Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262445
P.L.Santhana Krishnan, R. Valli, R. Priya, V. Pravinkumar
Travelling has become one of the most important aspects of human life. In general, the travel bags or luggage carrier systems used by the public were very conventional, which requires a huge human effort with security. In these days, development of electronics reduces the effect on physical work and to tie up between the machine and man which makes the smarter work. The advancements in electronics system can be extended to design a better safe and secure luggage carrier system which leads to reduce the human effort and assures a comfortable hand free journey to the peoples. Our proposed Automated Luggage carrier system is essentially like an electronic porter that follows the operator around wherever he/she goes. It is a hands free load carrying propulsion system that maintains a safe following distance behind the user. Privacy of the luggage bag can be ensured by owner's identity. Location of the system can be tracked using GPS and GSM.A wireless controlled watch is designed as a control element. The traveler will wear the watch to give commands to the luggage system for following him/her.
{"title":"Smart Luggage Carrier system with Theft Prevention and Real Time TrackingUsing Nano Arduino structure","authors":"P.L.Santhana Krishnan, R. Valli, R. Priya, V. Pravinkumar","doi":"10.1109/ICSCAN49426.2020.9262445","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262445","url":null,"abstract":"Travelling has become one of the most important aspects of human life. In general, the travel bags or luggage carrier systems used by the public were very conventional, which requires a huge human effort with security. In these days, development of electronics reduces the effect on physical work and to tie up between the machine and man which makes the smarter work. The advancements in electronics system can be extended to design a better safe and secure luggage carrier system which leads to reduce the human effort and assures a comfortable hand free journey to the peoples. Our proposed Automated Luggage carrier system is essentially like an electronic porter that follows the operator around wherever he/she goes. It is a hands free load carrying propulsion system that maintains a safe following distance behind the user. Privacy of the luggage bag can be ensured by owner's identity. Location of the system can be tracked using GPS and GSM.A wireless controlled watch is designed as a control element. The traveler will wear the watch to give commands to the luggage system for following him/her.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"218 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78425370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262423
P. Raja, A. Thivya, C. Janani
In Digital India ATM is used for financial transactions namely deposits, withdrawals, transfer funds and also it provides multiple facilities such as pay income tax, apply for personal loan, pay insurance premium at anytime without the help of bank authorities. People uses smartcard method for access control in ATM. But, it's difficult to check third person using some other's card, as well smartcard may be theft, missing or duplicated. The debit card issued through bank is activated by insertion of earphone jack into the ATM slot and exit the card to end the transaction. Since, it's not easy for them to put in a headphone into the jack by identifying the slot and to position the device. To defeat these complications, a device is provided with presenter direction to attain the ATM and with an earpiece arrangement for contact. At beginning stage of this device an user can access the door by handprint authentication. In the second stage of security requires the voice code recognition which verifies the user's voice password with already taped code. When it matches correctly, the user is termed as a legal person.
{"title":"Interactive ATM For Visually Challenged","authors":"P. Raja, A. Thivya, C. Janani","doi":"10.1109/ICSCAN49426.2020.9262423","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262423","url":null,"abstract":"In Digital India ATM is used for financial transactions namely deposits, withdrawals, transfer funds and also it provides multiple facilities such as pay income tax, apply for personal loan, pay insurance premium at anytime without the help of bank authorities. People uses smartcard method for access control in ATM. But, it's difficult to check third person using some other's card, as well smartcard may be theft, missing or duplicated. The debit card issued through bank is activated by insertion of earphone jack into the ATM slot and exit the card to end the transaction. Since, it's not easy for them to put in a headphone into the jack by identifying the slot and to position the device. To defeat these complications, a device is provided with presenter direction to attain the ATM and with an earpiece arrangement for contact. At beginning stage of this device an user can access the door by handprint authentication. In the second stage of security requires the voice code recognition which verifies the user's voice password with already taped code. When it matches correctly, the user is termed as a legal person.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"63 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74512763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262300
R. Poovendran, Sneha Nair, S. Shaguftha, R. Shanthini, R. Srilekha
This paper proposes a nano vitality collector dependent on temperature angle utilizing thermoelectric materials. A thermoelectric generator (TEG) produces electrical vitality from temperature contrast. Right now, the gadget is planned to fit as a fiddle for the simplicity of creation.nanoscale gadgets render assortment of ar WNSNs include nanosensors that are familiar with Nano The thermoelectric generator is a wellspring of a sustainable power source. It can change over warmth vitality to electrical vitality utilizing the Seebeck coefficient of the materials. There has been a quick headway in microelectronics which has made the nanotechnology huge and it has prodded the development of remote correspondence. For an occasion, nanosensors can distinguish any concoction organization in fixations as low as one section for every billion In this manner, in thought to the one of a kind qualities of nanosensors, it is impractical and infeasible to fuse any extra circuit in the equipment of nanosensors. Such a working situation of nanosensors gadgets makes an objective of vitality safeguarding because of constrained design battery assets inserted into it. transceiver and nanoantenna working at the Terahertz recurrence band (0.1-10THz). Up until now, analysts have concentrated on vitality productivity in WSNs however the vitality issue in WNSNs has not been tended to fundamentally in the current writing. The reenactment examination is acted in MATLAB Software to experimentally research the exhibition of proposed vitality adjusted bunching consolidating the proper ClusterHead (CH) determination. The fundamental extent of this structured gadget is to give the capacity to remote, biomedical and IoT sensors which devour less vitality to work. Reenactment of this examinationworkhasbeendone in COMSOL Multiphysics.
