Sr/No/ |
Title |
Pdf |
1 |
Modified Minkowski Shaped Patch Antenna with
Rectangular Parasitic Patch Elements
Shaik Najma, M.R.N Tagore
Abstract — The Minkowski shaped antenna with the
rectangular parasitic patch elements is for parametric
study. Generally, patch antenna has four parts. Those
are patch, feed line, ground plane and parasitic
elements. A patch antenna is basically a metal patch
suspended over a ground plane. In Minkowski shaped
patch, the rectangular parasitic elements are placed
at the bottom. Different patch sizes involved in
parametric design study i.e., (Design 2A, Design 2B,
Design 2C, Design 2D and Design 2E). The
parameters of patch antenna are return loss,
radiation pattern, directivity, efficiency, bandwidth
and gain. For Worldwide Interoperability for
Microwave Access (WiMAX) application the
frequency of this antenna is 5.8 GHz (i.e. upper
frequency). It gives the bandwidth of 254 MHz (5.676
GHz to 5.930 GHz), return loss of – 24.477 dB and a
gain of 2.351 Db.
|
Download
|
2 |
Mobile Phone Based Traffic Information System
M.Manikanta Rao, N.Chandrasekhar
Abstract — Increasing mobile phone penetration
combined with the wide coverage of cellular
infrastructures, renders mobile phone based Traffic
Information System (TIS) an attractive option. The
main purpose of such systems is to alleviate traffic
congestion that exists in every major city.
Nevertheless, to reap the benefits of mobile phone
based TIS, we need to ensure their security and
privacy and their effectiveness (e.g., accuracy). This is
the motivation of this paper: we present a
comprehensive solution for mobile phone based
traffic estimation that is proven to be secure and
privacy preserving using sensors. Our results confirm
that mobile phone based TIS can offer accurate
traffic state estimation while being secure and privacy
preserving. Traffic congestion deteriorates the quality
of life of citizens and contributes significantly to
environmental pollution and economic loss. Traffic
Information Systems(TIS) aim at solving this problem
by collecting traffic data, producing traffic estimates,
and providing drivers with traffic specific
information. The increasing mobile phone
penetration, along with the wide coverage of cellular
networks, defines an unprecedented large-scale
network of sensors, with extensive spatial and
temporal coverage, able to serve as traffic probes for
TIS. This is a task that cannot be achieved only by
relying on the security of the mobile to cellular
infrastructure communication.
|
Download
|
3 |
Automated Garbage Collection System
D. B. Kadam, Prajakta Patil, Sayali Adake, Tejashri Patil
Abstract — After a dedicated survey and keen observation, it was
found that the developing eastern countries are lagging behind in
context of cleanliness and hygiene as compared to the developed
countries. Deadly Swine Flu is an ongoing example. The death rate
is much higher due to unhygienic conditions. To avoid this
condition we have proposed this project i.e. Automated Garbage
collection System in which one control unit is mounted on garbage
bin which will detect level of garbage through IR sensor and send
message to respective authorities. In addition to that to clean
outside garbage we have developed robotics mechanism which
helps to collect outside garbage and put it in to garbage bin
through its arms.
|
Download
|
4 |
A Systematic Analysis of Multichannel Queuing System
J.Greeda, M.V.Suresh
Abstract — Queuing theory has wide range of applications in
day-by day congestion problems as well as in industrial
organization. It may be applied in diverse areas such as traffic
flow where there occurs the flow of objects around a network,
avoiding congestion and trying to maintain a steady scheduling,
bank, airport runway layout, luggage collection at checkout
counters, passport control hair dressers, manufacturing
processes, printer queues, minimizing page faults in computing
etc. The range of applications has grown to include not only
telecommunication and computer science. But also in
manufacturing, traffic control, military logistics, design of
amusement parks of many other areas that involve service
system whose demands are at random. The art of applying
queuing theory is to construct a model that is simple enough so
that it yields to mathematical analysis, yet contain sufficient
detail so that its performance measures reflex the behaviour of
the real time system.
|
Download
|
5 |
Development of Speed -Flow Models for Analysis of On-
Street Parking in Hyderabad City – A Case Study
Jollireddy Omprakash
Abstract — All metropolitan cities in the country come across for
serious parking problems, mostly in central business district
(CBD). Parking which is considered as an integral component
of the transport system as it plays a critical role in traffic
management and congestion. Improper, hazardous parking
system would seriously affect the transportation system. One of
the major causes for parking problems in most of the
metropolitan cities is because of the insufficient roadway width.
