Volume-2 (International Conference on Electrical, Information and Communication Technologies (ICEICT -2017))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Surveillance and Target Engagement using Robots |
Country | : | India |
Authors | : | Balaji.M || Karthick.S || Manikandan.V || Benedict Ebinesar.J || Vijay Nagaraj. CT |
Abstract: This paper presents an approach that can be used for military to avoid bloodshed. Over the years, India has heavily suffered from border encroachment. Soldiers from other nation infiltrate our country through places where human intervention is not possible. Considering this we have designed a robot that is capable of performing surveillance and transmit the live stream of the area continuously without using human help in a tough terrain and attack the unauthorized persons who seek entrance in to our homeland. The robot is designed such that it is capable of working in a hilly area too, and the robot will be equipped with a gun, that is capable of loading and an android mobile with a high definition camera will be used for video streaming. Thus our objective is to make a full featured surveillance and attacking robot using an easily available Android Smartphone that can be easily controlled over the Internet with any complexity and high cost.
Keywords - Android operated, robotics, surveillance, target identify, wireless.
[2]. Chinmay Kulkarni, Suhas Grama, "Surveillance Robot Using Arduino Microcontroller, Android APIs and the Internet."IEEE Computer Society, International Conference on Systems Informatics, Modelling and Simulation,2016.
[3]. Yuan Yuan Li and Lynne E. Parker, "Intruder detection using a wireless sensor network with an intelligent mobile robot response" IEEE Robotics and Automation, 2015
[4]. Enric Galceran, Marc Carreras "A survey on coverage path planning for robotics", [Robotics and Autonomous Systems, Elsevier], 2013, vol:61, pg.no-1258-1276.
[5]. Azzeddine Bakdi, Abdelfetah Hentout," Optimal Path Planning and Execution for Mobile Robots using genetic Algorithm and Adaptive Fuzzy- Logic", Robotics and Autonomous System May 2016.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of Digital Breathe Alcohol Threshold Limit Detector Using Microcontroller |
Country | : | India |
Authors | : | Mrs.P.Geethabai ME || L.Deepika || M.Dharani || P.Haripriya || G.Lavanya |
Abstract: In many countries of the world a major course of vehicle accident is attributed to driving under the influence of alcohol. Various solutions to this problem have been found by the use of different types of technology. The digital breathe alcohol threshold limit detector proposed in this paper correlates the breathe alcohol concentration (BrAC) to the blood alcohol concentration (BAC) and determines the amount of BrAC required for safe driving. This is achieved by using a stable and sensitive gas sensor to detect the amount of alcohol particularly ethanol in the breath of the driver..............
Keywords – Alcohol, alcohol detector, blood, breath, Microcontroller, Road Safety.
[2]. Anil Kumar Chawla, P. CheenaChawla, and SeemaChaudhary, Knowledge, Attitude and Social Behaviour about the use of Disposable Breath Analyzers for Preventing Road Accidents due to Drink and Drive - A cross sectional study in New Delhi-NCR, International Journal of Research in Management and Technology, 4(5), 2014, 232-244.
[3]. Evidential Breath Alcohol Analysis Instrument: A Guide to Type Approval Procedures for Evidential Breath Alcohol Analysis Instrument used for Law Enforcement in Great Britain, The Home Office Centre for Applied Science and Technology, Woodcock Hill, Sandridge, St. Albans, Al4 9HQ, June, 2013.
[4]. Ian R. Coyle, David Field and Graham A. Starmer, An Inconvenient Truth: Legal Implications of Errors in Breath Alcohol Analysis Arising from Statistical Uncertainty, Australian Journal of Forensic Sciences, 42(2), 2010, 101-114. http://epublications.bond.edu.au/law_pubs/337
[5]. N .G. Ntsasa and J. Tshilongo, Impact of Breath Alcohol Testing on Safety of South African Roads, National Metrology Institute of South Africa (NMISA), Lynnwood Ridge. http://www.nla.org.za/conferences/proceedings_archive/2010/03_Tuesday%2009%20Nov%202010/Papers/T205%20Napo%20Ntsasa.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of GSM Based Digital Fuel Meter and Fuel Theft Detection Using PIC Microcontroller |
Country | : | India |
Authors | : | Mrs.P.Geethabai ME || L.Deepika || M.Dharani || P.Haripriya || G.Lavanya |
Abstract: In recent day's world has become digitized, if we make fuel meter in the vehicle as digital it will help know exact amount of fuel present in fuel tank. In our project, we have made digital fuel meter. Here, we are indicating amount of fuel present in the tank digitally. Fuel theft is also problem in all over the world. In our project whenever there is fuel theft occurs, due to the noise of burglar alarm people are aware of fuel theft and also during fuel theft a text message is delivered on mobile to the owner of the bike...................