{"title":"Design of Nano Thermoelectric Generator for Wireless Nano-Sensor Network","authors":"R. Poovendran, Sneha Nair, S. Shaguftha, R. Shanthini, R. Srilekha","doi":"10.1109/ICSCAN49426.2020.9262300","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262300","url":null,"abstract":"This paper proposes a nano vitality collector dependent on temperature angle utilizing thermoelectric materials. A thermoelectric generator (TEG) produces electrical vitality from temperature contrast. Right now, the gadget is planned to fit as a fiddle for the simplicity of creation.nanoscale gadgets render assortment of ar WNSNs include nanosensors that are familiar with Nano The thermoelectric generator is a wellspring of a sustainable power source. It can change over warmth vitality to electrical vitality utilizing the Seebeck coefficient of the materials. There has been a quick headway in microelectronics which has made the nanotechnology huge and it has prodded the development of remote correspondence. For an occasion, nanosensors can distinguish any concoction organization in fixations as low as one section for every billion In this manner, in thought to the one of a kind qualities of nanosensors, it is impractical and infeasible to fuse any extra circuit in the equipment of nanosensors. Such a working situation of nanosensors gadgets makes an objective of vitality safeguarding because of constrained design battery assets inserted into it. transceiver and nanoantenna working at the Terahertz recurrence band (0.1-10THz). Up until now, analysts have concentrated on vitality productivity in WSNs however the vitality issue in WNSNs has not been tended to fundamentally in the current writing. The reenactment examination is acted in MATLAB Software to experimentally research the exhibition of proposed vitality adjusted bunching consolidating the proper ClusterHead (CH) determination. The fundamental extent of this structured gadget is to give the capacity to remote, biomedical and IoT sensors which devour less vitality to work. Reenactment of this examinationworkhasbeendone in COMSOL Multiphysics.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"65 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74420523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The days of solely engaging with a service through a keyboard are over. Users interact with systems more and more through voice assistants and chatbots. A chatbot is a computer program that can converse with humans using Artificial Intelligence in messaging platforms. Every time the chatbot gets input from the user, it saves input and response which helps chatbot with little initial knowledge to evolve using gathered responses. With increased responses, precision of the chatbot also gets increases. The ultimate goal of this project is to add a chatbot feature and API for Matrusri Engineering College. This project will investigate how advancements in Artificial Intelligence and Machine Learning technology are being used to improve many services. Specifically it will look at development of chatbots as a channel for information distribution. The program selects the closest matching response from closest matching statement that matches input utilizing WordNet, it then chooses response from known selection of statements for that response. This project aimed to implement online chatbot system to assist users who access college website, using tools that expose Artificial Intelligence methods such as Natural Language Processing, allowing users to communicate with college chatbot using natural language input and to train chatbot using appropriate Machine Learning methods so it will be able to generate a response. There are numerous applications that are incorporating a human appearance and intending to simulate human dialog, yet in most part of the cases knowledge of chatbot is stored in a database created by a human expert.