The roadway width is not increasing with the same pace as that
of increase in vehicular population. This has lead to reduction
of roadway space in urban streets. It is also observed that due
to lack of public transport facility, commuters prefer to use
personalized vehicle which has increased the demand for more
parking spaces especially in CBD. The management of Onstreet
parking is one of main parameter in traffic management.
The lack of concentrated parking results the increased onstreet
parking and disturbance in traffic. The behavioural
pattern of on-street parking has direct relationship with land
use as quantity and quality of traffic variants such as: speed,
delay time, flow rate and volume to capacity rate which are
also effective in movement in traffic analysis. This paper
examines the relationship between speed, flow rate and parking
as parameters for improving the exiting traffic conditions in
the city of Hyderabad. The results indicate that parking is
affected for speed, v/c and would increase in delay
characteristics for traffic flow in reaching their destination
point under heterogeneous traffic conditions of our city.
|
Download
|
6 |
Eco-criticism in Old Manipuri Literature: A case study of
“Hijan Hirao”
Yanglem Nungshitombi Devi
Abstract — Eco-criticism is a new theory of literary criticism.
It is an interdisciplinary approach. It includes various fields
like religious rites, culture, worshipping, traditional beliefs,
historical, aesthetic, phenomenology, habitat and evolution,
socio-politics and other allied fields. In the writings of the
Old Manipuri Literatures we found ample scope for ecocriticism
analysis. Hijan Hirao is one of the earliest literary
works on nature, ecological and environmental aspects. The
other literary works on ecological and environmental
aspects are Tharon, Leiron, Kumdamshei, Khongjomnubi
Nongarol, etc. Besides this, there are also literary works
which relates to the topographical accounts on the hills,
lakes and rivers, viz. Koubru Chingoirol, Nongmaiching
Chingoirol, Langol Chingoirol, Thangjing Chingoirol,
Langthabal Chingoirol, etc. to name few of them. An
attempt was also made to make an assessment of ecocriticism
of “Hijan Hirao” based on the Dr, Ksh.
Premchand Singh’s Work in “Hijan Hirao: Text, Context
and Translation” (2015), inter alia, attempts (i) to explore
the rich cultural and literary tradition in the Old Manipuri
Literatures which relates to ecological and environmental
aspects; (ii) to make a critical assessment of the aspects of
eco-criticism in “Hijan Hirao”; (iii) to examine the interrelationship
between nature and human beings with
reference to “Hijan Hirao”; and (iv) to analyze the
significance of Hijan Hirao in Ummang Lai Haraoba.
|
Download
|
7 |
Analysis of Leakage Power Reduction Techniques
for Nano CMOS circuits
Akhilesh Goyal, Abhishek Tomar, Aman Goyal
Abstract — Due to growing impact of static leakage, gate leakage
and subthreshold leakage is contributing more towards the
power dissipation in the deep submicron Nano-CMOS
technology. In SRAM the significant proportion of power
dissipation is mainly due to high leakage current in Nano-CMOS.
The significant portion of the power budget is lost in standby
power due to unwanted increment in leakage current, in deep
submicron. In designing low-power Nano-CMOS SRAM Cell it is
important to identify and calculate the different leakage
currents. On the subthreshold leakage have been lot of works
and even many techniques to reduce it, such as forcing stack,
body bias control and controlling input vector to the circuit in
standby mode. In this paper we review the leakage current power
loss and reduction techniques of standby power and after that we
analyze the different components of standby power dissipation.
In this paper we describes different techniques to reduce the
leakage power consumptions in the SRAM Cell.
|
Download
|
8 |
Innovative mechanism proposed to enhance the safety of
air conditioner
Ravinder Tonk, Hitesh Sharda, Jaskiret Singh
Abstract — Conventional air conditioner covers are
commonly used to keep moisture, debris and dust
particles out of the air conditioner during the nonservice
season. They protect the a/c from damage that
could lead to costly repairs and early system failure.