Keywords: A/D Converter, Fuel tank, Mileage, PIC microcontroller.
[1]. A.Avinashkumar, U.Singaravelan, T.V.Premkumar and K.Gnanaprakash, Digital fuel level indicator in two-wheeler along with distance to zero indicator. IOSR Journal of Mechanical andCivil Engineering (IOSR-JMCE), 11:80{84 Mar- Apr. 2014.
[2]. Mrs.Udayavalli.V. ,Mrs.M.Omamageswari, Embedded system based intelligent digital fuelGauge. IPASJ International Journal of Electronics and Communication (IIJEC), 2, March-April 2014.
[3]. Kunal D. Dhande, Sarang R. gogilwar, SagarYele and Ass. Prof.VivekGandhewar, Fuel level measurement techniques: A systematic survey. International Journal of Research in AdventTechnology.
[4]. Muhammad Ali Mazidi, PIC microcontroller and Embedded System. (2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Deblurring Process for License Plate Images Using Kernal Estimation |
Country | : | India |
Authors | : | M.Rishwana Yasmin || K.Sudharsana Devi || R.Sushmitha Sen || D.Victoria |
Abstract: As the unique identification of a vehicle, license plate is a key clue to uncover over-speed vehicles or the ones involved in hit-and-run accidents. However, the snapshot of overspeed vehicle captured by surveillance camera is frequently blurred due to fast motion, which is even unrecognizable by human. Those observed plate images are usually in low resolution and suffer severe loss of edge information, which cast great challenge to existing blind deblurring methods. For license plate image blurring caused by fast motion, the blur kernel can be viewed as linear uniform convolution and parametrically modeled with angle and length. In this paper, we propose a novel scheme based on sparse representation to identify the blur kernel................
Keywords- Kernel parameter estimation, license plate deblurring, linear motion blur, sparse representation.
[1]. Y.-W. Tai, H. Du, M. S. Brown, and S. Lin, "Correction of spatially varying image and video motion blur using a hybrid camera," IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 6, pp. 1012–1028, Jun. 2010.
[2]. W. Zhou, Y. Lu, H. Li, Y. Song, and Q. Tian, "Spatial coding for large scale partial-duplicate Web image search," in Proc. 18th ACM Int. Conf. Multimedia, Oct. 2010, pp. 511–520.
[3]. W. Zhou, H. Li, Y. Lu, and Q. Tian, "Principal visual word discovery for automatic license plate detection," IEEE Trans. Image Process., vol. 21, no. 9, pp. 4269–4279, Sep. 2012.
[4]. W. Zhou, M. Yang, H. Li, X. Wang, Y. Lin, and Q. Tian, "Towards codebook-free: Scalable cascaded hashing for mobile image search," IEEE Trans. Multimedia, vol. 16, no. 3, pp. 601–611, Apr. 2014.
[5]. W. Zhou, H. Li, R. Hong, Y. Lu, and Q. Tian, "BSIFT: Toward data independent codebook for large scale image search," IEEE Trans. Image Process., vol. 24, no. 3, pp. 967–979, Mar. 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Measurement of Surface Roughness Using Image Processing |
Country | : | India |
Authors | : | Sophia.S || Vicithra.A || Sangeetha.S || Mahitha.V || Hedayathbasha.S |
Abstract: A new method of surface roughness detection based on image processing technique is proposed in this paper. The developed vision system uses a CCD camera for scanning gray-scale images from an area of the machined workpiece. This images were analysed with digital image processing system. Some new optical roughness parameters were derived from the images based on their histograms and Optical objects of machined surface. As most useful were a number of dark objects of the image and coefficient of variation of the histogram of inspected surface. Surface roughness parameters are measured based on gray level co-occurrence matrix(GLCM) .In our proposed system............
Keywords – Surface roughness, CCD camera, contrast method, GLCM
[1]. Gadelmawla ES, Koura MM, Maksoud TMA, Elewa IM, Soliman HH. Roughness parameters. J Mater Process
Technol 2002;123(1):133–45.
[2]. F.G. Mitri, R.R. Kinnick, J.F. Greenleaf, and M.Fatemi.Continuous-wave ultrasound reflectometry for surface
roughness imaging applications. Pattern Recogn 2009 Jan; 49(1): 10–14.
