Conference Proceedings

Conference Id
:
GRDCF003
Organized By
:
Loyola – ICAM College of Engineering and Technology (LICET)
Date
:
10th March, 2017
Venue
:
Department of Information Technology, Loyola - ICAM College of Engineering and Technology (LICET), Loyola Campus, Nungambakkam, Chennai, Tamil Nadu 600034
 
Title
:
Augmented Reality Multiplayer Gaming
Article Type
:
Research Article
Author Name(s)
:
Ms. G.Shobana, Loyola ICAM College of Engineering and Technology; C.Subramaniam ,Loyola ICAM College of Engineering and Technology; S.Thirshal ,Loyola ICAM College of Engineering and Technology; J.Jason Elliot ,Loyola ICAM College of Engineering and Technology
Country
:
India
Research Area
:
Augmented Reality

Augmented Reality Gaming is a fast developing technology in the gaming world. It integrates the game’s visual and audio content with the user's environment in real time. This technology enables us to use the existing environment and help create a playing field within it. In this paper, we are proposing a multi-player game using augmented reality through Wi-Fi/hotspot to play offline. Here, one can view cubes in their augmented world through their camera. The user in single player mode must locate the cubes in their environment and shoot the cubes to score and progress to the next level. The users in multi-player mode compete with each other to score within the given time frame. This being a completely offline game serves as a biggest advantage as it could be played anywhere and it could be widely used by everyone to have a fun gaming experience.

Keywords : Offline, Multiplayer, Wi-Fi, hotspot, augmented reality

Recent

[1] Jingang Wang, Xiao Xiao, Hong Hua, Member, IEEE, and Bahram Javidi, Fellow, IEEE,” Augmented Reality 3D Displays With Micro Integral Imaging”, Journal of Display Technology, Vol. 11, NO. 11,November 2015. [2] Andreas Daniel Hartl, Member, IEEE, Clemens Arth, Member,IEEE, Jens Grubert, Member, IEEE, and Dieter Schmalstieg, Senior Member, IEEE,-” Efficient Verification of Holograms Using Mobile Augmented Reality”, IEEE Transactions on Visualization and Computer Graphics, Vol.22, NO. 7, JULY 2016. [3] Min Ki Park, Kyu Je Lim, Myoung Kook Seo, Soon Jong Jung, Kwan H. Lee ,” Spatial augmented reality for product appearance design evaluation ”, Journal of Computational Design and Engineering. [4] J. P. Rolland and H. Fuchs, “Optical versus video see-through head-mounted displays in medical visualization,” Presence-Teleop. VIRT,vol. 9, pp. 287–309, 2000. [5] Q. Wang, D. Cheng, Y. Wang, H. Hua, and G. Jin, “Design, tolerance,and fabrication of an optical see-through head-mounted display withfree-form surface elements.,” Appl. Opt., vol. 52, pp. C88–C99, 2013. [6] S. Liu and H. Hua, “Time-multiplexed dual-focal plane head-mounteddisplay with a liquid lens.,” Opt. Lett., vol. 34, pp. 1642–1644, 2009. [7] H. Hua, X. D. Hu, and C. Y. Gao, “A high-resolution optical see-through head-mounted display with eyetracking capability,” Opt. Ex-press, vol. 21, pp. 30993–30998, 2013.

Title
:
Detection and Prevention of Black Hole Attack in MANET
Article Type
:
Research Article
Author Name(s)
:
Evangelin Motha.C, Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; K.J.Isabel Steffi ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; R.W.Jessica Jency ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; Sherril Sophie Maria Vincent ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India
Country
:
India
Research Area
:
MANET

The wireless Ad-hoc network is one of the active and vibrant in the field of communication and network. Mobile Ad-hoc network [MANET] is one of the field of wireless networks that provides the research and development of the wireless networks in various applications. The 2-way routing protocol is being implemented for the detection of black hole attack in MANET that has same data packet to be transmitted from source to the destination as a replication via two protocols such as AODV (Ad-hoc on-demand routing) protocol and DSR (destination sequence routing) protocol. The problem defined in this paper is the black hole attack that deprives the normal transmission of data packets from source to destination by introducing the malicious node that drops or discards the packet without being transmitted to the destination thus causing the loss of the packet, end to end delay and reduction in the packet delivery ratio. The solution to the above problem is the usage of the 2-way routing protocol that assures the effective outcome of detecting the malicious nodes by traversing the packet across another destined route. The solution comprising the 2-way routing protocol is comparatively effective than the existing mechanisms in a way that it detects the route of the malicious node and traverses the packet via another route using different protocol simultaneously.

Keywords : MANET, AODV, DSR, 2-Way Routing Protocol

Recent

[1] Kanchan Ubnare , Prof. Navneet Manghi , Prof. Vimal Shukla, "A Comparative Study of Routing Protocols in Mobile Ad-hoc Networks" ,in International Journal of Emerging Technology and Advanced Engineering; Volume 4, Issue 3, March 2015 Publication Year: 2014 [2] M. Swathi, B. Pravallika, N. V. Muralidhar, “Implementing And Comparison of MANET Routing Protocols Using NS2”,in International Journal of Emerging Technology and Advanced Engineering; Volume 4, Issue 2, February 2014; Publication Year: 2014 [3] Sunil Kumar Yadav, Shiv Om Tiwari, “An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol”, in IOSR Journal of Computer Engineering,8727 Volume 16, Issue 1,Jan 2014. Publication Year:2014 [4] Vimal Kumar and Rakesh Kumar (2015) An Adaptive Approach for Detection of Black Hole Attack in Mobile Ad hoc Network. Available at: http://www.sciencedirect.com/science/article/pii/S1877050915006316 (Accessed: 12 February 2017) [5] Monika and Swati Gupta (2015) A Survey on Detection and Prevention of Black Hole Attack in MANET. Available at: http://www.ijecs.in/issue/v4-i8/17%20ijecs.pdf (Accessed: 12 February 2017) [6] Tejasvi Thanvi, Neeraj Arora and Piyush Vyas (2015) Literature Survey of MANET under Black Hole Attack. Available at: http://www.ijarcce.com/upload/2015/september-15/IJARCCE%2082.pdf (Accessed: 12 February 2017). [7] Rahul singh and Anurag Uphdaya (2016) A Literature Review on Black hole Attacks in AODV Protocol in MANET. Available at: http://www.ijettjournal.org/2016/volume-38/number-1/IJETT-V38P209.pdf (Accessed: 12 February 2017) [8] Priya Dharshini.R, Prabhu.V,Rajes Singh .S, “Research on Implementation and Comparison of Routing Protocols in MANET Using NS2”, in International Journal of Science and Research, Volume 3, Issue 4, April 2014, Publication Year: 2016 [9] Devendra Kumar and Rupali Bhartiya (2016) An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment. Available at: http://www.ijcaonline.org/archives/volume150/number9/kumar-2016-ijca-911635.pdf (Accessed: 12 February 2017) [10] Viswa Jhananie K. R (2016) An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network. Available at: https://www.ripublication.com/ijaer16/ijaerv11n5_39.pdf (Accessed: 12 February 2017)