These covers are used throughout the winter season, but
when the air conditioner is again put to use at just the
commencement of summer season many users forget to
remove the normal safety cover which restrict the flow
of hot air coming out from the back and sides of the air
conditioning unit. This causes the trapping of heat
inside the cabin of air conditioner and mostly near the
condenser coils. The user unaware of this continues to
use the air conditioner and after a while the copper
pipes of the condenser coil gets heated up to nonpermitted
temperatures and ultimately gets ruptured
causing formation of holes on the pipes which causes
leakage of expensive refrigerant gas. This leads to
cooling capability of air conditioner to drop to almost
negligible.
|
Download
|
9 |
Experimental Investigation of Solar Distillation Systems
Apply Paraffin Wax
M.A.Omprakas, S.A.Pavithran, J.praveen, K.Nithyaprakash
Abstract — The availability of drinking water is essential for the
survival all of mankind. Adequate amount of water resources are
available on our planet but very few of them can be used for the
purpose of drinking. A number of water purification methods
have been put forth by researchers to purify brackish water and
sea water. As water purification processes require some sort of
energy source, and with the advent of renewable sources of
energy utilization in various fields, a thorough review of solar
powered purification setups is essential. An effort has been made
to review all the available research and technology for water
distillation using solar energy in this research paper. It is found
from the literature survey that, a number of research setups and
devices are available but are currently not being used due to high
initial setup costs and limited technological awareness in the
society.A new passive solar water pasteurization system based on
density difference flow principles has been designed, built and
tested. The system contains no valves and regulates flow based on
the density difference between two columns of water. The new
system eliminates boiling problems encountered in previous
designs. Boiling is undesirable because it may contaminate
treated water. The system with a total absorber area of 0.45 m2
has achieved a peak flow rate of 19.3 kg/h of treated water.
Experiments with the prototype systems presented in this paper
show that density driven systems are an attractive option to
existing solar water pasteurization approaches.
|
Download
|
10 |
Computation Fluid Dynamic Analysis of Performance
Improvement - Steam Turbine Blade -Applied Paper
Mill Industry
M.Sampathkumar, M.SoundaraRajan, R.Tamilselvan, A.P.Surya, L.Tharun
Abstract — Flow analysis in Steam turbine blades has long been
an intensive subject of research. Computational Fluid
Dynamics (CFD) is the present day state-of-art technique for
fluid flow analysis. It was found that non-uniformities are
created in different parts of the Turbines at off-design
conditions which result in the decrease in efficiency different
radial gaps. The operating characteristic curves predicted by
the numerical simulation were compared with the results of
model testing and are found in good agreement. The test case
consists of an enshrouded Steam turbine blades with seven
blades . A large number of measurements are available in the
radial gap between the blades and the diffuse, making this case
ideal for validating numerical methods. Results of steady and
unsteady calculations of the flow in the Turbines are compared
with the CFD experimental ones, Four different turbulent
models are analyzed. The steady K-Ɛ and RNG with
standardized is wall functions defined equation function
simulation uses the frozen rotor concept, while the unsteady
simulation uses a fully resolved sliding grid approach. The
comparisons show that the unsteady numerical results
accurately predict the unsteadiness of the flow, different radial
gap are starting conditions demonstrating the validity and
applicability of that methodology for unsteady incompressible
Thermo heat trnsfer machinery flow computations.
The steady approach is less accurate, with an unphysical
advection of the blades wakes, but accurate enough for a crude
Approximation. The different turbulence models predict the
flow at the same level of accuracy, with slightly different
results have best radial gab are find to installation of the single
parameter in operating conditions to apply speed in different
stages .physically its radial rotated in Blades Turbines from
operating function .The Similar process to be handled each
speed Functionally operated to finding single steady equations
flow process in different equations to analyzed to be done it.
