System to Detect Human Being Buried under the Rubble During Disaster
Death of lots of people occurs as a cause of earthquake. Such news comes in newspaper after the unavoidable casualty. Because of this, unlimited numbers of people die. It occurs as a result of disasters such as tunnel dropping, snowfall and fall of landslides. The effect of fall of landslides occurs in June 2013, due to heavy rain came in Uttarakhand. Such worst incident happened in 2013, because of this, lost precious lives. When many people are buried under rubble during disaster, at that situation the most important question come in mind that how to enter the area using rescue teams .The microwave life detection system is developed to detect subject or object buried under the rubble of collapsed building during the earthquake or other disasters. The object or subject includes human being/ victims. The proposed motion detection system uses microwave frequency electromagnetic signal which is able to detect motion of moving object. This system decides whether the object is in motion or not. The Doppler frequency shift of the wave is the operational principle of motion detection system. The motion detection system uses microwave doppler radar sensor sense these waves reflected back from the object if object is in motion and present below the ground level. Once the motion is detect, then able to decide whether the object is human being or not. Then system using microwave test bench is used to decide whether the object is human being or not. Also, system operate using microwave test bench used to detect the breathing and heartbeat signals of subject. The matlab simulink model show heartbeat and breathing signal. By using all these system, able to decrease world death rate to greater extent.
Published by: Apurva S. Ubhale, Prof. P. N. Pusdekar
Author: Apurva S. Ubhale
Paper ID: V3I3-1337
Paper Status: published
Published: May 19, 2017
Review of Approaches Under Water Image Enhancement
Because of the poor perceivability conditions nature of the world's seas is as yet not very much investigated for this reason Underwater picture improvement procedures are utilized, on the grounds that the earth is a sea-going planet and as the reality around 70%of its surface is secured by water. Presently a days there is a solid enthusiasm for recognizing what lies in submerged, and besides, this field has made a significance to the utilization of submerged successions to screen marine species, Underwater mountains and plants, to accomplish this reason it is totally important to utilize the unmistakable pictures. Here additionally talked about the impacts of shading in submerged pictures. Regarding light reflection, portrays that the impression of the light differs enormously relying upon the structure of the ocean. Another worry is identified with the water that twists the light either to make crease designs or to diffuse. In particular, the nature of the water controls and impacts the separating properties of the water, for example, sprinkle of the clean in water . Perceivability reclamation alludes to various strategies that expect to lessen or expel the decay or corruption that have happened while the computerized picture was being gotten
Published by: Karamjit Kaur, Rajnish Kansal
Author: Karamjit Kaur
Paper ID: V3I3-1335
Paper Status: published
Published: May 18, 2017
A New Hybrid Approach on Face Detection and Recognition
Face detection and recognition is an important paradigm when we consider the biometric based systems. Among various biometric elements, the face is the most reliable one and can be easily observed even from a distance as compared to iris or fingerprint which needs to be closely observed to use them for any kind of detection and recognition. Challenges faced by face detection algorithms often involve the presence of facial features such as beards, mustaches, and glasses, facial expressions, and occlusion of faces like surprised or crying. Another problem is illumination and poor lighting conditions such as in video surveillance cameras image quality and size of an image as in passport control or visa control. Complex backgrounds also make it extremely hard to detect faces. In this research work, a number of methods and research paradigms pertaining to face detection and recognition is studied at length and evaluate various face detection and recognition methods, provide a complete solution for image-based face detection and recognition with higher accuracy, a better response rate as an initial step for video surveillance.
Published by: Saloni Dwivedi, Nitika Gupta
Author: Saloni Dwivedi
Paper ID: V3I3-1331
Paper Status: published
Published: May 18, 2017
Implementation of an Efficient and Robotically Operated Home Automation System Using the Robustness of IOT
With the advancement of Automation technology, life is obtaining less complicated and easier in all aspects. In today’s world, Automatic systems are being most well-liked over the manual system. With the speedy increase within the variety of users of the web over the past decade has created the web a region and parcel of life, and IoT is that the latest and rising web technology. Internet of things may be a growing network of the everyday object-from industrial machine to the commodity which will share data and complete tasks whereas you're busy with alternative activities. Wireless Home Automation system (WHAS) victimization IoT may be a system that uses computers or mobile devices to regulate basic home functions and options mechanically through the web from anyplace round the world, an automatic house is generally referred to as a sensible home. It’s meant to avoid wasting the electrical power and human energy. The house automation system differs from the alternative system by permitting the user to work the system from anyplace round the world through web affiliation. In this paper, we have a tendency to gift a Home Automation system (HAS) victimization raspberry pi that employs the combination of cloud networking, wireless communication, to produce the user with remote of varied lights, fans, and appliances within their home and storing the info within the cloud. The systems can mechanically amendment on the premise of sensors’ information. This technique is meant to be low value and expandable permitting a spread of devices to be controlled.
Published by: Muthubharathi .R, Vigneshkumar .B, Durgalakshmi .K
Author: Muthubharathi .R
Paper ID: V3I3-1317
Paper Status: published
Published: May 18, 2017
Cryptography- A Fundamental Tool for Directions of Research Process-An Overview
In Today’s, Digital communications Era sharing of information is increasing significantly. The Information being transmitted is vulnerable to various passive and active attacks. Therefore the information security is one of the most challenging aspects of communication. Cryptography plays an integral role in secure communication and it provides an excellent solution to offer the necessary protection against the Data Intruders. Over a period of time, Data encryption techniques took a massive leap from simple methods too complicated mathematical circulations. In order to achieve secure communications, however still with its complexity erypgraphic algorithms are prone to one or many attacks. Therefore this paper presents a detailed study about the Directions of safety, protection that leads to the Research process. The various symmetric key encryption techniques, its comparison, and the attacks to which they are vulnerable to.
Published by: Dr. V. Venkateswara Rao
Author: Dr. V. Venkateswara Rao
Paper ID: V3I3-1302
Paper Status: published
Published: May 18, 2017
Campus Connect : Advanced QR based Identity Card
Educational institution in developing countries is a vast sector and it is expanding rapidly. With the rapid growth of technologies, educational institutions are still lagging behind. For identification of students they still lie on manual handwritten ID card and files. If proper ID card system is introduced then it would be much easier to identify a student and can track his/her progress. Therefore, in this research we implemented advanced using of QR code and student ID generation. We tried level best to make right implementation of QR code with student ID card. Automated student ID had image capturing facility and requirements of an ID and there is no need of hand written ID card. QR code is attached into ID card and student personal details can be found by scanning the QR code with smart phones (downloaded & installed QR reader software). QR code is said to be the next generation of bar code and using QR code with ID card brought positive outcomes. While using software tools, identity cards works fine and suitable for an educational institution as it is free. Thus, ID card will be a perfect use of modern technology in developing countries.
Published by: Muthuraj, Nagashayan, Thejaswi G. N, Rahulkumar Solanki
Author: Muthuraj
Paper ID: V3I3-1295
Paper Status: published
Published: May 18, 2017