Title
:
Software Release Collaboration System
Article Type
:
Research Article
Author Name(s)
:
Angeline Hazel Henry, Loyola-ICAM College of Engineering and Technology Chennai, India; Chandhini.G ,Loyola-ICAM College of Engineering and Technology Chennai, India; Mariesha Justin ,Loyola-ICAM College of Engineering and Technology Chennai, India; Ms. Ramya Laurraine.U ,Loyola-ICAM College of Engineering and Technology Chennai, India
Country
:
India
Research Area
:
Collaboration System

The key to web based collaboration between multi-site software developers and team members is how effective these distributed teams share development work products and project status. Recently systems have evolved to aid information sharing in a more flexible manner. These systems support video tools, media tools with centralized repository tools for effective communication. Most previous studies have thrown light into the obstacles of using these highly technological media tools. Some of the major impediments are different time-zones and cultures, IT infrastructure in mostly Agile Global Software Development (AGSD). This paper proposes a system where developers can remain offline ensuring a simple, user friendly guiding route map in the developmental environment. The software ensures organizing of builds for easier tracking of completed modules.

Keywords : Agile Global Software Development, Distributed Web Collaboration, Globally Distributed Teams, Builds, Synchronous Communication

Recent

[1] M.J. Abel, “Experiences in an Exploratory Distributed Organization,” Intellectual Teamwork: Social Foundations of Cooperative Work, J. Galegher, R.E. Kraut, and C. Egido, eds., pp. 489-510, 1990. [2] R.D. Battin, R. Crocker, J. Kreidler, and K. Subramanian, “Leveraging Resources in Global Software Development,” IEEE Software, vol. 18, no. 2, pp. 70-77, Mar./Apr. 2001. [3] F.P. Brooks Jr., The Mythical Man-Month: Essays on Software Engineering. Addison Wesley, 1995. [4] E. Carmel, Global Software Teams. Prentice-Hall, 1999. [5] B. Curtis, H. Krasner, and N. Iscoe, “A Field Study of the Software Design Process for Large Systems,” Comm. ACM, vol. 31, no. 11, pp. 1268-1287, 1988. [6] P. Dourish and S. Bly, “Portholes: Supporting Awareness in a Distributed Work Group,” Proc. ACM Conf. Human Factors in Computing Systems, pp. 541-547, 1992. [7] C. Ebert and P. DeNeve, “Surviving Global Software Development,” IEEE Software, vol. 18, no. 2, pp. 62-69, Mar./Apr. 2001. [8] R.S. Fish, R.E. Kraut, and R.W. Root, “Evaluating Video as a Technology for Informal Communication,” Proc. ACM Conf. Human Factors in Computing Systems, pp. 37-48, 1992. [9] J. Galbraith, Organizational Design. Addison-Wesley, 1977. [10] R.E. Grinter, J.D. Herbsleb, and D.E. Perry, “The Geography of Coordination: Dealing with Distance in R & D Work,” Proc. Int’l ACM SIGROUP Conf. Supporting Group Work, pp. 306-315, 1999. [11] M. Handel and J.D. Herbsleb, “What Is Chat Doing in the Workplace?” Proc. ACM Conf. Computer Supported Cooperative Work, pp. 1-10, 2002. [12] J.D. Herbsleb and R.E. Grinter, “Splitting the Organization and Integrating the Code: Conway’s Law Revisited,” Proc. Int’l Conf. Software Eng., pp. 85-95, 1999. [13] J.D. Herbsleb, H. Klein, G.M. Olson, H. Brunner, J.S. Olson, and J. Harding, “Object-Oriented Analysis and Design in Software Project Teams,” Human-Computer Interaction, vol. 10, nos. 2-3, pp. 249-292, 1995. [14] J.D. Herbsleb, A. Mockus, T.A. Finholt, and R.E. Grinter, “An Empirical Study of Global Software Development: Distance and Speed,” Proc. Int’l Conf. Software Eng., pp. 81-90, 2001. [15] “Global Software Development,” IEEE Software, J.D. Herbsleb and D. Moitra, eds., vol. 18, no. 2, Mar./Apr. 2001. [16] R.E. Kraut and L.A. Streeter, “Coordination in Software Development,” Comm. the ACM, vol. 38, no. 3, pp. 69-81, 1995. [17] Agustin Yagüe , Juan Garbajosa, Jessica Díaz, Eloy González,” An exploratory study in communication in Agile Global Software Development” in Computer Standards & Interfaces , xxx edition. Madrid, Spain: Elsevier, 22 June 2016, 184–197.

Title
:
Product Review Analysis using Big Data Analytics
Article Type
:
Research Article
Author Name(s)
:
Jovitha Christina .R.H, Loyola-ICAM College of Engineering and Technology Chennai, India; Mary Caroline Nikitha ,Loyola-ICAM College of Engineering and Technology Chennai, India; Kavitha .V ,Loyola-ICAM College of Engineering and Technology Chennai, India
Country
:
India
Research Area
:
Big Data

Sentiment Analysis is the process of using text analytics to mine various data sources for opinions. Often, sentiment analysis is done on the data that is got from the Internet and from various social media platforms. Because the content collected from the internet is unstructured, we need tools that can process and analyze this disparate data. Hence we make use of Big Data to handle the different sources and formats of the structured and unstructured data. In particular consumer reviews of a product are given in textual format, we first parse the reviews and classify them into positive and negative and then send these datasets to the Hadoop File System (HDFS) to analyze them. This helps the purchaser to have some knowledge about the product’s pros and cons and decide which product to buy.

Keywords : Big Data, HDFS, HIVE, Key Generation, Sentiment Analysis, Sqoop

Recent

[1] Bing Liu,"Exploring User Opinions in Recommender Systems", Proceeding of the second KDD workshop on Large Scale Recommender Systems and the Netflix Prize Competition", Aug 24, 2008, Las Vegas, Nevada, USA. [2] Lina Zhou, Pimwadee Chaovalit, “Movie Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches”, Proceedings of the 38th Hawaii International Conference on system sciences, 2005. [3] B. B. Khairullah Khan, Aurangzeb Khan, “Sentence based sentiment classification from online customer reviews,” ACM, 2010. [4] Tomasz Jacha, Ewa Magieraa, Wojciech Froelicha “Application of HADOOP to Store and Process Big Data Gathered from an Urban Water Distribution System “ Procedia Engineering 119 on 2015,pp.1375 – 1380 [5] Y. Chen, S. Alspaugh, D. Borthakur, R. Katz, “Energy efficiency for large-scale mapreduce workloads with significant interactive analysis”, in: Proceedings of the 7th ACM European conference on Computer Systems, EuroSys ’12, 2012,pp. 43–56. [6] F. L. Gang Li, “A clustering-based approach on sentiment analysis,” IEEE, 2010. [7] M. X. Y. S. Haiping Zhang, Zhengang Yu, “Feature- level sentiment analysis for chinese product reviews,” IEEE, 2011. [8] Suresh Ramanujam,R. Nancyamala, J.Nivedha, J.Kokila “Sentiment analysis using big data” [9] Andry Alamsyah, Marisa Paryasto, Feriza J. Putra, Rizal Himmawan, "Network text analysis to summarize online conversations for marketing intelligence efforts in telecommunication industry", Information and Communication Technology (ICoICT) 2016 4th International Conference on, pp. 1-5, 2016.