And performance optimized analysis with simulated waste
heat recovery analysis of Paper mill industry
|
Download
|
11 |
Computational Fluid Dynamic Analysis of Solar
Desalination Systems Apply Different Paraffin Wax
M.A.Omprakas, K.Nithyaprakash, S.A.Pavithran, J.praveen
Abstract — The availability of drinking water is essential
for the survival all of mankind. Adequate amount of water
resources are available on our planet but very few of them
can be used for the purpose of drinking. A number of
water purification methods have been put forth by
researchers to purify brackish water and sea water. This
paper outlines a research project about fluid flow and
computational investigations of flow patterns in a solar
water store. Investigations have shown the flow patterns in
solar water stores strongly influences the hot spot position
of solar heating system. Mixing caused by water entering
the solar water store will destroy stratification. For
increasing the system tilted at 10o from the horizontal
plane the thermal performance increasing. In order to
describe the fluid flow behaviour of the water inside the
solar water store, a finite element based on model was
generated for the system and was simulated using the
COMSOL4.5 programmed. The goal of the project is to
gather knowledge about flow phenomena occurring in
water system stores with different tilted and time. The
result of the simulation could be used as guidance to
locate the suitable position of appropriate components such
as helical coils as well as the size of the solar hot water
heater system to be built.
|
Download
|
12 |
Waste Heat Recovery System Steam Thermal Plant
Engineering Paper Industry
M.Sampathkumar, M.SoundaraRajan, R.Tamilselvan, A.P.Surya, L.Tharun
Abstract — The shortage of power due to gap between the supply
and demand would be persistent phenomena in a developing
country like India. To eliminate this shortage, simply addition of
power plants or increasing power generation would not be
sufficient but the improvement in the availability, efficiency of
the plant equipment and systems of generating units existing or
newly being installed is very much necessary.
An energy audit is a study of a plant or facility to
determine how and where energy is used and to identify methods
for energy savings. The energy audit of 24.62MW cogeneration
unit of TNPL is carried in this project. The main aim of this
project is to carry out a performance analysis of cogeneration
unit, which helps in both conservation of energy and cost,
thereby used to improve the efficiency of the unit.
objective:-
The performance calculation done at the cogeneration
unit reveals that there is a minimum fuel saving potential of 180
kg/hr by optimizing any one of the following method
1. Utilizing the percent excess air in optimum level.
2. Bagasse pith moisture reduction.
3. Proper energy conserving activities on plant auxiliaries.
|
Download
|
13 |
Performance Enhancement Analysis Of Solar Distillation
Systems With Phase Change Materials -Review
M.A.Omprakas, S.A.Pavithran, J.praveen, K.Nithyaprakash
Abstract — This chapter presents the analysis of a solar
distillation system with phase change material storage
system. There is always a scarcity of clean and pure
drinking water in many developing countries. Water from
various sources is often brackish (i.e. contain dissolved
salts) and/or contains harmful bacteria and therefore,
cannot be used for drinking purpose. In addition, there
are many coastal areas where seawater is abundant but
potable water is not available in sufficient quantity. Apart
from drinking purpose, pure water is also useful for health
and industrial purposes such as hospitals, schools and
batteries etc. Many parts of India, particularly, rural
areas, coastal areas and many urban areas too, have a
major drinking water problem. Sufficient drinking water,
at accepted purity level, is just not available.
|
Download
|
14 |
A GSM based weather monitoring system working on
solar energy
Priyanka Yadav, Priyanka Pawar, Shital Kore, S.S Sankpal
Abstract — This paper presents an design of “A GSM
based weather monitoring system working on solar
energy”. Three weather parameters temperature,
rainfall and humidity are measured in this system.
The measurement of those parameters is used to
assume the present weather condition and the
detailed information is sent to the farmer for
assessment via GSM module. Using this system a
farmer can monitor the farm continuously without
being there at the farm and farmer will be able to
take care of farm against natural climatic conditions
which will harm the crop. Only basic type of sensors
is used so that the cost of the design is reduced.
Weight of the system is also less so to this system is
easy to handle. In the country like India where the
non- renewable energy sources are going to be finish
and the renewable energy sources is the biggest
replacement for this era. And solar energy is the
largest source of renewable energy. This system is
working on solar energy which is very cost effective.
