Book of Abstracts -...

39
First International Conference on Advances in Intelligent Systems, Soft Computing and Optimization techniques 2019 03 - 04, April 2019 I Penang, Malaysia I www.icaisco.com ICAISCO 2019 Book of Abstracts

Transcript of Book of Abstracts -...

First International Conference on

12 - 13, April 2019Coimbatore I INDIA

First International Conference on

Advances in Intelligent Systems, Soft Computingand Optimization techniques 2019

03 - 04, April 2019 I Penang, Malaysia I www.icaisco.com

ICAISCO 2019

Book of Abstracts

The scope of the First International Conference on Advances in Intelligent Systems, Soft Computing and Optimization Techniques 2019

(ICAISCO 2019) is to offer a forum to share ideas, provide information, and enlarge peer research networks. ICAISCO 2019 opens an energetic

scientific forum by bringing researchers, engineers, and practitioners from diverse backgrounds all together to discuss and disseminate the

latest state-of-the-art achievements, challenges, and future directions in the fields of intelligent systems, soft computing and optimization.

ICAISCO 2019 will be kick- started by the welcome reception and an inaugural speech by an eminent professor followed by plenary speeches,

technical presentations including invited lectures, tutorials/workshops and oral/poster presentations. Several social programs also will be

given to the participants to offer the opportunities of strengthening peer network and interactions between the participants of the conference.

All the accepted papers of ICAISCO 2019 will be published in the SCOPUS indexed journals. ICAISCO 2019 will be held at The Light Hotel, Pinang,

Malaysia during 03 – 04, April 2019. ICAISCO is an annual event and is conducted in the first week of May every year.

The second edition of ICAISCO will be held during 06 - 07, May 2020. ICAISCO 2020 invites full length original research contributions from

engineering professionals from industries, R&D organisations, academic institutions, government departments and research scholars from across

the world. Full length original research contributions and review articles not exceeding seven pages in the single column format shall be submitted.

The manuscript template shall be found in the downloads section. The manuscript should contribute original research ideas, developmental ideas,

analysis, findings, results, etc. The manuscript should not have been published in any journals/magazines or conference proceedings and not under

review in any of them. Further the manuscript should contain the name of the corresponding author with e-mail id and affiliation of all authors. Soft

copy of the full length manuscripts (in .doc and .pdf) shall be submitted to [email protected].

Each submitted manuscript will receive a unique paper id. The manuscripts will be initially screened to check for the conference scope and

originality. All the submitted manuscripts will be sent for technical peer review process and the corresponding author will be notified the outcome of

the review process. ICAISCO adopts double blind review process. If reviewers recommended for further improvements in the manuscript, the

manuscript will be sent back to the corresponding author and the revised version of the manuscript shall be submitted within fifteen days on the

date of notification. The final decision on the manuscript will be announced after the third round of evaluation by the technical program committee.

The registered and presented papers of the

ICAISCO will be published into the book of

conference proceedings and the papers will

be published in Scopus indexed journals. The

list of the journals are available in the

conference website.

ICAISCO 2019

ICAISCO 2020 - Call for papers

Publications

Intelligent Systems

Artificial Intelligence

Intelligent Communications

Intelligent Electronics

Intelligent Electrical Systems

Intelligent Medical Systems

Intelligent Transportation Systems

Intelligent Control and Robotics

Intelligent Manufacturing Systems

Intelligent Property

Computational Intelligence

Pattern Recognition

Machine Learning

Multi-Agent Systems

Research manuscripts and proposals are invited in the following topics (but not limited to)

Topics

Soft Computing

Soft computing in Energy

Hardware/Software Co-Design

Fault Detection and Diagnosis

Bioinformatics

Design Management

Management Production Systems

Mathematical Models

Big Data Analysis

Peer review policy

Optimization Techniques

Fuzzy Logic and Reasoning

Neural Networks

Neuro-Fuzzy Systems

Genetic/Evolutionary Algorithms

Embedded Real Time Systems

Linear and Non-linear Programming

Discrete and Combinational Optimization

Optimization Software and Techniques

Communication and Informative

Cognitive Modeling

Mechatronics Design

Vision and Sensors

Web Intelligence and Interaction

Global Optimization

Control Theory and System Dynamics

Environment and Natural Resources

Data Mining

Learning and Adaptive Systems

Information Technology

Communication Engineering

Broad Band Communication

Computer and Intelligent Communication

Mobile and Optical Communication

Wireless Communication

Mobile and Optical Networks

Wireless Sensor Networks

Network Security

Advanced VLSI Systems

Embedded Wireless Systems

Medical Informatics

Hardware Engineering

Mechatranics

Robotics & Automation

Electrical Engineering

Electrical and Electronic Materials and

Process

Semiconductor Technology

Power Systems and Energy Engineering

Soft Computing Techniques in Power

Systems

Transmission and Distribution System and

Apparatus

Electromagnetics

Instrumentation & Feedback Control

Systems

Power Electronics & Energy Efficient Drives

Renewable Power Conversion Technologies

Power Quality Improvement Techniques

HVDC/FACTS

Electrical Machines and Industry

Applications

Bio-medical Engineering

Intelligent Systems

High Voltage Engineering & Insulation

Technology

Photo/Opto Electronics

Preface

The ICAISCO 2019 aims to offer a great opportunity to bring together professors, researchers and

scholars around the globe a great platform to deliver the latest innovative research results and the most

recent developments and trends in Electrical, Electronics and Computer Engineering and Technology

fields. The scope of the First International Conference on Advances in Intelligent Systems, Soft

Computing and Optimization Techniques 2019 (ICAISCO 2019) is to offer a forum to share ideas, provide

information, and enlarge peer research networks. ICAISCO 2019 opens an energetic scientific forum by

bringing researchers, engineers, and practitioners from diverse backgrounds all together to discuss and

disseminate the latest state-of-the-art achievements, challenges, and future directions in the fields of

intelligent systems, soft computing and optimization. The conference received more than 100

submissions from across the world and 36 papers have been accepted by the editorial board of ICAISCO

after the stringent screening and review process. 29 papers has been registered for ICAISCO 2019.

ICAISCO is an annual technical event and has been aimed to be conducted in the first week of May every

year. Being the first edition, ICAISCO received submission from different regions of the world and

scholars from 12 countries have registered and participated. All the papers registered for ICAISCO 2019

will be published in a Scopus indexed journal.

Dr. Thangaprakash Sengodan

Chair, ICAISCO 2019

Felicitations

I wish to extend my heartfelt felicitations to the executive committee of the first International Conference on Advances in Intelligent Systems, Soft Computing and Optmization Techniques 2019 (ICAISCO 2019). I am extremely happy and delighted to partner with ICAISCO 2019. Conferences like this provide an affable environment for the academicians and research scholars to freely exchange their views and ideas with the practicing engineers with considerable mutual benefits to shape up the future strategy for research in this field of science, engineering and technology. The whole spectrum of topics that are going to be discussed during ICAISCO 2019 will definitely provide an excellent opportunity to all delegates to exchange information on the latest developments.

I take this opportunity to convey my warm greetings and felicitations to the executive committee and participants and extend my best wishes for the success of the conference.

Dr. Nur Hafizah Ghazali

University Malaysia Perlis, Malaysia

Chair, ICAISCO 2019

Welcome note

As an organizing chair of ICAISCO 2019, I would like to welcome all the participants for the ICAISCO 2019 meeting at The Light Hotel, Penang, Malaysia. ICAISCO 2019 opens an energetic scientific forum by bringing researchers, engineers, and practitioners from diverse backgrounds all together to discuss and disseminate the latest state-of-the-art achievements, challenges, and future directions in the fields of intelligent systems, soft computing and optimization.