Title
:
Remote Internet Speed Test
Article Type
:
Research Article
Author Name(s)
:
J.Betcy Vinitha, Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India; J.S.Sherine Shruthi ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India; Mrs. Sherril Sophie Maria Vincent ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India; Godwin Sam Josh ,GloriaTech Chennai, India
Country
:
India
Research Area
:
Internet of things

Among the panoply of applications enabled by the Internet of Things (IoT), the essential part of the system is the internet as they link the devices together. The existing problem is the inability to know the status of a remote sensor or tracking device that is connected to the internet from a moving vehicle or a device fixed in a remote industrial location where there is lack of access to good quality internet. The other area where a remote speed test is useful is for service providers to monitor the status of their Internet Servers to enable them to provide better quality services to their clients. This project focuses on the use of Node.js, Express and Socket.IO to solve this very specific problem. Through the Remote Internet Speed Test (RIST) application, we resolve this issue by enabling the administrators of these devices to always know the quality and status of the internet connected to it irrespective of where they are and where the devices are located. Specifically, it does not matter even if the device and the person trying to remotely test the speed of the device are behind NAT or Firewalls as long as they both have access to the internet. The ability to connect to each other across routers and firewalls is enabled by the Socket IO server. Devices register to the server using their unique device id’s. The results of the application enable the administrators to improve their services as faster speed equates to better performance.

Keywords : Internet of things (IOT), Remote speed test, Socket IO, asynchronous communication, passportjs

Recent

[1] Jiong Jin, Jayavardhana Gubbi, Slaven Marusic, and Marimuthu Palaniswami, “An Information Framework for Creating a Smart City through Internet of Things,” IEEE Internet of things journal, vol. 1, no. 2, April. 2014 [2] "Socket.IO". En.wikipedia.org. N.p., 2017. Web. 2 Mar. 2017. [3] "Ping". En.wikipedia.org. N.p., 2017. Web. 2 Mar. 2017. [4] “How is internet speed measured ". Testinternetspeed.org. N.p., 2017. Web. 2 Mar. 2017. [5] Fabiano, Simone. "Benchmarking Socket.IO Vs. Lightstreamer with Node.Js". Blog.lightstreamer.com. N.p., 2017. Web. 2 Mar. 2017. [6] "Machine-Uuid". npm. N.p., 2017. Web. 2 Mar. 2017. [7] "Github - Ddsol/Speedtest.Net: Node.Js Speedtest.Net Client Module". Github.com. N.p., 2017. Web. 2 Mar. 2017. [8] “Speed test servers ". Speedtest.net. N.p., 2017. Web. 2 Mar. 2017. [9] "Bootstrap (Front-End Framework)". En.wikipedia.org. N.p., 2017. Web. 2 Mar. 2017. [10] "Passport". Passportjs.org. N.p., 2017. Web. 2 Mar. 2017. [11] "Justgage - Nice & Clean Dashboard Gauges". JustGage. N.p., 2017. Web. 2 Mar. 2017. [12] "Node.Js". En.wikipedia.org. N.p., 2017. Web. 2 Mar. 2017. [13] "Express - Node.Js Web Application Framework". Expressjs.com. N.p., 2017. Web. 2 Mar. 2017. [14] Stefan poslad et al.,” A Semantic IoT Early Warning System for Natural Environment Crisis Management,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 2, May.2015 [15] Shaofang Gong and Magnus Karlsson,” Pushing the Wireless Data Rate to the Internet Speed,” IEEE Access Special section on optimization for emerging wireless networks: iot, 5g and smart grid communications, vol.4, November.2016

Title
:
AC Care Mobile Application
Article Type
:
Research Article
Author Name(s)
:
Ms. Felicia Lilian .J AP, Loyola – ICAM College of Engineering and Technology (LICET); Ananthakrishnan.K ,Loyola – ICAM College of Engineering and Technology (LICET); Joseph.C ,Loyola – ICAM College of Engineering and Technology (LICET)
Country
:
India
Research Area
:
Wireless computing devices

A Mobile application is a software developed specifically for the use of wireless devices such as tablets and mobile phones instead using laptops or desktop computers. This technology enables us to create applications that serves multiple purposes. In this paper, we are proposing an app which enables customers to book servicemen in just a click. Customer have to register with us to avail our service after which they can choose the problems that they incur with their AC units and book a serviceman. Our app also enables our customer to track their serviceman which is an added advantage so that, they can track their serviceman till they reach their doorstep through the GPS located in their mobile units.

Keywords : Wireless computing devices, Mobile app, GPS, Location tracking

Recent

[1] Designing branded mobile app: Fundamentals & Recommendations - Business Horizons- Volume 58(Issue 3) published in May 2015. [2] A method for real – time trajectory y monitoring to improve taxi service using GPS –Information Management- Issue 1 published in July 2016. [3] Identifying the sport activities of GPS tracks- Procedia Computer Science-Volume 80(Page no. 301-312) published in June 2016 [4] Java Programming for Android Developers for Dummies 1st Edition (Barry Burd). [5] https://developers.google.com/maps/documentation/javascript/adding-a-google-map [6] https://www.codeproject.com/Articles/665527/A-GPS-Location-Plotting-Android-Application

Title
:
Cloud-Based Encrypted Health Record
Article Type
:
Research Article
Author Name(s)
:
Roselin Sagaya Mary.V, Loyola-ICAM College of Engineering and Technology(LICET), Chennai, India; Annie Majellaa.M ,Loyola-ICAM College of Engineering and Technology(LICET), Chennai, India; Ms. Felicia Lilian .J ,Loyola-ICAM College of Engineering and Technology(LICET), Chennai, India
Country
:
India
Research Area
:
cloud computing

Cloud Computing, an Internet-based computing being ubiquitous in nature has spread its capability to various sectors. The cloud service due to its immense computing power, nominal cost of services, high performance, scalability, accessibility as well as availability is highly desirable. Infrastructure as a service (IaaS) is one of the most basic yet widely adopted cloud service model. It provides infrastructure such as physical computing resources, location, data partitioning, scaling, security and backup from large pools of equipment and is widely accepted and used. Health industry, being one of the largest and fastest growing industries is the primary consumer of recent technology and makes maximum use of Cloud service. Health organizations hold records of many patients and all these records are to be stored accurately and efficiently. The most common way of execution is that all these records of patients are sent to a third-party computer organization to be stored in a cloud. This method does not exhibit data confidentiality and even poses a threat to data integrity. Our paper proposes the ability of Health organizations to hide data using steganography, encrypt the hidden health records data of patients using cryptographic algorithms in a secure manner and then store these records in cloud to access them at ease with agreeable performance.