Keywords- Remote weather monitoring, low cost local
weather study, GSM based communications, solar
power plant, and renewable energy generation.
|
Download
|
15 |
Healthcare System for Elderly People using IOT
Priyanka C, Manikandan P, Manokaran P, PremKumar M, Kanagaraju P
Abstract — The need to develop newer technologies to care elderly
people has increased a lot. It has become a greatest necessity
today. In the present condition, the elderly people become
depressed due to loneliness. Their pressure, body condition
illness become worse day by day and that is more difficult to care
them. Elderly people need to travel every day or once a week to
visit doctor or the Doctor need to visit patients home. It makes
the patient tired and still makes the health condition worse. Also
the Doctor cannot visit often irrespective of his busy work. The
project focus on the care of the elderly people. Devices like
sensors are used to measure metabolic activities like
temperature, heart beat rate, etc. The project uses sensors to
measure the activities and the measured rate will be stored. The
file stores all the records of the patient in it and in case of
emergency, message will be sent to the doctor and relatives of the
patient. The patient’s data can be retrieved at any time. Because
of this, it will be easy for the doctor’s in case of emergency. The
project mainly focus on providing more security to the patient’s
details by encrypting the information.
|
Download
|
16 |
Dozy and Frenzied Automobilist Alert System
R.Sugantha Lakshmi, K.Aravind Raja, S.Eswar
Abstract — Due to the complex nature of road traffic,
collisions are an unavoidable part of human life. Studies
have shown that a large proportion of traffic accidents
around the world are related to inadequate or
disordered sleep. Recent surveys have linked driver
fatigue to 16% to 20% of serious highway accidents in
the UK, Australia, and Brazil. Fatigue as a result of
sleep disorders (especially obstructive sleep apnea),
excessive workload and lack of physical and mental rest;
have been shown to be major contributing factors in
vehicle accidents. A number of behavioral, physiological,
and psychometric tests are being used increasingly to
evaluate the impact of fatigue on driver performance.
Dozy Driving-a combination of sleepiness and driving
has become a worldwide problem that leads to severe
accidents. A real time non-intrusive method for
detecting the drowsiness of driver has been described in
this paper. The system uses the IR sensor which is
attached to a glass is used to capture the eye closure rate
of the driver in order to detect the drowsiness.
Computer vision and machine learning algorithms are
used to monitor and detect whether the driver is drowsy
or not. Visual feature like eye which characterizes the
drowsiness of the driver is detected with the help of
image processing techniques. In such a case when dozy is
detected, the warning signal and a vibration is issued to
alert the driver. A neural network based algorithm is
used to determine the level of drowsiness by measuring
the eye opening and closing and warns the driver
accordingly.
|
Download
|
17 |
Grass Cutter using Solar Energy for Street Divider
S.S Sankpal, Pednekar Aishwarya, Mhetre Sonali, Kamble Pratiksha
Abstract — This paper presents an design of grass
cutter using solar energy for street divider. Current
technology commonly used for cutting the grass is by
the manually handled device. This paper used novel
technology. So in this paper we are trying to make
robot for street divider which is able to cut the
grasses on street divider. The power source that is
battery and a solar panel will be attached on the top
of the robot which reduces the power problem.
Proposed model in this paper made some changes in
the existing machine to make its application easier at
reduced cost. One of main aims of this method is to
control pollution and use renewable energy source.
|
Download
|
18 |
Design And Modification Of Model UHT 70 Motorized
Hand Truck For Material Handling In Heat Treatment
Plant
CharubalaHarde, S.S. Kumbhalkar
Abstract — commercial organization, where the goods are
prepared they need to transport their goods from one place or
one station to another. For this purpose, they use hand trolley or
also known as hand truck on which the load is handled manually
from one place to another. Sometimes, it is difficult with this
equipment to transport or carry the load manually. In this paper,
some design and modification is practically done on the modelled
hand truck. Further, it is been motorized which make it simplier
for the use instead of manual operation. Design of the model is
done in modelling software called Creo Parametric 2.0 and
considering several factors, the analysis will be done in analysis
software called Ansys 14.0.