Dr. Mohammad Faridun Naim Tajuddin

University Malaysia Perlis, Malaysia

Organizing Chair, ICAISCO 2019

i | ICAISCO 2019

CONTENTS

CS 005 Dubai Real Estate: Technology Disruptions Reshaping the Market

Ashok Chopra 1

CS 013 Un-Normalized Hypergraph P-Laplacian Based Semi-Supervised Learning Methods Loc Tran, Linh Tran, An Mai, Tuan Tran 2

CS 014 Mathematical Modeling of Smart Irrigation System

Hesham Alhumyani, Sultan Alshamrani, Saleh Omran, Quadri Waseem 3

CS 016 Enhanced Bibliographic Data Retrieval and Visualization using Query Optimization and Spectral Centrality Measure Chitra A/P Ramasamy and Maslina Zolkepli 4

CS 001 Empirical Analysis of K-Means, Fuzzy C-Means and Particle Swarm Optimization for Data

Clustering Ahamed Shafeeq B M, Zahid Ahmed Ansari 5

CS 020 Intelligent Optimization Systems for Steam Boiler Maintenance: Real Case Study

N.F.A.Fuzi, Firas Basim Ismail 6

CS 022 Multilevel Edge Detection using an Improved Particle Swarm Optimization Khaled Beddakhe, Mohamed Tahar Kimour 7

CS 024 Organizational Culture Effect on Individuals’ Intentions for Knowledge Sharing

Arif Abdelwhab Ali 8

CS 002 Performance Comparison of MPICH and MPI4py on Raspberry Pi-3B Beowulf Cluster Saad Wazir , Ataul Aziz Ikram, Hamza Ali Imran, Hanif Ullah, Ahmed Jamal Ikram, Maryam Ehsan 9

CS 027 Current Biometric Systems for Attendance Taking Based on Hand Modalities

Seng Chun Hoo, and Haidi Ibrahim 10

CS 029 Features from Electroencephalogram (EEG) for Signal Analysis: A Literature Survey Chi Qin Lai, Haidi Ibrahim, Mohd Zaid Abdullah, Jafri Malin Abdullah, AiniIsmafairus Abd. Hamid, ShahrelAzmin Suandi, and Azlinda Azman 11

CS 031 Offline Handwritten Flowchart Recognition based on Faster-RCNN

Hung-Chun Chiu, Lijie Wen, Huaqing Wang, and Jianmin Wang 12

CS 032 Trapezoidal Approximation of Neutrosophic Numbers on Transportation problems M. Jagadeeswari, V. Lakshmana Gomathi Nayagam 13

CS 045 IOT Based Wearable Technology for Health Monitoring and Positioning System

Pooja Hulajatti, Pooja Deepsir 14

CS 049 Predictive Model Prototype for the Diagnosis of Breast Cancer using Big Data Technology Ankita SinhaBhaswati Sahoo, Siddharth Swarup Rautaray, Manjusha Pandey 15

CS 051 Extractive text summarization for single and multiple documents using lexical chains

Varsha Pandit, Nidhi Mishra 16

ii | ICAISCO 2019

CONTENTS

CS 054 Sentiment Analysis in Text Mining for Information Extraction using Machine Learning Approach Product Review J.Uma, Dr.K.Prabha, 17

CS 058 Recent Dimensions of Data Science: A Review

Sinkon Nayak, Mahendra Kumar Gourisaria , Manjusha Pandey and Siddharth Swarup Rautaray 18

CS 060 A New Method for Preventing Man-in-the-Middle Attack in IPv6 Network Mobility Senthilkumar Mathi andLingam Srikanth 19

CS 063 A Novel AdaBoost Approach to detect out the magnitude of Trash

Rahul Nijhawan, Muskan Choudhary and Pranshu Agarwal 20

CS 064 A Survey on Arabic Handwritten Character Recognition Amani Ali Ahmed Ali and Suresha M 21

CS 068 Intelligent Resource Provisioning and Decluttering cloud services using Virtual Agent

system S.Dhanasekaran, B.S.Murugan, S.Hariharasitaraman 22

CS 074 Hybrid Method of Local Binary Pattern and Classification Tree for Early Breast Cancer

Detection by Mammogram Classification Girija O K and M Sudheep Elayidom 23

CS 078 A Real Time Offline Positioning System for Disruption Tolerant Network

Arnika Patel and Dr. Pariza Kamboj 24

EC 002 A performance study of dimensionality reduction techniques for Telecommunication customer retention J.Vijaya, E.Ajith Jubilson and Ravi Sankar Sangam 25

EC 048 Defect Detection in Metal Sheets Using KNN

Anoopa Jose Chittilappilly & Kamalraj Subramaniam 26

EC 052 Risk Mitigation Model for Cyber Threat: A Case Study Approach Joshi Sujata, Pandey Roshan 27

EC 064 Bank Vault Security System Based on Infrared Radiation and GSM Technology

Mithun Dutta, Md. Ashiqul Islam, Mehedi Hasan Mamun, Kangkhita Kaem Psyche, Mohammad Al Mamun 28

EC 066 Energy Optimization and Sharing in Smart Grid with Renewable Energy System using

Cyber Physical System R.Karthikeyan, Dr.A.K.Parvathy, S.Priyadharshini 29

EC 069 Sonet DCS Self Healing Network Control architecture implementation by survivable Fiber

Optic Networks K.V.S.S.S.S.Sairam Chandra Singh , D K Shreekantha P Sai Vamsi K Annapurna K and Sarveswara Rao 30

Dubai Real Estate: Technology Disruptions Reshaping the Market

Ashok Chopra1

1Management & Commerce, Amity University, Dubai [email protected]

Abstract. Dubai has always in the fore front of initiative and innovation. Since Dubai economy has only Six percent

contribution of income from oil in its revenue. Dubai ranks 16th among innovation driven cities in world. Dubai realized

importance of real estate as its key sector which carry on growth engine in its revenue. It continued alluring investment from

global investors in its real estate market. Winning of Expo 2020 further added fuel to the fire of demand of real estate

investment. Lately market witnessed excess supply which prompted real estate agents starting accepting payment in digital

currencies (Crypto currencies). In the mean time crypto currencies which are based on Block chain as technologies started

witnessing unrealistic swings in market which lead to Governments and regulators not accepting crypto currencies as

alternative to current central system of currencies rather treat them as asset, stock or bond. Thus Crypto currencies even

after having suffix as currencies suffered severe blow to its acceptance. All this raised new doubt which is Block chain a

sound as technology acceptance in other areas. Are crypto currencies are using right platform and if so firstly when these

digital currencies would be accepted as alternative to current system, secondly if accepted would these make headway in

investment in real estate and save Dubai real estate which is currently witnessing erratic demand and supply situation. So in

essence in this case study we would understand basis of crypto currencies technology (Block chain), its acceptance and

stability as alternative to current system and how these crypto currencies can help save current scenario of Dubai real

estate.