Keywords : cloud computing, cloud service, IaaS, Health records, steganography, encryption, cryptographic algorithms

Recent

[1] “Cloud computing”, Linkedin.com N.p., 2017. Web. 17 Feb. 2017. [2] “Infrastructure as a Service”, ibm.com N.p., 2017. Web. 18 Feb. 2017. [3] "Steganography". garykessler.net. N.p., 2017. Web. 3 Feb. 2017. [4] "Encryption". En.wikipedia.org. N.p., 2017. Web. 10 Feb. 2017. [5] Chan, Chi-Kwong and L.M. Cheng. "Hiding Data in Images by Simple LSB Substitution". Pattern Recognition 37.3 (2004): 469-474. Web. [6] Tiwari, Namita and Dr.Madhu Shandilya. "Evaluation of Various LSB Based Methods of Image Steganography On GIF File Format". International Journal of Computer Applications 6.2 (2010): 1-4. Web. ". W3schools.com. N.p., 2017. Web. 18 Feb. 2017. [7] Subhedar, Mansi S. and Vijay H. Mankar. "Current Status and Key Issues in Image Steganography: A Survey". Computer Science Review 13-14 (2014): 95-113. Web. [8] Liu, Xuhui et al. "Dynamic Access Policy in Cloud-Based Personal Health Record (PHR) Systems". Information Sciences 379 (2017): 62-81. Web. [9] Mark Otto, and Bootstrap contributors. "Getting Started • Bootstrap". Getbootstrap.com. N.p., 2017. Web. 18 Feb. 2017. [10] "Steganography", dreamincode.net. N.p., 2017. Web. 18 Feb. 2017. [11] "HIPPA”, en.wikipedia.org N.p., 2017. Web. 18 Feb. 2017.

Title
:
Big Data Prediction on Crime Detection
Article Type
:
Research Article
Author Name(s)
:
Dev Naomi.G, Loyola-ICAM College of Engineering and Technology Chennai, India; Karthigaa.M ,Loyola-ICAM College of Engineering and Technology Chennai, India; Keerthana.B ,Loyola-ICAM College of Engineering and Technology Chennai, India; Janani A ,Loyola-ICAM College of Engineering and Technology Chennai, India
Country
:
India
Research Area
:
Big Data

Big data is the collection of large amount of data which is generated from various application such as social media, e-commerce etc. Those large amount of data were found to be tedious for storage and analysis. Now a day’s various tools and techniques are coming to an existence to solve this problem. One of the application where huge amount of data is massively increasing is Crime which makes a huge issue for government to provide deliberate decision by following the laws and order. These large data were kept with the solution called Big Data Analytics. The processing of this huge data generated can be analyzed with high performance when compared to traditional way of processing. By performing these analytics, the government and the people will be provided with security and a healthy nation.

Keywords : Big Data, Hadoop, HDFS, Sqoop, Pig, Hive

Recent

[1] Tahani Almanie, Rsha Mirza and Elizabeth Lor “Crime Prediction Based on Crime Types and Using Spatial and Temporal criminal Hotspots” International Journal of Data Mining & Knowledge Management Process Vol.5, No.4, July 2015 [2] S. Sathyadevan, M. Devan, and S. Surya Gangadharan, “Crime analysis and prediction using data mining,” in Networks Soft Computing(ICNSC), 2014 First International Conference on, Aug 2014, pp. 406–412. [3] J.Archenaa1 and E.A.Mary Anita2 “A Survey of Big Data Analytics in Healthcare and Government” Procedia Computer Science 50 on, 2015, pp.408 – 413. [4] Liang Zhao, Zhikui Chen, Senior Member, IEEE, Yueming Hu, Geyong Min, Senior Member, IEEE,and Zhaohua Jiang “Distributed Feature Selection for Efficient Economic Big Data Analysis” Journal Of Latex Class Files, Vol. 13, No. 9, Sep 2014. [5] Arushi Jaina, and Vishal Bhatnagara “Crime Data Analysis Using Pig with Hadoop” International Conference on Information Security & Privacy (ICISP2015), 11-12 Dec2015, pp.571 – 578 [6] Janez Kranjc,Roman Orac,Vid Podpecana,Nada Lavrac, Marko Robnik-Sikonja c “ClowdFlows:Online workflow for distributed ig data mining” Future Generation Computer Systems on 2017,pp.38-58. [7] Tomasz Jacha, Ewa Magieraa, Wojciech Froelicha “Application of HADOOP to Store and Process Big Data Gathered from an Urban Water Distribution System” Procedia Engineering 119 on 2015,pp.1375-1380 [8] Y. Chen, S. Alspaugh, D. Borthakur, R. Katz, “Energy efficiency for large-scale mapreduce workloads with significant interactive analysis”, Proceedings of the 7th ACM European conference on Computer Systems, EuroSys ’12, 2012,pp. 43–56. [9] R.Saranya, V.P.MuthuKumar, “Security issues associated with big data in cloud computing” International Journal of Multidisciplinary Research and Development Vol.2,No.4,April 2015

Title
:
Smart Cart
Article Type
:
Research Article
Author Name(s)
:
Dr. Doreen Hephzibah Miriam, Loyola-ICAM College of Engineering and Technology, Chennai; Shambhavi Sivan ,Loyola-ICAM College of Engineering and Technology, Chennai; Arthi.K ,Loyola-ICAM College of Engineering and Technology, Chennai; Shanmathi.R ,Loyola-ICAM College of Engineering and Technology, Chennai
Country
:
India
Research Area
:
RFID

Recent trends use Radio Frequency Identification (RFID) technology in day to day life. They are the ubiquitous tool available for monitoring any item in various fields. RFID technique is mainly used for the security, tracking and monitoring purposes in the tollgate transactions, bank locker security system, automatic vehicle speed control and library books security system. The communication using RFID is in the wireless manner and does not require line of sight. Application of RFID results in automation of huge and complex systems. One of the interesting applications of RFID is an automated shopping cart. Now-a-days, the billing process is highly time consuming and has created the need for shops to employ more human resource in the billing section, but yet, the waiting time remains considerably high. Hence, we propose the “Automated Shopping Cart” as a solution to the above problems. The “Automated Shopping Cart” is simply a trolley or a hand – held cart at a store, which has fixed in it an RFID reader that interacts with an Arduino UNO Controller. RFID tags are attached to every product available for sale at the store. As items are added into the cart, they are detected by the reader and their prices are summed up incrementally. On completion of the purchase and reaching the billing point, the calculated total amount for the respective customer can be transferred wirelessly to the cashier’s PC for bill generation and subsequent payment of the bill. A copy of the same is sent via an SMS to the customer’s mobile using GSM. This system is expected to speed up all the transactions, improve business for the shopping stores as well as ease up and cut down the time of the entire shopping process for the customers, especially in today’s fast moving busy world.