[3]. Gadelmawla ES, Koura MM, Maksoud TMA, Elewa IM, Soliman HH. Using the grey level histogram to distinguish
between roughness of surfaces. Proc I MECH E, Part B, J Eng Manuf 2001;215(4): 545–53.
[4]. Al-Kindi GA, Baul RM, Gill KF. An application of machine vision in the automated inspection of engineering
surfaces. Int J Prod Res 1992;30(2):241–53.
[5]. You Z, Chen J, Pu XL. Noncontact surface roughness measuring system based on computer vision. In Proceedings
of the 10th Annual Meeting of the American Society for Precision Engineering. Austin, TX; 15–20 October, 1995. p.
116–9 [chapter 108].
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Automated Agriculture Monitoring And Controlling System Using Arduino |
Country | : | India |
Authors | : | Angel Nimisha Lorain F || Ramamalini.P || Udhayanithi.N || Veeralakshmi.R |
Abstract: Agriculture is backbone of our country. In this paper, we had presented a "SMART AUTOMATED AGRICULTURE MONITORING AND CONTROLLING SYSTEM USING ARDUINO". Here we had developed an autonomous agriculture monitoring module. This autonomous unit will do Seed sowing, Pesticide Spraying, Fertilizer Spraying, Water Pumping automatically without human intervention. Here we use ARDUINO for setting the time slot for each process. After completion of this process, It sends the message automatically through GSM to user..............
Keywords: Battery, soil sensor, DC motor, pump motor, GSM
[1] A.A.C.Fernando, and C.Ricardo, "Agricultural Robotics , Unmanned Robotic Service Units in Agricultural Tasks",lEEE Industrial Electronics Magazine, pp. 48-58, Sep 2013.
[2] D.C.Slaughter, D.K.Giles, and D.Downey , "Autonomous Robotic Weed Control Systems: A Review," Comput.Electron.Agric, vol.61,no.1,pp.63-78, 2008.
[3] J.R. Rosell and R.Sanz, "AReview of Methods and Applications of the Geometric Charactersization of Tree Crops in Agricultural Activities,"Comput.Electron. Agric., vol. 81, pp. 124-141, Feb. 2012.
[4] B. Astrand and A. Baerdveldt, "A Vision Based Row-following System for Agricultureal Field Machinery," Mechatronics, vol. 15, no. 2, pp. 251-269, 2005.
[5] C.Zhang, M. Geimer, O.N.Patrick, and L.Grandl, " Development of an Intelligent Master-Slave System Between Agricultural Vehicles", IEEE Intelligent Vehicles Symposium,pp. 250-255, San Diego, CA, US, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automatic Life Saviour in Roadway Automobile Detecting System |
Country | : | India |
Authors | : | R.Priya || R.Vijaya || C.Nithya Raboni || W.Stanley Karunakaran |
Abstract: In this generation more accidents occur in front of schools, colleges, hospitals and industry. we had faced many accidents on seeing that our heart pricks and want to stop the accidents This project is to overcome the accidents that happen and people die .This deals with transmit the signal of car or bike or truck or any other vehicle approaching and signal is received and buzzer sound , lcd display and along with this recording of speed of vehicle. Accident preventions are taken care with the help of automatic breaking system using ultrasonic sensor.............
Keywords - Buzzer, Lcd, ultrasonic Sensor , GSM,, Rf, Transmitter, Rf Receiver, Arduino UNO R3.
[1]. Dinesh Mohan, Omer Tsimhoni, Michael Sivak, Michael J Flannagan Road safety in India: challenges and opportunities –Repost numberUMTRI-2009-1 http://www.deepblue.lib.umich.edu
[2]. Manisha Ruikar, National statistics of road traffic accidents in India, Journal of Orthopaedics, Traumatology and Rehabilitation, 23 Sep. 2013, vol. 6, issue 1, pp. 1-6
[3]. Daniel Brookoff, Charles S. Cook, Charles Williams, and Calvin S. Mann, Testing Reckless Drivers for Cocaine and Marijuana, The New England Journal of Medicine, Aug. 25, 1994, pp. 518-522
[4]. Jiangpeng Dai , Jin Teng , Xiaole Bai , Zhaohui Shen,and Dong Xuan Mobile phone based drunk driving detection in Pervasive Computing Technologies for Healthcare (Pervasive Health), 2010 4th International Conference . http://ieeexplore.ieee.org
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Neural Networks Approach for Emotion Detection in Humans |
Country | : | India |
Authors | : | S. Kayalvizhi || S. Saravana Kumar |
Abstract: Human emotional facial expressions play an important role in interpersonal relations. This is because of humans demonstrated and conveys a lot of evident information visually rather than verbally. Although humans recognize facial expressions virtually without effort or delay, reliable expression recognition by machine remains a challenge as of today. Emotions are feeling or response to particular situation or environment. Emotions are an integral part of our existence, as one smiles to show greeting, frowns when confused, or raises one's voice when enraged...............