Keywords. Block chain Technology, Crypto currencies, Dubai Real Estate Market

MYAPCS005

UN-NORMALIZED HYPERGRAPH P-LAPLACIAN BASED SEMI-SUPERVISED LEARNING METHODS

Loc Tran

Laboratoire Chart EA4004, EPHE-PSL University, France [email protected]

Linh Tran

Ho Chi Minh University of Technology, Vietnam [email protected]

An Mai

John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam [email protected]

Tuan Tran

John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam [email protected]

Abstract: Most network-based machine learning methods assume that the labels of two adjacent samples in the network

are likely to be the same. However, assuming the pair wise relationship between samples is not complete. The information a

group of samples that shows very similar pattern and tends to have similar labels is missed. The natural way overcoming the

information loss of the above assumption is to represent the dataset as the hyper graph. Thus, in this paper, we will present

the un-normalized hyper graph p-Laplacian semi-supervised learning methods. These methods will be applied to the zoo

dataset and the tiny version of 20 newsgroups dataset. Experiment results show that the accuracy performance measures of

these un-normalized hyper graph p-Laplacian based semi-supervised learning methods are significantly greater than the

accuracy performance measure of the un-normalized hyper graph Laplacian based semi-supervised learning method (the

current state of the arthypergraph Laplacian based semi-supervised learning method for classification problem with p=2).

Keywords: hyper graph, p-Laplacian, semi-supervised learning, un-normalized, classification

MYAPCS013

0

MATHEMATICAL MODELING OF SMART IRRIGATION SYSTEM

1Hesham Alhumyani, 2Sultan Alshamrani, 3Saleh Omran, 4Quadri Waseem 1,2,4College of Computer and Information Technology, 3Department of Mathematics

Taif University, Saudi Arabia {h.alhumyani, Salehomran, susamash, quadri.waseem}@tu.edu.sa;

Abstract. Nowadays water scarcity is a big issue for farming especially in the Arabian Peninsula and in Drought-affected

Countries. Water irrigation is very important part of land farming. Therefore, there is a need for a smart solution to help

farmers to irrigate the farmlands in a sophisticated and productive manner. We try to make a smart irrigation system based

on Internet-of-Things (IoT) in order to provide the sufficient amount of water automatically using the deployment concept of

Wireless sensor networks (WSNs) in an efficient mathematical way. However, we need to provide enough water with the

use of less water sprinklers in a cost-effective way that are positioned at the right locations with the maximum coverage

area. In this paper, we mainly focus on how to deploy the controlled water sprinklers in certain area properly using the best

technique of Sensor Deployment for more better coverage area. We mathematically modeled the problem using simplicial

complex analysis to determine the needed number of sprinklers in order to cover certain areas. We aim to cover target areas

using triangulations that satisfy Euler characteristic formula for a projective plan.

Keywords: Smart Irrigation, IoT, Wireless sensor networks (WSNs), Mathematical modeling.

MYAPCS014

0

ENHANCED BIBLIOGRAPHIC DATA RETRIEVAL AND VISUALIZATION USING QUERY OPTIMIZATION AND SPECTRAL CENTRALITY

MEASURE

Chitra A/P Ramasamy and Maslina Zolkepli Universiti Putra Malaysia

[email protected] and [email protected] Abstract. As the amount of data generated is growing exponentially, harnessing such voluminous data has become a major

challenge these years especially bibliographic data. This study proposing an enhance bibliographic data retrieval and

visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector

centrality measure. A steady increase of publications recorded in the Digital Bibliography and Library Project (DBLP) can be

identified from year 1936 until 2018, reaching the number 4,327,507 publications. This study will be focusing on the

visualization of bibliographic data by retrieving the most influenced papers using hybrid clustering techniques and visualize it

in an understandable network diagram using the weightage node. This web based approach will be using Java programming

language and MongoDB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of

the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality

measure for better decision making. This method will make ease for the young researchers, educators and students to dive

into the enormous real world social and biological network.

Keywords: Bibliographic, DBLP, Spectral Clustering, Centrality Measure, NoSQL

MYAPCS016

Empirical Analysis of K-Means, Fuzzy C-Means and Particle Swarm Optimization for Data Clustering

Ahamed Shafeeq B M1, Zahid Ahmed Ansari2

1Department of Computer Engineering School of Science and Engineering

Manipal International University,Malaysia 2Department of Computer Science & Engineering

P.A.College of Engineering,Mangalore,India Abstract. Clustering is a fundamental task in data mining technique which puts more similar data objects into one group and

dissimilar objects into another group. The aim of this paper is to compare the quality of clusters produced by K-Means,

Particle swarm optimization (PSO) and Fuzzy C-Means (FCM) for data clustering. The k-means algorithm is the most widely

used partitional clustering algorithm technique in the industries and academia. The algorithm is simple and easy to

implement. The main drawback of the K-Means algorithm is that it is sensitive to the selection of the initial cluster centers

and it may converge to local optima. Fuzzy C-means algorithm is a popular algorithm in the field of fuzzy clustering. Fuzzy

clustering using FCM can provide a data partition that is both better and more meaningful than hard clustering approaches.

Particle Swarm Optimization (PSO) is an evolutionary computational technique which was motivated by the organisms

behavior such as schooling of fish and flocking of birds. The quality of the clusters produced by above three algorithms is

estimated using Silhouette Coefficient. The experimental results show that the performance of PSO clustering is better than

FCM & K-Means clustering. The difference in time taken by the algorithms for execution is negligible.

Keywords: Clustering, Particle Swarm Optimization, Fuzzy, K-Means, Silhouette coefficient.

MYAPCS01

8

Intelligent Optimization Systems for Steam Boiler Maintenance: Real Case Study

N.F.A.Fuzi1(a), Firas Basim Ismail1

1Power Generation Unit, Institute of Power Engineering (IPE), Universiti Tenaga Nasional (UNITEN), 43000 Kajang, Selangor, Malaysia.

a)Corresponding author: [email protected] Abstract. Steam boiler is a crucial equipment in the power plant. Recent years, most researcher found out that steam boiler

in a power plant have an issue of major outage. To avoid repetition of outage or failure, preventive maintenance scheduling

or known as scheduled maintenance had been used widely in the power plant as an alternative based on failure history of

the equipment. However, the main issue in scheduled maintenance is the redundancy of maintenance activities. Based on

selected adopted case study, we found out that there are some repetition activities in the scheduling. As a potential solution

to this problem, the Analytic Hierarchy Process (AHP) and the Particle Swarm Optimization (PSO) are implemented to the

adopted case study to optimize the maintenance operational duration and cost before implementing to the real case study.

MYAPCS020

Multilevel Edge Detection using an Improved Particle Swarm Optimization

Khaled Beddakhe1, Mohamed Tahar Kimour2

1,2 Laboratory of Research on Embedded Systems (LASE), University of Badji Mokhtar – Annaba, Annaba, BP 12, Algeria

1 [email protected] 2 [email protected]

Abstract. This paper presents a multilevel edge detection technique using a novel improvement of particle swarm

optimization algorithm, which computes the best thresholds that segment the image, while considering the spatial

information of the pixel contained in such image. Using Kapur’s entropy as the optimized objective function, we introduced

appropriate mechanisms to PSO aiming at speeding up the process of finding a solution, escaping the local optima, and

enhancing accuracy. Then, edge detection is easily performed based on the thresholds provided by such a solution.

According to our numerical experiments, our method exhibits good performance and segmentation accuracy.

Keywords: Image Segmentation, Multilevel Thresholding, Particle swarm optimization (PSO), Entropy.

MYAPCS022

Organizational Culture Effect on Individuals’ Intentions for Knowledge Sharing

Arif Abdelwhab Ali

Faculty of Computer Sciences and Information Technology University of Albutana, Rufaa, Sudan

[email protected]

Abstract. Knowledge sharing is a complex process that involves various factors and influenced by different elements across

organizations. The effect of these factors also differ based on the type of industry and the organization’s nature. Individual

intention for knowledge sharing is a crucial factor that indicates the actual occurrence of knowledge sharing behavior. It

would be useful if organizations specify what factors have the capability to boost the staff intention for knowledge sharing.