Keywords : RFID – Radio Frequency Identification; PC – Personal Computer; SMS – Short Message Service; GSM – Global System for Mobile communication

Recent

[1] Igor Bisio, Andrea Sciarrone , SandroZappatore , “A new asset tracking architecture integrating RFID, Bluetooth Low Energy tags and ad hoc smartphone applications,” Pervasive and Mobile Computing,vol.31,pp.79-93,2016. [2] Fernandes.H.a, VitorFilipea.b , Paulo Costac, Joao Barroso, “Location based services for the blind supported by RFID technology,” 5th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion, DSAI 2013,vol.27,pp.2-8,2014. [3] AnkushYewatkara, FaizInamdarb, Raj Singhc, Ayushyad, AmolBandale,“Smart Cart with Automatic Billing, Product Information, Product Recommendation Using RFID&Zigbee with Anti-Theft,” 7th International Conference on Communication, Computing and Virtualization 2016,vol.79, pp.793-800, 2016. [4] R.Malliga.ME,T.Narmatha,“RFID-based System for School ChildrenTransportation Safety Enhancement,” International Journal of Advanced Research in Computer Science and Software Engineering,vol.no.6,issue 4, pp.471-475, 2016. [5] Karma TshetenDorjee, Deepak Rasaily ,BishalCintury, “RFID-Based Automatic Vehicle Parking System Using Microcontroller,” International Journal of Engineering Trends and Technology (IJETT),vol.32,No.4,pp.191-194,2016. [6] Liang Wang, Member,TaoGu, Senior Member,Xianping Tao, Member, and JianLu,Member,“Toward a Wearable RFID System for Real-Time Activity Recognition Using Radio Patterns,” IEEE TRANSACTIONS ON MOBILE COMPUTING,vol.16,No.1,pp.228-242, 2017. [7] https://learn.adafruit.com/adafruit-arduino-lesson-11-lcd-displays-1/arduino-code [8] http://www.circuitbasics.com/how-to-set-up-an-lcd-display-on-an-arduino/ [9] http://arduinobasics.blogspot.in/2012/07/arduino-basics-simple-arduino-serial.html [10] https://www.arduino.cc/en/Reference/Setup

Title
:
Industrial Revolution 4.0
Article Type
:
Research Article
Author Name(s)
:
Kevin Vishal K J, Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India
Country
:
India
Research Area
:
Technological Revolution

This paper deals about how INDUSTRIAL REVOLUTION 4.0 is going to tune our lives based on Artificial Intelligence, Big Data and Internet of things. Industrial revolution 4.0 is the next phase in digitalization of the manufacturing sector, driven by four disruptions: the astonishing rise in data volumes, computational power and connectivity, the emergence of analytics and business-intelligence capabilities; new form of human machine interactions and augmented reality. Even though we get advanced in these technologies. We should understand its consequences as well as its positive feedback. Wes should get ready to meet its core and use its fruits only for the goodness of mankind.

Keywords : Technological Revolution, Computational Power, Intelligent Maintenance System

Recent

[1] Hermann, Pentek, Otto, 2016: Design Principles for Industrie 4.0 Scenarios. Published in: System Sciences (HICSS), 2016 49th Hawaii International Conference on 5-8 Jan 2016 [2] Kagermann, H., W. Wahlster and J. Helbing, eds., 2013:: Recommendations for implementing the strategic initiative Industrie 4.0: Final report of the Industrie 4.0 Working Group. [3] BMBF-Internetredaktion (2016-01-21). "Zukunftsprojekt Industrie 4.0 - BMBF", M. Waidner and M. Kasper, "Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution," 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, 2016, pp. 1303-1308. [4] Die Evolution zur Industrie 4.0 in derProduction. https://www.siemens.com/de/de/home/unternehmen/themenfelder/ingenuity-for-life/optima-consumer.html. [5] "With the coming of intra-atomic energy and supersonic stratosphere aviation we face an even more staggering fourth Industrial Revolution." Harry Elmer Barnes, Historical Sociology: Its Origins and Development: Theories of Social Evolution from Cave Life to Atomic Bombing (New York, 1948). [6] "After World War II, we entered a fourth industrial revolution, with great advancement in electronics." Rose, Arnold M. "Automation and the Future Society." [7] "What is the Digital Revolution? - Definition from Techopedia". Techopedia.com. [8] "What is the fourth industrial revolution?” World Economic Forum. [9] Marr, Bernard. "Why Everyone Must Get Ready For The 4th Industrial Revolution". Forbes (blog). [10] Mr. Prabhu Shankar B.E, M.E, PGDM, Asst.Professor, Loyola-ICAM College of Engineering & Technology.

Title
:
Asynchronous Wi-Fi Control Interface (AWCI) Using Socket IO Technology
Article Type
:
Research Article
Author Name(s)
:
Devipriya.T.K, Loyola-ICAM College of Engineering and Technology Chennai, India 4GloriaTech Chennai, India; Jovita Franci.A ,Loyola-ICAM College of Engineering and Technology Chennai, India 4GloriaTech Chennai, India; Dr R Deepa ,Loyola-ICAM College of Engineering and Technology Chennai, India 4GloriaTech Chennai, India; Godwin Sam Josh ,GloriaTech Chennai, India
Country
:
India
Research Area
:
Internet of Things

The Internet of Things (IoT) is a system of interrelated computing devices to the Internet that are provided with unique identifiers which has the ability to transfer data over a network without requiring human-to- human or human-to- computer interaction. Raspberry pi-3 a popular, cheap, small and powerful computer with built in Wi-Fi can be used to make any devices smart by connecting to that particular device and embedding the required software to Raspberry pi-3 and connect it to Internet. It is difficult to install a full Linux OS inside a small devices like light switch so in that case to connect to a Wi-Fi connection a model was proposed known as Asynchronous Wi-Fi Control Interface (AWCI) which is a simple Wi-Fi connectivity software for a Debian compatible Linux OS). The objective of this paper is to make the interactive user interface for Wi-Fi connection in Raspberry Pi touch display by providing live updates using Socket IO technology. The Socket IO technology enables real-time bidirectional communication between client and server. Asynchronous Wi-Fi Control Interface (AWCI) is compatible with every platform, browser or device.