Keywords - Neutral vs emotion classification, constrained local model, key emotional points, local binary pattern, viola jones algorithm, action units.
[1]. Bartlett M.S, Littlewort G and Frank M.G Etl (2005) "Recognizing facial expression: Machine learning and spontaneous behaviour" in proc.IEEE CVPR, pp.568-573.
[2]. Cristinacce D and Cootes T.F (2006) "Feature detection and tracking with constrained local models" In BMNC, pp.929-938.
[3]. Cohn J.F, Xiao J and Moriyama T Etl (2003) "Automatic recognition of eye blinking in spontaneous facial behaviour" in Behaviour Research Mds, Inst.and Compu., Vol35,pp.420-428.
[4]. Kotsia I and Pitas I (2007) "Facial expression recognition in image sequences using geometric deformation features and support vector machines,"in proc.of IEEE Trans.6, Image Process.,Vol. no.1,pp.172-187.
[5]. Pantic M and Rothkrantz L (2004) "Facial action recognition for facial expression analysis from static face images," In IEEE Trans.Syst., Man,Cybern.B.vol.34, no.3,pp.1449-1461.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Traffic Models for M2m Devices in Intelligent Transportation Systems |
Country | : | India |
Authors | : | G.R.Kanimozhi || N.Kumaresan |
Abstract: Intelligent Transportation System (ITS) Enables the better use of infrastructure by connecting vehicles to other vehicles as well as infrastructure and thus delivers a faster communication opportunity to ensure safe and secure driving using M2M communication is one of the latest information and communication technologies which offers ubiquitous connectivity among several smart devices. The use of M2M communication has emerged due to the wide range, high reliability, increased data rates decreased cost as well as short term deployment opportunities but degrade the performance of mobile networks due to large no of devices. The proposed system using the microcontroller unit reducing the collision passing the message to the mobile communication which provide the fastest communication with high efficiency.
Keywords: Road congestion, Machine 2 machine communication, Intelligent transportation system.
[1]. Ahmad, F., et al. (2014). ' Machine-to-Machine Sensor Data Multiplexing using LTE Advanced Relay Node for Logistics'. Proc. LDIC, Bremen, Germany.
[2]. Atzori L, Iera A, Morabito G (2010) 'The internet of things: a survey'. Comput Netw 54(15):2787–280.
[3]. Chandrasekhar V, Andrews JG, Gatherer A (2008)'Femtocell networks: a survey' IEEE Commun Mag 46(9):59–67.
[4]. Chen Y, Wang W (2010) ' Machine-to-machine communication in LTE-A'In: IEEE 72nd vehicular technology conference fall (VTC 2010-all) IEEE, pp 1–4.
[5]. Chou CM, Li CY, Chien WM, Lan KC (2009) 'A feasibility study on vehicle-to-infrastructure communication: Wifi vs. wimax'. In:Tenth international conference on mobile data management: systems, services and middleware, 2009. MDM'09. IEEE, pp 397–398.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Minutiae Extraction for Fingerprint and Palm Print Images Using Convolutional Neural Networks |
Country | : | India |
Authors | : | D. Janani || S. Saravanakumar |
Abstract: With the growing use of biometric authentication systems in the recent years, spoof fingerprint detection has become increasingly important. To make it more secure palm print detection is used in addition. In this study, we use Convolutional Neural Networks (CNN) for fingerprint and palm print liveness detection. The proposed method consists of two stages. In the first stage, Local Binary Pattern (LBP) is used to change the pixel intensity in the original image. In the second stage, the minutiae extraction and Region of Interest (ROI) are applied to get minute authentication. Experimental results show that the proposed algorithm gives high security compared to existing methods such as Weber Local Descriptor (WLD) and Local Binary Pattern (LBP).
Keywords: Convolutional Neural Networks, Local Binary Pattern, Minutiae extraction, Region of interest, Weber Local Descriptor.
[1]. Antonelli. A, Capelli. R, Maio. D and Maltoni. D (2006), "Fake finger detection by skin distortion analysis‟, Information forensics and security, IEEE transactions on, Vol. 1, No. 3, pp. 360-373.