{"title":"Smart College Chatbot using ML and Python","authors":"Hrushikesh Koundinya K, Ajay Krishna Palakurthi, Vaishnavi Putnala, Ashok Kumar K","doi":"10.1109/ICSCAN49426.2020.9262426","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262426","url":null,"abstract":"The days of solely engaging with a service through a keyboard are over. Users interact with systems more and more through voice assistants and chatbots. A chatbot is a computer program that can converse with humans using Artificial Intelligence in messaging platforms. Every time the chatbot gets input from the user, it saves input and response which helps chatbot with little initial knowledge to evolve using gathered responses. With increased responses, precision of the chatbot also gets increases. The ultimate goal of this project is to add a chatbot feature and API for Matrusri Engineering College. This project will investigate how advancements in Artificial Intelligence and Machine Learning technology are being used to improve many services. Specifically it will look at development of chatbots as a channel for information distribution. The program selects the closest matching response from closest matching statement that matches input utilizing WordNet, it then chooses response from known selection of statements for that response. This project aimed to implement online chatbot system to assist users who access college website, using tools that expose Artificial Intelligence methods such as Natural Language Processing, allowing users to communicate with college chatbot using natural language input and to train chatbot using appropriate Machine Learning methods so it will be able to generate a response. There are numerous applications that are incorporating a human appearance and intending to simulate human dialog, yet in most part of the cases knowledge of chatbot is stored in a database created by a human expert.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"52 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79860780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262340
K. Muninathan, D. V. Prasanna, N. Gowtham, B. Paul, K. Vikneshpriya
In atmosphere the air contains 0.04 percentage of Carbon dioxide which plays an major role in maintaining optimal condition of earth by increasing photosynthesis in green plants and trees for their growth and other advantages like supplying oxygen and rainfall etc..., but in recent days due to the increasing in the percentage of carbon dioxide leads to major issues like global warming which leads to melting of glaciers and raising water level. The major amount nearly 85 percentage of carbon dioxide is released from the automobiles, which is causing adverse effect in atmosphere. The main purpose of this project is to do numerical analysis CFD for reducing the emission and controlling the emission of carbon dioxide from automobiles by methods of adsorption of carbon dioxide using activated charcoal (carbon) and alumina based adsorbents in petrol operated engines and comparing them with other. One of the best material for absorbing the CO2 is charcoal due to its high degree of porosity. When reacted with other reagents in order of activation, it increases its capacity of adsorption than that of ordinary charcoal. Similarly, Alumina is subjected to phase transformation to form γ Alumina to increase its porosity.
{"title":"Experimental and Numerical Studies on Catalytic Converter to Reduce CO2 Emissions in IC Engines","authors":"K. Muninathan, D. V. Prasanna, N. Gowtham, B. Paul, K. Vikneshpriya","doi":"10.1109/ICSCAN49426.2020.9262340","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262340","url":null,"abstract":"In atmosphere the air contains 0.04 percentage of Carbon dioxide which plays an major role in maintaining optimal condition of earth by increasing photosynthesis in green plants and trees for their growth and other advantages like supplying oxygen and rainfall etc..., but in recent days due to the increasing in the percentage of carbon dioxide leads to major issues like global warming which leads to melting of glaciers and raising water level. The major amount nearly 85 percentage of carbon dioxide is released from the automobiles, which is causing adverse effect in atmosphere. The main purpose of this project is to do numerical analysis CFD for reducing the emission and controlling the emission of carbon dioxide from automobiles by methods of adsorption of carbon dioxide using activated charcoal (carbon) and alumina based adsorbents in petrol operated engines and comparing them with other. One of the best material for absorbing the CO2 is charcoal due to its high degree of porosity. When reacted with other reagents in order of activation, it increases its capacity of adsorption than that of ordinary charcoal. Similarly, Alumina is subjected to phase transformation to form γ Alumina to increase its porosity.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"58 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84160468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262285
M. Islam, Mohammad Anisul Hasan, S. M. Tanzibul Islam, Naeemul Islam, Md. Lokman Hossain
In this research paper, a new approach for digital watermarking using the spread spectrum method is proposed that can address the enduring issues faced with copyrighting digital data. Discrete Wavelet Transform (DWT) technique is applied to overcome the problems concerning authentication and protection of digital media. The aim is to hide the watermark image in the host image without affecting its robustness. After going through the implementation, the invisibility of the watermark image is almost 100%, and the robustness of the host image is around 80%, which is good enough to ensure the protection of contents from different attacks. This watermarking method will ensure the authentication of digital media, and it can be used for limiting usage control, content labeling to protect the ownership, and making an assertion about the owner.