The cultural element in organizations may influence individual intention for knowledge sharing. This paper investigates the

effect of the organizational culture on the individual intention for the knowledge sharing practices. The data for this study are

collected from the Oil and Gas industry using online questionnaire. Based on the study objective, the proposed model is

designed alongside the study hypotheses. The preliminary analysis is done using SPSS version 20.0. Whereas model

validation and hypotheses testing are done through Structural Equation Modeling technique using AMOS version 20.0. The

preliminary analysis includes generation of the sample profile, conduction of reliability analysis through Cronbach’s alpha

method as well as calculation of the correlation matrix for all variables. The second stage of analysis concerns about

validation of the proposed model and hypotheses testing results. The findings confirmed that supportive organizational

culture plays a positive role in boosting the intention of individuals for knowledge sharing practice in organizations.

Keywords: knowledge sharing; individual intention; knowledge management, organizational culture; knowledge sharing

practice;

MYAPCS024

Performance Comparison of MPICH and MPI4py on Raspberry Pi-3B Beowulf Cluster

Saad Wazir

EPIC Lab, FAST-National University of Computer & Emerging Sciences Islamabad, Pakistan

[email protected]

Ataul Aziz Ikram EPIC Lab, FAST-National University of Computer & Emerging Sciences

Islamabad, Pakistan [email protected]

Hamza Ali Imran

EPIC Lab , FAST-National University of Computer & Emerging Sciences Islambad, Pakistan

[email protected]

Hanif Ullah Research Scholar,Riphah International University

Islamabad, Pakistan [email protected]

Ahmed Jamal Ikram

EPIC Lab, FAST-National University of Computer & Emerging Sciences Islamabad, Pakistan

[email protected]

Maryam Ehsan Information Technology Department University of Gujrat Gujrat, Pakistan

[email protected] Abstract. Moore’s Law is running out. Instead of making powerful computer by increasing number of transistor now we are

moving toward Parallelism. Beowulf cluster means cluster of any Commodity hardware. Our Cluster works exactly similar to

current day’s supercomputers. The motivation is to create a small sized, cheap device on which students and researchers

can get hands on experience. There is a master node, which interacts with user and all other nodes are slave nodes. Load is

equally divided among all nodes and they send their results to master. Master combines those results and show the final

output to the user. For communication between nodes we have created a network over Ethernet. We are using MPI4py,

which a Python based implantation of Message Passing Interface (MPI) and MPICH which also an open source

implementation of MPI and allows us to code in C, C++ and Fortran. MPI is a standard for writing codes for such clusters.

We have written parallel programs of Monte Carlo’s Simulation for finding value of pi and prime number generator in Python

and C++ making use of MPI4py and MPICH respectively. We have also written sequential programs applying same

algorithms in Python. Then we compared the time it takes to run them on cluster in parallel and in sequential on a computer

having 6500 core i7 Intel processor. It is found that making use of parallelism, we were able to outperform an expensive

computer which costs much more than our cluster.

Keywords: MPI, Beowulf Cluster, SBC, HPC, MPI

MYAPCS02

6

Current Biometric Systems for Attendance Taking Based on Hand Modalities

Seng Chun Hoo, and Haidi Ibrahim

School of Electrical & Electronic Engineering, Engineering Campus, Universiti Sains Malaysia, 14300 Nibong Tebal, Penang, Malaysia.

Correspondence should be addressed to Haidi Ibrahim; [email protected]

Abstract. Significant progress in the field of biometric technology has provides option to educators in automatically marking

the attendance of students in a class. As a result, the educator has more time to conduct a class which in turn benefits the

students during the teaching and learning process. Besides, it also helps to curb fraudulent cases as the attendance is taken

depending on the distinctiveness of each student’s biometric trait. In this paper, a survey has been focused on the different

types of biometric attendance systems based on hand modalities such as fingerprint, finger vein and palm vein. From the

analysis, for fingerprint based attendance system, the average accuracy obtained is 97% while average processing time is

around 5 seconds per person. Palm vein attendance system has lower accuracy at only 70%. Hence, the outcome from the

survey will help future researcher in developing attendance system based on hand modalities with improved accuracy and

faster response time.

Keywords : Biometric based attendance systems, fingerprint, finger vein, palm vein, identification, verification.

MYAPCS027

Features from Electroencephalogram (EEG) for Signal Analysis: A Literature Survey

Chi Qin Lai1, Haidi Ibrahim1, Mohd Zaid Abdullah1, Jafri Malin Abdullah2,AiniIsmafairus Abd. Hamid2,

ShahrelAzmin Suandi1, and Azlinda Azman3 1School of Electrical & Electronic Engineering, Engineering Campus, UniversitiSains Malaysia (USM), 14300

NibongTebal,Penang, Malaysia 2Department of Neurosciences, School of Medical Sciences, UniversitiSains Malaysia(USM), 16150 Kubang Kerian,

Kelantan, Malaysia 3School of Social Sciences, UniversitiSains Malaysia (USM), 11800 Pulau Pinang, Malaysia

Corresponding author: Haidi Ibrahim (email: [email protected])

Abstract. Electroencephalogram (EEG) is a recording from human brain, which normally been used to study brain activities.

As EEG is a multichannel signal with high temporal resolution, EEG gives us a huge amount of data. Thus, to fully utilize the

information from EEG, researchers have provided better alternatives such as automated processing that can analyze EEG

more efficiently. In the development of these approaches, informative features, which can be extracted mathematically, have

to be extracted from the EEG. Therefore, in this paper, a literature study is done to explore features that have been used by

researchers in order to represent the information in the EEG. Amongst these features are the spectral analysis features,

entropy, and statistical features.

Keywords: EEG · Features · Power Spectral Density · Entropy · Statistical Features.

MYAPCS029

Offline Handwritten Flowchart Recognition based on Faster-RCNN

Hung-Chun Chiu1, Lijie Wen1, Huaqing Wang1, and Jianmin Wang1 School of Software, Tsinghua University,

Beijing {qhj16,whq16}@mails.tsinghua.edu.cn, {wenlj,jimwang}@tsinghua.edu.cn

Abstract. Although handwritten flowchart recognition has been studied for many years, it is still a tough problem. Most

traditional methods are based on grouping strokes, which is known as online handwritten flowcharts recognition. However,

these methods cannot be applied directly on the offline handwritten flowcharts which are lack of the stroke information.

Hence it is in a great demand to design an effective algorithm to recognize the offline handwritten flowcharts. Inspired by

RPN (Region Proposal Network) in Faster-RCNN, a framework is proposed to detect different symbols in offline handwritten

flowcharts. With the predicted localization, a pixel searching algorithm is presented to refine the results of symbols. Finally,

all the symbols in flowcharts are connected, which turns offline flowcharts into images and structural XML. Experiments are

conducted on several datasets. The evaluation results show the accuracy of nodes recognition, text recognition and arrow

recognition hits 99%, 96.5% and 84% respectively, and the results of all types of symbols are better than those of other

online and offline methods.

Keywords: Offline · Handwritten flowcharts · Flowchart recognition · Flowchart generation · Faster-RCNN.

MYAPCS031

Trapezoidal Approximation of Neutrosophic Numbers on Transportation problems

1M. Jagadeeswari, 2V. Lakshmana Gomathi Nayagam

1Department of Mathematics, National Institute of Technology, Tiruchirappalli, 2Department of Mathematics, National Institute of Technology, Tiruchirappalli

Abstract. Zadeh introduced theory of fuzzy sets in 1965 as generalization of crisp sets to represent uncertain, incomplete,

imprecise and inconsistent information and Atanassov proposed intuitionistic fuzzy sets in 1986 as generalization of fuzzy

sets. Smarandache defined neutrosophic sets in 1995 which generalizes both fuzzy sets and intuitionistic fuzzy sets.

