"C. Sundaram, M. Abiraman","doi":"10.1109/ICSCAN49426.2020.9262302","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262302","url":null,"abstract":"Combustion is a process that occurs place &creates heat which transforms heat energy to Kinetic energy. We generally familiar to use IC-Engines in Vehicles and transportation. But in general we knew that combustion will not take place complete and produces unwanted toxic gases, which is one of the major causes of environment pollution. The introduction of clean air act amendments (CAAA) of 1990, Kyoto protocol of 1996 and Conference of the Parties (COP-21) of 2015 force many limitations on the emission level of pollutants also, the development of the Automobile Technology has initiated many positive steps for reduction the emission control. With newer technologies which paves way and time to convert all convention transportation into e-bikes, e-Scooters and e-Cars. The batteries of e-vehicles can also rapid charge like electronics gadgets. They require very less running cost & 100% pollution free. But they can't share load capability and not convenient for prolong run. So, it's necessary to prefer the engines with high power and large running capacity.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"59 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80919104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262353
Ashish Sharad Rajole, Apoorv Pratap Singh, Sairam Ramakrishnan, Ammar Ahmad Khan, K. R. Kumar, T. Radharamanan
A bstract-Paraplegia is a special case of disability where the lower extremitiesare paralyzed. Paraplegic people have constraints on daily activities and often depend on others. It is important to shape their living environments considering their physical disability. Thus, it is essential to consider the problems of paraplegic people in Activities of Daily Living (ADL). For the design of paraplegic-friendly homes and workspaces it is necessary to determine the workspace dimensions of paraplegic patients. This requires the use of an anthropometric database for paraplegic patients, on which there is a lack of research in India. This study focuses on determining the ADL constraints and workspace dimensions of paraplegic patients in Kozhikode. An open-ended type semi-structured survey was conducted among nineteen paraplegic patients in Kozhikode, Kerala. The survey results showed that paraplegic patients have difficulty in staying in one body position for a long time and in performing household tasks. The lack of assistive devices in public transportation prohibited paraplegic patients from using them. The body part most affected in paraplegic patients in performing strenuous tasks was the back, followed by the shoulders. Eighteen anthropometric parameters were taken in the seated posture for the paraplegic patients. Statistical analysis was performed and the 5th, 50th and 95th percentile anthropometric parameters are presented for male and females. Based on the anthropometric parameters, the workspace available for paraplegic patients is determined graphically by using Das and Grady's concept modified by Nowak. The limitations of this study along with future research areas is also stated.
{"title":"Determination of ADL constraints and workspace dimensions for paraplegic patients in Kozhikode","authors":"Ashish Sharad Rajole, Apoorv Pratap Singh, Sairam Ramakrishnan, Ammar Ahmad Khan, K. R. Kumar, T. Radharamanan","doi":"10.1109/ICSCAN49426.2020.9262353","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262353","url":null,"abstract":"A bstract-Paraplegia is a special case of disability where the lower extremitiesare paralyzed. Paraplegic people have constraints on daily activities and often depend on others. It is important to shape their living environments considering their physical disability. Thus, it is essential to consider the problems of paraplegic people in Activities of Daily Living (ADL). For the design of paraplegic-friendly homes and workspaces it is necessary to determine the workspace dimensions of paraplegic patients. This requires the use of an anthropometric database for paraplegic patients, on which there is a lack of research in India. This study focuses on determining the ADL constraints and workspace dimensions of paraplegic patients in Kozhikode. An open-ended type semi-structured survey was conducted among nineteen paraplegic patients in Kozhikode, Kerala. The survey results showed that paraplegic patients have difficulty in staying in one body position for a long time and in performing household tasks. The lack of assistive devices in public transportation prohibited paraplegic patients from using them. The body part most affected in paraplegic patients in performing strenuous tasks was the back, followed by the shoulders. Eighteen anthropometric parameters were taken in the seated posture for the paraplegic patients. Statistical analysis was performed and the 5th, 50th and 95th percentile anthropometric parameters are presented for male and females. Based on the anthropometric parameters, the workspace available for paraplegic patients is determined graphically by using Das and Grady's concept modified by Nowak. The limitations of this study along with future research areas is also stated.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"125 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77979123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262427
K. Narayanan, M. Shanmugam, S. Kabilan
A new series of 1-allyl-2,6-diarylpiperidone $O$-allyl oximes 13–18 were synthesized from 2,6-diarylpiperidones through various steps. The structures of all the compounds are characterized by their IR, NMR, (1D & 2D NMR) and mass spectral studies. Based on the spectral values and coupling constants all the compounds exist in chair conformation except 18 in boat conformation. Also, all the synthesized compounds are screened for their antimicrobial activity against several bacterial and fungal strains. p-Chloro-2,6-diphenyl substituted compound 15, showed remarkable activity against A.niger and compound 17 against Pseudomonas and A.flavus strains.
{"title":"Synthesis, spectral characterization and antimicrobial evaluation of some novel N-allyl-2,6-diarylpiperidone O-allyl oximes","authors":"K. Narayanan, M. Shanmugam, S. Kabilan","doi":"10.1109/ICSCAN49426.2020.9262427","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262427","url":null,"abstract":"A new series of 1-allyl-2,6-diarylpiperidone $O$-allyl oximes 13–18 were synthesized from 2,6-diarylpiperidones through various steps. The structures of all the compounds are characterized by their IR, NMR, (1D & 2D NMR) and mass spectral studies. Based on the spectral values and coupling constants all the compounds exist in chair conformation except 18 in boat conformation. Also, all the synthesized compounds are screened for their antimicrobial activity against several bacterial and fungal strains. p-Chloro-2,6-diphenyl substituted compound 15, showed remarkable activity against A.niger and compound 17 against Pseudomonas and A.flavus strains.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"171 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79432949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}