Keywords : Internet of Things, Web socket, Socket IO, Asynchronous Wi-Fi, Debian, Node.js, Raspberry Pi 3

Recent

[1] LaPlante, Alice. "Analyzing Data in the Internet of Things". O'Reilly Media. N.p., 2017. Web. 17 Feb. 2017. [2] Davoli, Luca et al. "Integration of Wi-Fi Mobile Nodes in a Web of Things Testbed". ICT Express 2.3 (2016): 96-99. Web. [3] Bermúdez-Ortega, J. et al. "Remote Web-Based Control Laboratory for Mobile Devices Based On Ejss, Raspberry Pi and Node.Js**This Work Has Been Supported By the Spanish National Research Project DPI2013-46665-C2-1-R.". IFAC-PapersOnLine 48.29 (2015): 158-163. Web. [4] Lewis, A.J., M. Campbell, and P. Stavroulakis. "Performance Evaluation of a Cheap, Open Source, Digital Environmental Monitor Based On the Raspberry Pi". Measurement 87 (2016): 228-235. Web. [5] "Socket.IO". Socket.io. N.p., 2017. Web. 9 Feb. 2017. [6] "Node.Js". En.wikipedia.org. N.p., 2017. Web. 10 Feb. 2017. [7] "Express". npm. N.p., 2017. Web. 18 Feb. 2017. [8] "Wireless-tools". npm. N.p., 2017. Web. 18 Feb. 2017. [9] "Bootstrap 3 Tutorial". W3schools.com. N.p., 2017. Web. 18 Feb. 2017. [10] Mark Otto, and Bootstrap contributors. "Getting Started • Bootstrap". Getbootstrap.com. N.p., 2017. Web. 18 Feb. 2017. [11] "SSID Definition from PC Magazine Encyclopedia". Pcmag.com. N.p., 2017. Web. 18 Feb. 2017. [12] "Github - Socketio/Socket.Io: Realtime Application Framework (Node.JS Server)". Github.com. N.p., 2017. Web. 18 Feb. 2017.

Title
:
An Efficient Implementation of Tower of Hanoi using Gray Codes
Article Type
:
Research Article
Author Name(s)
:
Hari Krishnan.V, Meenakshi Sundararajan Engineering College Chennai, India; Sandhya.M.K ,Meenakshi Sundararajan Engineering College Chennai, India; Monica Jenefer.B ,Meenakshi Sundararajan Engineering College Chennai, India
Country
:
India
Research Area
:
Tower of Hanoi

The Tower of Hanoi Puzzle finds its applications ranging from robotics to psychological research. This puzzle is a classic case of recursive algorithm in programming. However, this puzzle can also be implemented using iterative programming, by using binary codes or gray codes. Various applications require an optimized solution for this puzzle. In this paper, an efficient implementation of Tower of Hanoi using Gray codes for ‘n’ disks and three rods is presented. This focuses only on minimizing storage and reducing running time as required by many applications. The proposed implementation using Gray code system consumes lesser memory and slightly reduced running time compared to the conventional recursive methodology.

Keywords : Tower of Hanoi; Gray Codes; Recursion; Non-recursive algorithm

Recent

[1] https://en.wikipedia.org/wiki/Tower_of_Hanoi [2] http://mathworld.wolfram.com/TowerofHanoi.html [3] Lucas, É. Récréations mathématiques, Vol. 3. Paris: Gauthier-Villars, 1891-1894. (Reprinted Albert Blanchard, 1960). [4] Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition, Pearson Education, 2012. [5] Gardner, M. "Mathematical Games: About the Remarkable Similarity between the Icosian Game and the Towers of Hanoi." Sci. Amer., 150-156, May 1957. [6] Gardner, M. "The Icosian Game and the Tower of Hanoi." Ch. 6 in Hexaflexagons and Other Mathematical Diversions: The First Scientific American Book of Puzzles and Games. New York: Simon and Schuster, pp. 55-62, 1959. [7] https://en.wikipedia.org/wiki/Tower_of_Hanoi [8] Weisstein, Eric W. "Tower of Hanoi." From MathWorld--A Wolfram Web Resource. http://mathworld.wolfram.com/TowerofHanoi.html. [9] R. J. Gardner and P. Gritzmann, Discrete tomography: Determination of finite sets by X-rays, Trans. Amer. Math. Soc. 349 (1997), 2271–2295. [10] Vardi, I. Computational Recreations in Mathematica. Reading, MA: Addison-Wesley, pp. 111-112, 1991 [11] Poole, D. G. "The Towers and Triangles of Professor Claus (or, Pascal Knows Hanoi)." Math. Mag., 323-344, 1994. [12] http://mathworld.wolfram.com/packages/Hanoi.m. [13] http://library.wolfram.com/infocenter/MathSource/4861

Title
:
Beacon Technology for Library Guidance
Article Type
:
Research Article
Author Name(s)
:
J. Madhu Mohan,Meenakshi Sundararajan Engineering College; Abishek T. Naidu, Meenakshi Sundararajan Engineering College; S. Madhura Murali, Meenakshi Sundararajan Engineering College; Aarthi Gopinath ,Meenakshi Sundararajan Engineering College
Country
:
India
Research Area
:
Internet of Things

A scenario of a person entering a massive library for the first time If the person does not know where to search for a book of their interest, they will eventually find themselves stuck at every corner searching for the book of their choice, to add to this, the multitude of books cause an even greater confusion in pinpointing whether the books are even there in the library. The librarian may be able to provide the person with directions but it is still not easy. Unfortunately, most modern libraries have neither the technology to automatically guide the user through the library nor the technology to provide the user with necessary information. This paper is aimed in resolving the aforementioned problem. The concept of Internet of Things brings forward the incorporation of Beacon Technology, which uses Bluetooth Low Energy (BLE), where beacons are used to communicate with user’s device to provide a detailed description of the books in the library including the distance from the section where the book is located along with all the books present in a section of the library. This is achieved by the BLE proximity sensing capability of the beacons along with a database linked to the mobile application.