Compared to all other logics, neutrosophic logic introduces a model to represent the degree of indeterminacy hidden in

propositions due to unexpected parameters without constraints. Some authors proposed different types of neutrosophic sets

and their operations, applications in real life. In this study, we define some linear and non linear neutrosophic numbers,

approximation of these numbers by trapezoidal neutrosophic numbers, and some theorems related to them. In addition, an

example is provided to illustrate the implications of the proposed

numbers.

Keywords: Neutrosophic Number, Quadratic Neutrosophic Number, Approximation, Magnitude of Neutrosophic Number,

Transportation problem.

MYAPCS032

IOT Based Wearable Technology for Health Monitoring and Positioning System

Pooja Hulajatti1, Pooja Deepsir2

K.L.S Gogte Institute of Technology, Belgaum,India

Abstract. In this paper an idea of a wearable health monitoring and tracking device is proposed. The wearable device is

basically designed keeping hospital scenario in mind, especially for patients with Alzheimer’s, Dementia or similar kind of

diseases. The wearable device proposed is capable of both outdoor using GPS module and as well as indoor tracking using

RFID technology but with a new approach of moving objects (that need to be tracked) that switch their position. It can not

only track the patient but it is also capable of monitoring the patient’s basic health parameters such as temperature, heart

rate, glucose level and blood pressure using Non-Invasive techniques. It will intimate about location and health condition of

the patient to the caretaker or doctor in case of emergency through the app designed/SMS gateway[1]. The device will be

highly efficient, low cost and responsive rather than interactive unlike the existing devices. Feature addition to this could be

the shortest distance recognition to reach the patient in case of medical emergency.

Keywords: Indoor Positioning System (IPS), Radio Frequency Identification (RFID), Outdoor positioning, Global Positioning

System (GPS), Health monitoring system, Global System for Mobile communication (GSM), Heart rate sensor, Blood

pressure module, etc.

MYAPCS045 0

Predictive Model Prototype for the Diagnosis of Breast Cancer using Big Data Technology

Ankita SinhaBhaswati Sahoo, Siddharth Swarup Rautaray, Manjusha Pandey

KIIT Deemed University, Bhuneshwar E-mail: [email protected],[email protected], [email protected]

[email protected]

Abstract. Big Data is the collection of millions of datasets from many different sources such as social media, banking, sales,

marketing etc. In every field, Big Data Technologies is used for analyzing, pre-processing, storing, and generating new

patterns for the benefits of the organization. The era of big data technology is nowadays booming[1]. Healthcare is one the

most important application of Big Data. In Healthcare data exist in different forms like heart rate, blood pressure, blood test,

sugar test, cholesterol and many more. Diagnosis of diseases at an early stage is also very important in

HealthCare services. Cancer diseases is an abnormal cell that negatively affects our body texture and regular functioning

body organs. Due to cancer, the death rate is the increased as it gets diagnosed at a later stage. Early diagnosis of cancer

increases the survival rate of a patient. This paper focuses on the prediction model for the diagnosis of breast cancer at an

early stage as it increases the chances for successful treatment. Data mining algorithm combined with Apache Hadoop is

promising independent tool for the prediction of breast cancer.

Keywords: Big Data· HealthCare· Prediction· Cancer· Breast Cancer.

MYAPCS049

Extractive text summarization for single and multiple documents using lexical chains

Varsha Pandit1, Nidhi Mishra2

1M. Tech scholar,Poornima University, Jaipur, India [email protected]

2Associate Professor, Poornima University, Jaipur, India [email protected]

Abstract: Extractive Text summarization is the process which extracts the sentences which is important from text files. It

selects the sentences which is important and then combine those sentences which generates the summary. Our proposed

work includes computation of lexical chains and WordNet. The Summary is generated by using lexical chains which is better

than the other approaches used to generate summary. The combination of noun, proper noun, adverb, verb and adjective is

taken to generate better result. Our proposed work is not only deal with single text files but also deal with multi-text files. In

this paper, comparison of our work with previous work is presented which shows that our work is better than the prior work

and increase the recall value in less time.

Keywords: Extractive text summarization; lexical chains; WordNet ; Recall

MYAPCS051 20

SENTIMENT ANALYSIS IN TEXT MINING FOR INFORMATION EXTRACTION USING MACHINE LEARNING APPROACH PRODUCT

REVIEW

J.Uma, Research Scholar, Department of computer science Periyar University PG Extesion centre, Dharmapuri.

Dr.K.Prabha,

Assistant Professor, Department of computer science Periyar University PG Extesion centre, Dharmapuri

Abstract. Digital advancement in computerized information procurement strategies have prompted gigantic volume of

information. In excess of 80 percent of the present information is made out of unstructured or semi-organized information.

The recuperation of comparable examples and patterns to see the content information from gigantic volume of information is

a major issue. Content mining is a procedure of separating intriguing and nontrivial designs from gigantic measure of content

reports. There falsehoods numerous systems and instruments to mine the content reports and find the data for future and

process in basic leadership. The decision of choosing the privilege and proper content mining method recuperates the

speed and moderates the time and exertion required to get profitable data. This paper quickly talks about and examines the

content mining procedures and their applications. With the headway of innovation, an ever increasing number of information

is accessible in computerized shape. Among which, the greater part of the information (approx. 85%) is in unstructured

literary frame. In this manner, it has turned out to be basic to construct better systems and calculations to get valuable and

fascinating information from the huge measure of literary information. Subsequently, the field of data extraction and content

mining ended up well known regions of research, to get fascinating and needful data.

Keywords: Text mining, Text Mining Process, Summarization, and Text categorization, Information Extraction, Information

Retrieval, sentiment analysis, Machine Language.

MYAPCS054

2

0

Recent Dimensions of Data Science: A Review

Sinkon Nayak1, Mahendra Kumar Gourisaria2 , Manjusha Pandey3 and Siddharth Swarup Rautaray4

KIIT Deemed to be UNIVERSITY, BHUBANESWAR, INDIA [email protected] , [email protected], [email protected], [email protected]

Abstract. Now a day’s huge amount of data has been generated and collected in every instance of time. Data has been

generated and collected very rapidly, so to analyze them is the toughest task to do Data are generated and collected in a

huge amount from unlike sources such as social media, business transactions, public data etc. These greater amount of

data are may be structured, semi structured and unstructured one. The data in which analysis is to perform now-a-days are

not only of massive amount but also varies each other by its types, at which speed it is generated and by its value and also

varies by different characteristics which is termed as Big data. So to examine this vast amount of data and get the relevant

information from it, analysis should be done and to analyze these huge amounts of data is a greater challenge these days.

So to analyze this vast amount of data we need the help of several data analytics tools and methods so that it will be easier

to deal with it. This survey paper talk about different tools and techniques used for big data analytics. This survey paper tries

to provide a clear idea about the genesis of Big data, features of Big data, different tools and techniques used to analyze

these huge collection of data.

Keywords: Big data· Techniques· Clustering· Classification· Architecture

MYAPCS058 0

A New Method for Preventing Man-in-the-Middle Attack in IPv6 Network Mobility

Senthilkumar Mathi1 andLingam Srikanth2

Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore,

Amrita Vishwa Vidyapeetham, India [email protected], [email protected]

Abstract. IPv6 is the next generation version of the Internet Protocol, which is soon bound to take over IPv4, its

predecessor completely. It has various features over IPv4 such as error detection and communication and is comparatively

more secure than the predecessor due to the usage of IPsec and ICMPv6. The neighbor discovery protocol, specific to IPv6

offers some applications for neighbor discovery, reachability, address resolution but more the number of applications, more

chance for vulnerabilities. Even though the IPv6 is said to be more secure than IPv4, it falls prey to some attacks which lead

to fatal consequences. One such attack is the man-in-the-middle attack where an attacker positioned manipulates the

communication in between the nodes. In spite of using IPsec, the attacker can cause a hindrance to the network. The man-

in-the-middle attack has many types and solutions proposed to prevent it. This paper explores man-in-the-middle attack

along with the existing solutions and proposes a new method to prevent it.