{"title":"Analysis and Implementation of Digital Watermarking Using Spread Spectrum Method","authors":"M. Islam, Mohammad Anisul Hasan, S. M. Tanzibul Islam, Naeemul Islam, Md. Lokman Hossain","doi":"10.1109/ICSCAN49426.2020.9262285","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262285","url":null,"abstract":"In this research paper, a new approach for digital watermarking using the spread spectrum method is proposed that can address the enduring issues faced with copyrighting digital data. Discrete Wavelet Transform (DWT) technique is applied to overcome the problems concerning authentication and protection of digital media. The aim is to hide the watermark image in the host image without affecting its robustness. After going through the implementation, the invisibility of the watermark image is almost 100%, and the robustness of the host image is around 80%, which is good enough to ensure the protection of contents from different attacks. This watermarking method will ensure the authentication of digital media, and it can be used for limiting usage control, content labeling to protect the ownership, and making an assertion about the owner.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81790445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262425
R. Suganya, R. Revathy, R. Priya
Voltage constancy lingers to be a regulating phenomenon in numerous power systems world-wide. When pooled with a incessant progress in load, the surplous of adequate and most favorable stationed procreation in synchronous with the bankruptcy to frame the first hand different transmission poise has facade copious systems to be susceptible to bearings of uncontainable system potentials. In its most rigid contour, voltage stableness can result in confined or regular spill system collapse. To accord with severe issue, many services have assigned the survey of voltage steadiness as a fundamental element in entity plan and processing. While passable mechanism of voltage stability scrutiny has risen in modernistic years and extensive tools have been refined, the concern of load modeling remains a protest. This paper involves modeling the different types of loads in order to predict the maximum deliverable power.
{"title":"Modeling of Loads Using PSAT in Voltage Stability for Six Bus System","authors":"R. Suganya, R. Revathy, R. Priya","doi":"10.1109/ICSCAN49426.2020.9262425","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262425","url":null,"abstract":"Voltage constancy lingers to be a regulating phenomenon in numerous power systems world-wide. When pooled with a incessant progress in load, the surplous of adequate and most favorable stationed procreation in synchronous with the bankruptcy to frame the first hand different transmission poise has facade copious systems to be susceptible to bearings of uncontainable system potentials. In its most rigid contour, voltage stableness can result in confined or regular spill system collapse. To accord with severe issue, many services have assigned the survey of voltage steadiness as a fundamental element in entity plan and processing. While passable mechanism of voltage stability scrutiny has risen in modernistic years and extensive tools have been refined, the concern of load modeling remains a protest. This paper involves modeling the different types of loads in order to predict the maximum deliverable power.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90479780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262316
Kowsalya N, Lavanya S, Sri Madhava Raja N, S. Padmapriya
Due to various reasons, most of the humans are suffering due to several brain disorders. If the brain illness is identified in the pre-mature level, it is possible to suggest treatment process to cure/control the disease/disorders. One of such disease is schizophrenia. It is a brain disorder which can affect the regular behaviour of a person. The symptoms of schizophrenia are problems with thought process, decision making and emotional instability. Signal (EEG) and images based techniques are used to identify the schizophrenia. The proposed work aims to detect schizophrenia using brain MRI images. The work executes a series of image processing techniques including pre-processing, segmentation and performance validation. The experimental results implies that, proposed method provides improved results on the MRI images.
{"title":"Diagnosis of schizophrenic brain MRI images using Level- Set Evolution","authors":"Kowsalya N, Lavanya S, Sri Madhava Raja N, S. Padmapriya","doi":"10.1109/ICSCAN49426.2020.9262316","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262316","url":null,"abstract":"Due to various reasons, most of the humans are suffering due to several brain disorders. If the brain illness is identified in the pre-mature level, it is possible to suggest treatment process to cure/control the disease/disorders. One of such disease is schizophrenia. It is a brain disorder which can affect the regular behaviour of a person. The symptoms of schizophrenia are problems with thought process, decision making and emotional instability. Signal (EEG) and images based techniques are used to identify the schizophrenia. The proposed work aims to detect schizophrenia using brain MRI images. The work executes a series of image processing techniques including pre-processing, segmentation and performance validation. The experimental results implies that, proposed method provides improved results on the MRI images.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262324
S. Uthayashangar, J. Abinaya, V. Harshini, R. Jayavardhani
In this paper, the role re-encryption is used to avoid the privacy data lekage and also to avoid the deduplication in a secure role re-encryption system(SRRS). And also it checks for the proof of ownership for to identify whether the user is authorized user or not. This is for the efficiency. Role re-encrytion method is to share the access key for the corresponding authorized user for accessing the particular file without the leakage of privacy data. In our project we are using both the avoidance of text and digital images. For example we have the personnal images in our mobile, handheld devices, and in the desktop etc., So, as these images have to keep secure and so we are using the encryption for to increase the high security. The text file also important for the users now-a-days. It has to keep secure in a cloud server. Digital images have to be protected over the communication, however generally personal identification details like copies of pan card, Passport, ATM, etc., to store on one's own pc. So, we are protecting the text file and image data for avoiding the duplication in our proposed system.