Keywords : Internet of Things, Beacon Technology, Bluetooth Low Energy

Recent

[1] Y. Li, H. Zheng, T. Yang, and Z. Liu, “Design and Implementation of a Library Management System Based on the Web Service”, in 2012 Fourth International Conference on Multimedia Information Networking and Security. [2] S. LakshmiAddepalli, and S. GowriAddepalli, “Library Management System Using RFID Technology”, in (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6), 2014, 6932-6935. [3] M. Andhale, V. Chamawar, and M. Hegde, “FPGA Based Library Management System”, International Journal of Advanced Research in Computer Science and Software Engineering 5(2), February - 2015, pp. 294-298. [4] Keshinro K., Balogun W., Oyetola J., Omogoye S., “Development of RFID Library Management Information System”, in American Journal of Engineering Research (AJER), e-ISSN: 2320-0847, p-ISSN : 2320-0936 Volume-5, Issue-4, pp-158-160 [5] G. Tiwari, P. Gupta, G. Chauhan, P. Varshney, G. Varshney, “Library With Smart Features”, in International Journal of Scientific Research and Management Studies (IJSRMS), ISSN: 23493771 Volume 2 Issue 1, pg: 45-51 [6] Ding-Yu Liu, Chia-Sui Wang and Kuei-Shu Hsu, “Beacon applications in information services”, in IEEE International Conference on Advanced Materials for Science and Engineering IEEE-ICAMSE 2016 - Meen, Prior & Lam (Eds) [7] Tomoya Mori, Shinsuke Kajioka, Takahiro Uchiya, Ichi Takumi and Hiroshi Matsuo, “Experiments of position estimation by BLE beacons on actual situations”, in 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE) Brown, Eric (13 September 2016). "Who Needs the Internet of Things?". Linux.com. Retrieved 23 October 2016. Brown, Eric (20 September 2016). "21 Open Source Projects for IoT". Linux.com. Retrieved 23 October 2016. "Beacons: Everything you need to know.” Pointrlabs.com. 18 January 2015. Retrieved 15 April 2015

Title
:
On a Means of Extensive Condensation of Formal Representations of Algorithms
Article Type
:
Research Article
Author Name(s)
:
Pitambar Sai Goyal, Loyola – ICAM College of Engineering and Technology (LICET)
Country
:
India
Research Area
:
Formal Representations of Algorithm

There is a provision in the rules of set theory and the set theoretic definition of 'algorithm' which allows for condensation of the existing representations of algorithms, drawing on certain classical results of Cantor and Godel. This condensation was also completely effective on formalizations of programs running on a Turing Machine. An equivalence is demonstrated between an algorithmic process and a dynamic physical process involving the motion of a particle in a certain impulse field. This does not condense the problem in the context of modern digital computers, but greatly condenses it for the human brain and certain analog systems, as will be demonstrated. Two theorems will be presented, regarding formalism of 'algorithm', one by which we will see that all computationally solvable problems, with finite sized inputs, are equivalent to the solving of an equation, f(x) =0 for an integer valued function f on the integers. The second theorem will demonstrate that a large subclass of these problems are reduced to the factorization of an integer. It is understood that the invention of alternate formal representations of algorithms may be critical to several problems of computation, including the P vs NP problem.

Keywords : Algorithm, formalisation, theoretical computing, Church-Turing, Godel

Recent

[1] Donald E. Knuth, The Art of Computer Programming, Vol I [2] Georg Cantor, Contributions to the founding of the theory of transfinite numbers [3] Kurt Godel, On formally undecidable propositions of Principia Mathematica and related systems

Title
:
An IOT Based Approach for Vehicle Theft Detection
Article Type
:
Research Article
Author Name(s)
:
K.Kanimozhi, Rajalakshmi Institute of Technology, India; D.Mukesh ,Rajalakshmi Institute of Technology, India; M.Ashok ,Rajalakshmi Institute of Technology, India
Country
:
India
Research Area
:
Internet of things

Property crimes is said to hover around 10 million annually. Of this vehicle theft tops the list and often occurs in all parts of the world. There are so many recent technologies evolving and new methods are being upgraded in overcoming this issue. Internet of Things has paved way to provide interaction between things. Internet of things with intelligence is a new era for the technology developments. The existing methods have various shortcomings like the logics used cannot be implied in all the situations. The methods involved in vehicle theft detection have become aware to everyone including the burglars and they try to break the system and steal the vehicle. Therefore there must be a system which invisibly and uniquely authenticates and authorizes the vehicle. The system should not know its existence to the outsiders. A mobile app can act as an interaction between the user and the vehicle. Location updates are sent periodically to the registered user through mobile app. Privacy plays an important role which is maintained through the mobile app where vehicle is being monitored when friends, relations and drivers uses the vehicle.

Keywords : Arduino, fingerprint sensor, mobile app, Internet of things, vehicle-theft

Recent

[1] “A vehicle is stolen every 13 mins in Delhi; rate up 44% since last year”-Timesofindia. [2] “INTERPOL”-A Statiscal assessment made during 2013 for automobile thefts. [3] Zhixiong Liu, "A new embedded car theft detection system," Second International Conference on Embedded Software and Systems (ICESS'05), 2005, pp. 6 pp. [4] Akshay Zacharia, Ajo Thomas, Rinto Roy,”VTDS: VEHICLE THEFT DETECTION SYSTEM”, TECHNICAL RESEARCH ORGANISATION, ISSN (ONLINE): 2395-6151, VOLUME-1, ISSUE-1, 2015. [5] Champa Bhagavathi.R , Gowri.B.R , Kasturi.R , Pooja.C,”Vehicle Theft Detection and Prevention Using [6] GSM and GPS”, International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 5, May 2016. [7] “Stolen equipment recovery device US 4284985 A”,Google Patent. [8] Kunjal P.Tanna, Preeti Kumar,Shubha Narayanan,” Instant Theft Alert and Tracking System in Car”, 2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 21. [9] “www.knoema.com”, Survey information and graphical represenation of the lost vehicle.

Title
:
IOT and Cloud Based Monitoring System for Coastal Water Quality and Beach Safety
Article Type
:
Research Article
Author Name(s)
:
Ryan Jebaraj, Loyola – ICAM College of Engineering and Technology (LICET); Nafeela Banu ,Loyola – ICAM College of Engineering and Technology (LICET); Rufina Fernandez ,Loyola – ICAM College of Engineering and Technology (LICET)
Country
:
India
Research Area
:
IOT

The coastal regions of India is both ecologically and economically rich and is home to 60% of the population. However the coastal waters are highly polluted due to industrial effluents, agriculture runoff and domestic waste and unlike the developed countries there is not much information on the health and status of the coastal waters. Internet of Things (IoT) is a concept that envisions all objects around us as part of internet and Cloud computing is a model for on-demand access to a shared pool of configurable resources (e.g. compute, networks, servers, storage, applications, services, and software) that can be easily provisioned as Infrastructure (IaaS), software and applications (SaaS) . A combination of data buoys installed along the major beaches of India along with cloud technology would make data on tides, rip currents and pollutant load accessible to beach goers. Data buoys with sensors would have to be deployed along the Indian coast to collect data on the oceanographic, physio-chemical and biological parameters of the coastal waters. The data collected by these buoys would then be transmitted to a public or hybrid cloud through satellite transmission protocols. Cloud apps and mobile cloud computing apps can be developed to disseminate information on beach water quality and safety to the public. In this paper we propose a novel IoT and cloud based monitoring system wherein the cloud acts as a front end to access Internet of Things that assimilates data from real time water quality data buoys and provides a mobile client with which the user can access data on the Coastal waters throughout the country, thereby reducing the health hazard and ensuring safety of the beach goers.