[2]. Baldisserra. D, Franco. A, Maio. D and Maltoni. D (2005), "Fake fingerprint detection by odour analysis‟, in Advances in Biometrics. Springer, 2005, pp.265-272.
[3]. Menotti. D, Chiachia. G, Pinto. A, Robson Schwartz. W, Pedrini. A, Xavier Falcao, and Rocha. A (2015), " Deep representations for iris, face and fingerprint spoofing detection‟ ,Information Forensics and Security, IEEE Transactions on, Vol. 10, No. 4, pp. 864-879.
[4]. Graganiello. D, Poggi. G, Sansone. C and Verdoliva. L (2013), "Fingerprint liveness detection based on weber local image descriptor‟, in Biometric Measurements and Systems for Security and Medical Applications (BIOMS), IEEE Workshop on. IEEE, 2013, pp. 46- 50.
[5]. Rodrigo Frassetto Nogueira, Roberto.A.Lotufo, Rubens campos machado, "Livdet (2016) fingerprint liveness detection using convolutional neural networks‟.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wake-Up Receiver Design for Low Power Consumption Based On HBC |
Country | : | India |
Authors | : | I.Jemima || N.Kumaresan |
Abstract: HBC is widely used which has multiple advantage due to electric field is modulated and induced to a human body ,as it possible to transfer data wirelessly using the human body as a transmission medium. First, reducing the traffic load from the radio channels becoming more congested as no of connected wireless devices increases. Then, HBC can potentially provide higher security than RF communication since the electric field stays closer to a human body and then, the attenuation in the HBC frequency band is lower than radio technologies for wireless body area networks. To improve the energy efficiciency in HBC by utilizing a wake-up receiver................
Keywords - Human Body Communications, Pulse Width Modulation, Wireless Body Area Networks.
[1]. J. Petäjäjärvi, H. Karvonen, K. Mikhaylov, A. Pärssinen, M. Hämäläinen and J. Iinatti: WBAN energy efficiency and dependability improvement utilizing wake-up receiver. IEICE Transactions on Communications, vol. E98-B, No. 04, (2015)
[2]. IEEE Std. 802.15.6–2012: IEEE standard for local and metropolitan area networks—Part 15.6: wireless body area networks. The Institute of Electrical and Electronics Engineers, Inc, Standard, pp. 1–271 (2012).
[3]. S Movassaghi, M Abolhasan, J Lipman, D Smith, A Jamalipour, Wireless body area networks: a survey. IEEE Communications Surveys & Tutorials 16(3), 1658–1686 (2014).
[4]. E Kartsakli, A Lalos, A Antonopoulos, S Tennina, M Di Renzo, L Alonso, C Verikoukis, A survey on M2M systems for mHealth: a wireless communications perspective. Sensors 14, 18009–18052 (2014).
[5]. H Karvonen, J Suhonen, J Petäjäjärvi, M Hämäläinen, M Hännikäinen, A Pouttu, Hierarchical architecture for multi-technology wireless sensor networks for critical infrastructure protection. Springer journal of WirelessPersonal Communications 76(2), 209–229 (2014).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Energy Efficient Clone Detection in WSN by ERCD Protocol |
Country | : | India |
Authors | : | Bavithra E || Maheswari M || Pavithra M || Priyanandhini A || Saranya C |
Abstract: In this paper, we propose an energy efficient location aware clone detection protocol in densely deployed WSNs, which can guarantee successful clone attack detection and maintain satisfactory network life. Specifically, we exploit the location information of sensors and randomly select witness located in a ring area to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy efficient data forwarding along the path towards the witness and the sink. We theoretically prove that the proposed protocol can achieve 100 percent clone detection probability with trustful witness. We further extend the work by studying the clone detection performance with un trustful witnesses and show that the clone detection probability still approaches..............
Keywords - Wireless sensor networks, clone detection protocol, energy efficiency, network lifetime.
[1]. Zhongming Zheng and Zhigang Chen, "Energy and memory efficient clone detection in wireless sensor Networks," in IEEE transaction in mobile computing 1536-1233 (c) 2015 IEEE.
[2]. Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, "ERCD: An energy-efficient clone detection protocol in wsns," in Proc. IEEE INFOCOM, Turin, IT, Apr. 14- 19 2013, pp. 2436–2444.
[3]. R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, and security of emerging machine to machine communi-cations," IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2011.
[4]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393–422, Mar. 2002.
[5]. A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen, "Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks," Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2012.