Keywords: IPv6, Neighbour discovery protocol, Fire brigade attack, Man-in-the-middle attack, Authentication.

MYAPCS060

A Novel AdaBoost Approach to detect out the magnitude of Trash

Rahul Nijhawan, Muskan Choudhary and Pranshu Agarwal Deptt. Of Computer Science Engg, Graphic Era University, Dehradun, India

{[email protected], [email protected], [email protected]}

Abstract. The waste generated by day to day use of domestic premise is called domestic refuse. This waste is not domestic

if it is taken under commercial arrangement. In this paper a novel AdaBoost approach is used for feature extraction.

AdaBoost is one of the most out-performing boosting algorithms. It has a solid theoretical basis and has made great success

in practical applications. AdaBoost is used to improve the performance of any machine learning algorithm. Due to the

absence of dataset, another dataset was built for testing the execution of the anticipated model. This was tested on our

dataset and also compared with other algorithms such as Support Vector Machine (SVM), K-Nearest Neighbor (KNN),

Neural Network (NN) and Tree. We give a convergence result for the algorithm showing that prior knowledge can

substantially improve classification performance. After testing, we can visualize that highest accuracy (99.5%) was achieved

by novel AdaBoost approach.

Keywords: AdaBoost, Garbage, SVM, ANN, Stacking, Tree, KNN.

MYAPCS063

A Survey on Arabic Handwritten Character Recognition

Amani Ali Ahmed Ali1 and Suresha M.2

1Department of Computer Science & MCA, Kuvempu University, Shimoga, India. 1Department of Computer Science, Taiz University, Taiz, Yemen. [email protected]

2Department of Computer Science & MCA, Kuvempu University, Shimoga, India. Abstract. There are much heavy studies on HCR which indicated to handwritten character recognition for nearly previous

four decades. The research on some of common script like Arabic, Indian and Chinese has been done. This manuscript

presents a survey of character recognition on Arabic script, most of the popular published paper methods are summarized,

also analyzed different methods for building a robust system of HCR and included some future research on recognition

direction of handwritten character. The paper analyzed and presented various algorithms with respect to pre-processing

methods, segmentation methods, feature extraction methods and various classification approaches of the Arabic character

recognition.

Keywords: Character Recognition of Arabic Handwritten, Artificial Neural Network, Freeman Chain Code, Fuzzy Systems,

Genetic Algorithms, Hidden Markov Model, Neural Network, Support Vector Machine.

MYAPCS064

Intelligent Resource Provisioning and Decluttering cloud services using Virtual Agent system

S.Dhanasekaran1, B.S.Murugan2, S.Hariharasitaraman3

1,2,3Department of CSE, School of Computing, Kalasalingam Academy of Research and Education,Srivilliputtur,Tamilnadu.

[email protected], [email protected], [email protected] Abstract – Intelligent Cloud Service decluttering and resource provisioning in Virtual Agent system is a process of searching,

collecting, arranging, and dispatch the cloud services to the different clients based on their demands. Cloud Service

Decluttering (CSD) can be done by calculating free cloud resource and CPU utilization of each virtual machine by means of

Intelligent Agent Virtual Agent system. In this strategy, decluttering and resource provisioning is based on available cloud

resources. Here resource provisioning is done by two basic categorizations. First one to check the required cloud resources

and the number of jobs which is less than the available cloud resources. Provisioning is done if the condition is satisfied. The

second category checks where the required cloud resource is greater than the available free cloud resources. If the

condition satisfied we cannot allocate the job directly. The performance will get low if the jobs were allocated. Hence we split

job according to the need and available cloud resource and then allocate to corresponding node where need is less than the

free available cloud resources. The aim is to achieve maximum utilization of Cloud resource in effective manner.

Keywords: Cloud computing, resource provisioning, Cloud Service organizing, Agent.

MYAPCS068

Hybrid Method of Local Binary Pattern and Classification Tree for Early Breast Cancer Detection by Mammogram Classification

Girija O K1 and M Sudheep Elayidom2

1School of Engineering, CUSAT, Kerala, India. [email protected] 2School of Engineering, CUSAT, Kerala, India.

Abstract. Breast cancer is an alarming disease due to mutation in breast cells and it is one type of the cancer among

women which highly leads to their death. One of the most effective tools for early detection of breast cancer is

mammography, which a screening tool is used to ex- amine the human breast by using low-dose amplitude X-rays.

Computer Aided Diagnosis (CAD) is used as an important tool to help the medical professionals for classifying breast

tissues into different class. Computer Aided Diagnosis (CAD) can be used to reduce human error in reading the

mammograms and it shows effective results in classification of benign and malignant abnormalities. The proposed method

presents a new classification approach to detect the abnormalities in the mammograms using Local Binary Pattern and

Decision Tree Classification. A uniform Local Binary Pattern(uLBP) is an extension of the original Local Bi-nary Pattern in

which only patterns that contain at most two transitions from 0 to 1 (or vice versa) are considered. In uniform Local Binary

Pattern (LBP) mapping, there is a separate output label for each uniform pattern and all then on uniform patterns are

assigned to a single label. These patterns are utilized to detect breast cancer by classification employing the Decision Tree

Classification. Specificity and sensitivity are the two statistical measures used in this proposed method to verify and

measure the significance of the test related to abnormalities in the breast tissues. Thus, it can be measurement of

performance test for the purpose of classify the patients who do and do not suffer from the cancer. The miniMIAS

mammography database is employed for testing the accuracy

of the proposed method and the results are promising.

Keywords: Breast Cancer, Mammography, Classification, Local Binary Pat-tern, Classification Tree, Early Detection.

MYAPCS074

A Real Time Offline Positioning System for Disruption Tolerant Network

Arnika Patel1 and Dr. Pariza Kamboj2,

Computer Engineering Department, SCET, GTU, Surat, India {[email protected]}

Abstract. Sparse mobile ad-hoc network called Disruption tolerant network may violate one or more assumptions of existing

TCP/IP protocol, therefore it might not serve well the Disruption tolerant network. In this network, end-to end disconnection

may be more common than connection. So positioning of mobile devices to have latest location in Disruption tolerant

network becomes more important. In this paper, we have implemented an offline positioning system and tested it in real

time. Here positioning of the users are carried out using Cell-Id, MNC (Mobile Network Code), MCC (Mobile Country Code),

LAC (Location Area Code). Comparison of online and offline positioning system in real time environment shows that

positioning system has comparable accuracy in offline mode. We have also carried out energy consumption in online and

offline modes and result shows that energy consumed is higher in online mode.