{"title":"Image And Text Encrypted Data With Authorized Deduplication In Cloud","authors":"S. Uthayashangar, J. Abinaya, V. Harshini, R. Jayavardhani","doi":"10.1109/ICSCAN49426.2020.9262324","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262324","url":null,"abstract":"In this paper, the role re-encryption is used to avoid the privacy data lekage and also to avoid the deduplication in a secure role re-encryption system(SRRS). And also it checks for the proof of ownership for to identify whether the user is authorized user or not. This is for the efficiency. Role re-encrytion method is to share the access key for the corresponding authorized user for accessing the particular file without the leakage of privacy data. In our project we are using both the avoidance of text and digital images. For example we have the personnal images in our mobile, handheld devices, and in the desktop etc., So, as these images have to keep secure and so we are using the encryption for to increase the high security. The text file also important for the users now-a-days. It has to keep secure in a cloud server. Digital images have to be protected over the communication, however generally personal identification details like copies of pan card, Passport, ATM, etc., to store on one's own pc. So, we are protecting the text file and image data for avoiding the duplication in our proposed system.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"127 3 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87758432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-03DOI: 10.1109/ICSCAN49426.2020.9262335
M. Akshaya, R. Nithushaa, N. M. Raja, S. Padmapriya
Back Propagation Network is the most commonly used algorithm in training neural networks. It is employed in processing the image and data to implement an automated kidney stone classification. The conventional technique for medical resonance kidney images classification and stone detection is by human examination. This method is not accurate since it is impractical to handle large amount of data. Magnetic Resonance (MR) Images may inherently possess noise caused by operator errors. This causes earnest inaccuracies in classification features/ diseases in image processing. However, usage of artificial intelligent based methods along with neural networks and feature extraction has shown great potential in extracting the region of interest using back propagation network algorithm in this field. In this work, the Back Propagation Network was applied for the objective of kidney stone detection. Decision making is carried out in two stages: 1.Feature extraction 2.Image classification. The feature extraction is done using the principal component analysis and the image classification is done using Back Propagation Network (BPN). This work presents segmentation method using Fuzzy C-Mean (FCM) clustering algorithm. The performance of the BPN classifier was estimated in terms of training execution and classification accuracies. Back Propagation Network gives precise classification when compared to other methods based on neural networks.
{"title":"Kidney Stone Detection Using Neural Networks","authors":"M. Akshaya, R. Nithushaa, N. M. Raja, S. Padmapriya","doi":"10.1109/ICSCAN49426.2020.9262335","DOIUrl":"https://doi.org/10.1109/ICSCAN49426.2020.9262335","url":null,"abstract":"Back Propagation Network is the most commonly used algorithm in training neural networks. It is employed in processing the image and data to implement an automated kidney stone classification. The conventional technique for medical resonance kidney images classification and stone detection is by human examination. This method is not accurate since it is impractical to handle large amount of data. Magnetic Resonance (MR) Images may inherently possess noise caused by operator errors. This causes earnest inaccuracies in classification features/ diseases in image processing. However, usage of artificial intelligent based methods along with neural networks and feature extraction has shown great potential in extracting the region of interest using back propagation network algorithm in this field. In this work, the Back Propagation Network was applied for the objective of kidney stone detection. Decision making is carried out in two stages: 1.Feature extraction 2.Image classification. The feature extraction is done using the principal component analysis and the image classification is done using Back Propagation Network (BPN). This work presents segmentation method using Fuzzy C-Mean (FCM) clustering algorithm. The performance of the BPN classifier was estimated in terms of training execution and classification accuracies. Back Propagation Network gives precise classification when compared to other methods based on neural networks.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"53 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85819526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}