Keywords : IOT, Cloud Computing

Recent

[1] Qasim, S. Z. ; Sen Gupta, R. ; Kureishy, T. W. (1988) Pollution of the seas around India Proceedings of the Indian Academy of Sciences - Animal Sciences, 97 (2). pp. 117-131. [2] Ann Chervenak, Ian Foster, Carl Kesselman, Charles Salisbury, Steven Tuecke, The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets, Journal of Network and Computer Applications, Volume 23, Issue 3, 2000, Pages 187-200, ISSN 1084-8045. [3] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, Volume 25, Issue 6, June 2009, Pages 599-616. [4] Saurabh Kumar Garg, Rajkumar Buyya, Howard Jay Siegel, Time and cost trade-off management for scheduling parallel applications on Utility Grids, Future Generation Computer Systems, Volume 26, Issue 8, October 2010, Pages 1344-1355. [5] Dan C. Marinescu, Chapter 4 - Cloud Computing: Applications and Paradigms, In Cloud Computing, Morgan Kaufmann, Boston, 2013, Pages 99-130. [6] Tomasz Jach, Ewa Magiera, Wojciech Froelich, Application of HADOOP to Store and Process Big Data Gathered from an Urban Water Distribution System, Procedia Engineering, Volume 119, 2015, Pages 1375-1380. [7] Jan G.P.W. Clevers, Fundamentals of Satellite Remote Sensing: An Environmental Approach, second edition, Emilio Chuvieco. CRC Press, Boca Raton (2016), International Journal of Applied Earth Observation and Geoinformation, Volume 51, September 2016, Pages 74-75.

Title
:
BCI Framework Based Mind-Wave Game Controller
Article Type
:
Research Article
Author Name(s)
:
Dr.V.Dhanakoti, Valliammai Engineering College, Chennai-603203; R.Raja ,Valliammai Engineering College, Chennai-603203
Country
:
India
Research Area
:
BCI

Human-Computer Interaction (HCI) systems may not be suitable for disabled or paralyzed peoples. Brain-Computer Interface (BCI) is an alternative method of communication for disabled or paralyzed peoples. Electroencephalography (EEG) is the non-invasive method of signal acquisition to measure the electrical activity of the brain. This neural oscillations is popularly called brain waves. To make a wireless transmission, the Bluetooth transmitter is integrated with EEG device. The EEG recognized signal may contain the artifacts and noise. To remove this artifacts by using filters and amplifiers is used to amplify the EEG signal. Then the processed EEG signal is transmitted to Bluetooth receiver, which is integrated with microcontroller. Microcontroller sends the control command to the computer system for corresponding EEG signal. Based upon the control command the direction of game is takeover. This device can act as like as the following keys, which is present in the keyboard. The keys are W, A, S and D. This device gives high end user experience of gaming.

Keywords : BCI, Electroencephalography, Computer interface

Recent

[1] Shitij Kumar, Ferat Sahin, “A framework for a real time intelligent and interactive Brain Computer Interface”, Elsevier, Computers and Electrical Engineering, PP.193–214. 2015. [2] Chin-Teng Lin, Yu-Chieh Chen, Teng-Yi Huang, Tien-Ting Chiu, Li-Wei Ko, Sheng-Fu Liang, Hung-Yi Hsieh, Shang-Hwa Hsu, Jeng-RenDuann, “Development of Wireless Brain Computer Interface With Embedded Multitask Scheduling and its Application on Real-Time Driver’s Drowsiness Detection and Warning”, IEEE transactions on biomedical engineering, Vol.55, Issue.5, PP.1582-1591, 2008. [3] Gerhard M. Friehs, Vasilios A. Zerris, Catherine L. Ojakangas, “Brain–Machine and Brain–Computer Interfaces ”, Stroke Journal, PP.2702-2705, 2004. [4] F. Pichiorri, F. Cincotti, F. De Vico Fallani1, I. Pisotta, G. Morone, M. Molinari, D. Mattia. “Towards a Brain Computer Interface-Based Rehabilitation: from Bench to Bedside”, 5th Int. BCI Conference , PP.268-271, 2011. [5] Lenhardt, A., Kaper, M., & Ritter, “An adaptive P300-based online Brain Computer interface”. IEEE Transactions on Neural Systems and Rehabilitation Engineering, PP.121-130, 2008. [6] Anupama. H.S, N.K.Cauvery, Lingaraju.G.M, “Brain computer interface and its types - a study ”, International Journal of Advances in Engineering & Technology, Vol. 3, Issue.2, PP. 739-745, 2012. [7] Antara Bhattacharya, Dr. N. G. Bawane, S. M. Nirkhi, “Brain Computer Interface Using EEG Signals”. [8] W. D. Penny, S. J. Roberts, E. A. Curran, and M. J. Stokes, “EEG-based communication: A pattern recognition approach”, IEEE Trans. Rehab.Eng., Vol. 8, PP. 214–215, 2000. [9] Rabie A. Ramadan, S. Refat, Marwa A. Elshahed and Rasha A. Ali, “Basics of Brain Computer Interface”, Springer International Publishing Switzerland, PP. 31-50, 2015. [10] Anton Nijholt & Chang S. Nam, “Arts and Brain-Computer Interfaces (BCIs)” , Brain-Computer Interfaces, Taylor & Francis group, Vol. 2, No. 2–3, PP. 57–59, 2015. [11] Gang Wang, ChaolinTeng, Kuo Li, Zhonglin Zhang, Xiangguo Yan, “The Removal of EOG Artifacts From EEG Signals Using Independent Component Analysis and Multivariate Empirical Mode Decomposition”, IEEE journal of biomedical and health informatics, Vol.20, Issue.5, PP.1301-1308, 2016. [12] Georg E. Fabiani, Dennis J. McFarland, Jonathan R. Wolpaw, GertPfurtscheller, “Conversion of EEG Activity Into Cursor Movement by a Brain–Computer Interface (BCI)”, IEEE transactions on neural systems and rehabilitation engineering, Vol.12, Issue.3, PP.331-338, 2004. [13] Miguel Almonacid, Julio Ibarrola, and Jose-Manuel Cano-Izquierdo, “Voting Strategy to Enhance Multi model EEG-Based Classifier Systems for Motor Imagery BCI”, IEEE systems journal, Vol.10, Issue.3, PP.1082-1088, 2016. [14] Ming Cheng, XiaorongGao, ShangkaiGao, DingfengXu, “Design and Implementation of a Brain-Computer Interface With High Transfer Rates”, IEEE transactions on biomedical engineering, Vol.49, Issue.10, PP.1181-1186, 2002. [15] SushilChandraa, GreeshmaSharmaa, Amritha Abdul Salamb, DevendraJhac, AlokPrakash Mittald, “Playing Action Video Games a Key to Cognitive Enhancement”, Procedia Computer Science, PP.115 – 122, 2016