Keywords: Disruption tolerant network, Offline, Positioning, Cell-Id, MNC,MCC, LAC, Energy Consumption

MYAPCS078

A performance study of dimensionality reduction techniques for Telecommunication customer retention

J.Vijaya1, E.Ajith Jubilson2 and Ravi Sankar Sangam3

VIT University-Andra Pradesh, INDIA, [email protected], [email protected], [email protected]

Abstract. Customer retention is one of the main objectives of Customer Relation Management(CRM) and customer churn

occurs when the customer terminates from a company or a service. The telecommunication sector has an important place in

people's business and daily life and has become one of the most important industrial enterprises of our time. Now a day's

exibility of customer mobility in the telecommunications sector is caused by the customer churn easier. Best feature

identification is one of the problems encountered in predicting telecommunication sector customer retention process. The

proposed churn prediction model consist of two stages: In stage one, feature selection techniques like Rough set based

attribute selection (RSAS), Information gain (IG) and feature deduction techniques like Principle component analysis (PCA),

Linear discriminant analysis (LDA) used to find the reduced attributes. In next stage the identified features combines

classifications of Decision tree (DT), K-nearest neighbor (KNN), Support vector machines (SVM) and Naive Bayes (NB) to

address the limitation of high dimensional classification. The proposed method achieves efficient Accuracy, True churn (TC),

Specificity, False churn (FC) and Precision which can be used to predict customer churn efficiently. It has been concluded

that the overall performance of RSAS based classifier is much better than other algorithms.

Keywords: CRM, Churn, Telecommunication, Feature Selection, RSAS, IG, Feature Reduction, LDA, PCA, Classifier, DT,

KNN, SVM, NB

MYAPEC002

Defect Detection in Metal Sheets Using KNN

Anoopa Jose Chittilappilly1 & Kamalraj Subramaniam2

1,2Department of Electronics & Communication Engineering Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, India

[email protected], [email protected] Abstract. For identifying the defects in industrial applications image restoration and classification algorithms are used. The

processes involved are acquisition of metal sheet image, converting original image into gray scale, restoring the image,

feature extraction and defect detection. Image restoration being the important preprocessing technique has been addressed

with the Non-Local Means (NLM) based algorithm. To improve the performance of the defect detection system, the k-

Nearest Neighbor (KNN) algorithm has been suggested. Accuracy, sensitivity, specificity, precision, recall, F-Measure and

G-Means are the indices that evaluated the performance of the detection algorithm.

Keywords: Image Restoration, Classification, Non-Local Means (NLM), Average RGB Features, k-Nearest Neighbor (KNN).

MYAPEC04

8

Risk Mitigation Model for Cyber Threat: A Case Study Approach

Joshi Sujata1, Pandey Roshan 2

1Professor, Symbiosis Institute of Telecom Management, Symbiosis International (Deemed University), Pune, India,

[email protected].

2 Student, Symbiosis Institute of Telecom Management, Symbiosis International (Deemed University), Pune, India,

[email protected] Abstract. Organizations today are relying heavily on digital processes to manage their businesses hence Digital Risk

Management (DRM) has gained immense importance. As organizations are moving towards digital transformation, it is

becoming increasingly important for them to understand the digital risks associated with this move .The objective of this

study is to understand the risks in the area of cyber threat by studying several organizational use cases and propose a

mitigation model to curtail the risks in these areas. The paper adopts a case study based approach and discusses use cases

of cyber threats, its impact and solutions for its mitigation. The study aims at providing insights to managers in the area of

cyber risk and proposes solutions for mitigation of those risks. It will help managers cultivate a fresh approach to understand

and adapt to emerging digital threats and develop a resilient digital risk management strategy for the organization.

Keywords: Digital risk, Cyber threat, Mitigation model

MYAPEC052 0

Bank Vault Security System Based on Infrared Radiation and GSM Technology

Mithun Dutta1*, Md. Ashiqul Islam2, Mehedi Hasan Mamun3,

Kangkhita Kaem Psyche4, Mohammad Al Mamun5

1,5Lecturer, Rangamati Science and Technology University, Rangamati, Bangladesh 2,3Student, Daffodil International University, Savar, Dhaka, Bangladesh

4Jahangirnagar University, Savar, Dhaka, Bangladesh [email protected]

Abstract: Recently banking security systems are getting more awareness and importance. Through this project a security

system has been designed to protect the bank vault from theft or unauthorized access. This banking security system with

high security based on Infrared ray and GSM technology, sensors(Sound sensor, Motion sensor, Laser sensor and Gas

sensor), IP camera, microcontroller, keyboard, and LCD. Warning SMS will be send to dedicated phone number through

GSM technology. In this paper highly reliable, multi level and most efficient vault security system has been designed. The

system may includes a biometric system, i.e., a fingerprint scanner or an iris scanner with a password/PIN, which are

responsible for the security of the main door of the vault and the system also includes Infrared radiation between the walls of

bank vault room to provide fine security of the vault. Walls of the vault room is specially designed in two sections maintaining

parallel gap where the Infrared radiation will pass from the Infrared radiation sources to prevent any accident like wall break

robbery. To monitor the unauthorized people in the vault area a passive infrared sensor is fixed. If any unauthorized motion

is detected from the camera the picture will be mailed to security office and the alarms will be on. The proposed security

system of bank vault has been designed and it has been tested several times and found most effective security system.

Keywords: GSM, Sensors, Infrared Radiation, IP camera, PIN, Microcontroller.

MYAPEC064

Energy Optimization and Sharing in Smart Grid with Renewable Energy System using Cyber Physical System

R.Karthikeyan1, Dr.A.K.Parvathy2, S.Priyadharshini3

1Assistant Professor, Department of Electrical and Electronics Engineering, Velammal Institute of Technology, Tamil Nadu, India

[email protected]

2Professor,Department of Electrical and Electronics Engineering, Hindustan university of Science and Technology, Tamil Nadu, India

[email protected]

3Assistant Professor, Department of Electrical and Electronics Engineering, Hindustan university of Science and Technology, Tamil Nadu, India ,

Abstract— The recent development in Micro smart grid technology has improved energy efficiency and renewable energy

utilization rate to serve local load with dispersed resources. We Propose a Hierarchical Household Load priority Load

scheduling algorithm using cyber physical controller for Hybrid Energy Management in micro Smart Grids to maximize the

utilization rate of the Renewable energy resources connected to the system. The Household appliances are connected to

bundle with different priority according to the energy consumption pattern and the customer sophistications. The inclusion of

energy storage systems in micro grids provides the energy management with additional degrees of freedom, and therefore,

makes the micro grid more flexible to the changeable situations. This paper focuses on implementing adaptable energy

management system for micro grids in order to coordinate generation, demand, and storage, as well as compensate the

effects of the variability of renewable energy generators and load fluctuations, in view of the user necessities. The

considered hybrid energy systems comprise of renewable sources (solar photovoltaic and wind turbine), conventional

systems (utility grid connection), battery-based energy storage systems and loads. In this work, a modular structure of

energy management system is introduced in order to conduct the function of optimizing the energy dispatch of distributed

resources. The Scheduling of the appliance are done according the priority and the availability of the renewable resources

such as Photovoltaic Cells and Wind energy added to the grid. The proposed scheduling algorithm used Minority Game

Technique to improve the utilization factor of the renewable resources. The System further uses Non- Intrusive Load

monitoring is essential to obtain specific power consumption by individual appliances which will be used to allocate priority

during the load scheduling.

Keywords: Smart Grid, Load Scheduling, Non-Intrusive, Renewable Resources, Hybrid Energy Management, Cyber

Physical System

MYAPEC066

Sonet DCS Self Healing Network Control architecture implementation by survivable Fiber Optic Networks

K.V.S.S.S.S.Sairam Chandra Singh , D K Shreekantha P Sai Vamsi K Annapurna K and Sarveswara Rao

125 Dept. of ECE, NMAMIT, India 46 Dept. of CSE, NMAMIT, India

Dept. of ISE, NMAMIT, India Dept. of CSE, CEC, India

[email protected],[email protected], [email protected]

Abstract. Optical Communication System implies Elements, Devices and Systems. Optical Networks consists of three

domains such as Networking, Switching and Routing. Survivability plays an important role in order to protect the network

from failures. Hence survivability in optical network determines the interconnectivity between user and system

configurations. Today’s Optical Network Environment (ONE) presents N X N and carries the demands in terms of THz. Thus

two modes are described to plan and design of SFON, They are Physical Layer Mode (PLM) and Logical Layer Mode (LLM).

PLM consists of cross connectivity of digital signals, bandwidth estimation, user survivability impact ratio, network path

estimation and network capacity model. In LLM it describes the user node and flow survivability path, scaled the node

position dependency and independency between different topologies to evaluate the throughput of the system Tier

Configurations (TC). Further these modes present the Local and Global fairness (LGF) scenario regarding the packet

transfer between Single Period Demand (SPD) to Multi Period Demands(MPD). The DCS Network, Restoration methods are

processed by using five phases viz. Detection, propagation , Routing ,Rerouting and Normal Path. Further these methods

can be implemented by Self Healing Centralized Demand (SHCD) and Distributed Demand(DD) , Static versus Dynamic

rerouting path and signal restoration level by using Network Restoration i.e. Digital Cross Connectivity.

Key Words : Optical Network Environment (ONE) , Physical Layer Mode (PLM) , Logical Layer Mode (LLM) , Tier

Configurations (TC) , Local and Global fairness (LGF), Single Period Demand (SPD) , Multi Period Demands(MPD) , Digital

Cross Connectivity System (DCS), Self Healing Centralized Demand (SHCD) , Distributed Demand(DD).

MYAPEC069

Conference Chair (s)

Dr. Nur Hafizah Ghazali

University Malaysia Perlis, Malaysia

Dr. Thangaprakash Sengodan

SVS College of Engineering, India

Organizing Chair

Dr. Mohammad Faridun Naim Tajuddin

University Malaysia Perlis, Malaysia

Editors

Dr. Ramani Kannan

University Technology Petronas, Malaysia

Dr. Sanjeevkumar Padmanaban

Aalborg University, Denmark

Finance Chair

Mr. Azralmukmin Azmi

University Malaysia Perlis, Malaysia

Review Committee Chair(s)

Dr. Baharudin Bin Ismail

University Malaysia Perlis, Malaysia

Dr. Marimuthu C

Nandha Engineering College, India

Publicity Chair(s)

Mr. Mohammad Fayzul Mohammad

University Malaysia Perlis, Malaysia

Mr. Ahmad Asri Abd Samat

University Technology Mara, Malaysia

Technical Program Committee

Dr. Shahrin Md Ayob, University Technology Malaysia, Malaysia

Dr. Amjad Anvari, Aalborg University, Denmark

Dr. Sardar Ethem Hamamci, Inonu University, Turkey

Dr. Sanjay Misra, Covenant University, OTA, Nigeria

Dr. Omar Ellabban, Texas A&M University, Qatar

Dr. Mani V N, Senior Scientist, DEIT, Hyderabad, Govt. of India

Dr. R. N. Patel, National Institute of Technology, Raipur

Dr. Mandal S K, NITTTR, Kolkatta

Dr. Krishnan A, KSR College of Engineering, India

Dr. Senthikumar S, SVS College of Engineering, India

Dr. Anand Nayyar, Duy Tan University, Vietnam

Dr. R. Murugappan, KIST, Kwait

Dr TOH Tien Choon, Universiti Tunku Abdul Rahman, Malaysia

Ex

ecu

tiv

e C

om

mit

tee

Partners

Academic Partners Sponsor Publication PartnerMedia Partner

SoESE

ICA

ISC

O 2

019

Peer Reviewed

Call for Papers

First International Conference on

12 - 13, April 2019Coimbatore I INDIA

First International Conference on

Emerging Electrical Energy, Electronics andComputing Technologies 2019 (ICE4CT 2019) 30 - 31, October 2019 I Hatten Hotel I Melaka, Malaysia

IOPscience

Publications

Journal of Physics : CSIOP Conference proceedings journal

SCOPUS

International Nuclear Information System (INIS)

NASA – Astrophysics Data System

Chemical Abstracts

Polymer Library, etc.

Conference Proceedings Citation Index – Science (CPCI-S)

(Thomson Reuters, Web of Science)

Inspec

ICE4CT 2019

All the accepted papers will be published in

Deadline for paper submission

20, JULY 2019

Indexed in

For more details, please visit www.ice4ct.com

The proceedings of ICCE4CT 2019

TOPICS (but not limited to)

Web of Science & Scopusindexed publications

MALAYSIAPublication Partner

IOPscience

Journal of PhysicsConference series

Call for Papers

Electrical Engineering

Electrical Materials and Process

Electronic Materials and Process

Semiconductor Technology

Power Systems and Energy Engineering

Soft Computing Techniques in Power Systems

Electromagnetics

Power Electronics & Energy Efficient Drives

Renewable Power Conversion Technologies

Power Quality Improvement Techniques

Electrical Machines and Industry Applications

Medical Electronics

High Voltage Engineering & Insulation Technology

Photo/Opto Electronics

Journal of Physics: Conference Series

doi:10.1088/issn.1742-6596

Online ISSN: 1742-6596

Print ISSN: 1742-6588

2004-present

SCOPUS - SJR H-Index (Scopus)

59JOURNAL OF PHYSICS:CONFERENCE SERIES

IOP Publishing

Publishing Partner

Energy Engineering

Energy Engineering

Energy Conversion and Management

Energy Conservation

Fuels and Alternatives

Energy Policy and Planning

Combined and Co-generation Energy Systems

Air-conditioning & Refrigeration Systems

Energy & Environmental Issues

Energy and Sustainable Development

Renewable Energy Technologies

Energy Storage

Renewable Energy Technologies

Sustainable Energy and Technologies

Soft Computing & Optimization

Soft computing in Energy

Hardware/Software Co-Design

Fault Detection and Diagnosis

Bioinformatics

Design Management

Management Production Systems

Mathematical Models

Big Data Analysis

Fuzzy Logic and Reasoning

Neural Networks

Neuro-Fuzzy Systems

Genetic/Evolutionary Algorithms

Embedded Real Time Systems

Linear and Non-linear Programming

Discrete and Combinational Optimization

Optimization Software and Techniques

Communication and Informative

Cognitive Modeling

Mechatronics Design

Vision and Sensors

Web Intelligence and Interaction

Global Optimization

Control Theory and System Dynamics

Environment and Natural Resources

Data Mining

Learning and Adaptive Systems

Information Technology

Intelligent Systems

Artificial Intelligence

Intelligent Medical Systems

Intelligent Transportation Systems

Intelligent Control and Robotics

Intelligent Manufacturing Systems

Intelligent Property

Computational Intelligence

Pattern Recognition

Machine Learning

Multi-Agent Systems

Communication Engineering

Broad Band Communication

Computer and Intelligent Communication

Mobile and Optical Communication

Wireless Communication

Mobile and Optical Networks

Wireless Sensor Networks

Network Security

Advanced VLSI Systems

Embedded Wireless Systems

Medical Informatics

Hardware Engineering

Mechatronics

Robotics & Automation

Journal History

IOP Conference Series Journal of Physics

IOP Publishing

Emerging Electrical Energy, Electronicsand Computing Technologies 2019(ICE4CT 2019)

24 - 25, July 2019 I Malacca, Malaysia

Selamat Datang Ke

Selected papers will be published in

SCOPUS INDEXED JOURNALS

School of Electrical Systems Engineering

Organized by

Conference management solutions

DiligentecEmpowering your potential

Solutions

Technical sponsor

IOP : Journal of Physics (JPCS)