|
Download
|
19 |
Design and Analytical Method for Finding Outcome
Parameters of Motorized Hand Truck
Kalyani Wichare , R.R.Gandhe , Ajay Mahawadiwar
Abstract — commercial organization, where the goods are
prepared they need to transport their goods from one place or
one station to another. For this purpose, they use hand trolley or
also known as hand truck on which the load is handled manually
from one place to another. Sometimes, it is difficult with this
equipment to transport or carry the load manually. In this paper,
some design and modification is practically done on the modelled
hand truck. Further, it is been motorized which make it simplier
for the use instead of manual operation. Design of the model is
done in modelling software called Creo Parametric 2.0 and
considering several factors, the analysis will be done in analysis
software called Ansys 14.0.
|
Download
|
20 |
Design and Analysis of Slitting Machine
Chetna N. More , Ajay Mahawadiwar
Abstract — Simple slitting machine is a manually operated
machine which cuts slits of required width from very long rubber
sheets, plastic sheet, paper, cloths that measures hundreds of
meter. It consists of rollers, drum, cutter assembly, locking
arrangements, shafts, etc. It is operated by single labour that cuts
hundred meter rubber sheets into sheets into slits in very less
time with accuracy in cutting. Here analysis of cutter blade will
be performed. Before performing analysis design calculation will
be made. Here we try to improve the existing design by
implementing automation as per requirement. Also reliability
testing will be made for robust design.
|
Download
|
21 |
Design and analysis of leaf spring used in TATA 407 Truck
Nikhil Jambhulkar, R.R.Gandhe
Abstract — In now a day the fuel efficiency and emission gas
regulation of automobiles are two important issues. To fulfill this
problem the automobile industries are trying to make new
vehicle which can provide high efficiency with low cost. The best
way to increase the fuel efficiency is to reduce the weight of the
automobile. The weight reduction can be achieved primarily by
the introduction of better material, design optimization and
better manufacturing processes. The achievement of weight
reduction with adequate improvement of mechanical properties
has made composite a very good replacement material for
conventional steel. The automobile vehicles have number of parts
which can be able to replace by composite material, but due to
the improvement of mechanical properties of composite material.
It has more elastic strength and high strength to weight ratio has
compared with those of steel material. So, out of many
components one of the components of automobile, the leaf spring
which use for carried out the whole weight of the vehicle is best
option for replacement of steel material by composite material.
The aim is to review the paper about fabrication and analysis of
composite leaf spring.
|
Download
|
22 |
Design Modification and Virtual Testing of Lifting Jack
DiptiThakare, R.R.Gandhe
Abstract — Most of the present day resources of energy are
limited and irreplaceable. Next generation will face acute energy
crisis if alternate resources of energy are not developer
concurrently. In today’s developing world, the extent of
automation is obviously the foremost focus of engineers. Screw
jack is a device which is used to lift and support a heavy load in
automotive vehicles, such as a car. Generally, human effort is
required to rotate the screw, but in present work, it is eliminated
by using operated push button type equipment’s which is total
automatic. A set of iteration will be performed and a
mathematical model will analyticallyframed to predict the power
requirement at a given load. The design and analysis for the
screw jack showed that the model will be verified for wide range
of load.
|
Download
|
23 |
Clustering of nodes to increase throughput to avoid
collision by using IoV
J.Bhuvaneswari, S.G.Sandhya
Abstract — Internet of Vehicles (IoV) communicates with
vehicle to vehicle (V2V) and vehicle to base station (BS)
by using mobile communication and it is wireless
connection between vehicle. Communications are
performed by nodes. Here the vehicle is considered as
node. the communication nodes are grouped to easily
communicate with each other. K-Means clustering is
used to find the distance. During the communication of
nodes, there will be traffic or collision occuring and it
could not provide the complete evaluation so there is
not fact in the environment of vehicles. To avoid this
problem the routing protocol are used to find the
shortest distance among the node. Then Intrusion
detection system is used to prevent from the
unauthorized access. Intruder is called as a hacker or
attacker. Intrusion detection systems are developed to
provide early warning and action are taken to prevent
and minimize damage. Then the data will be sent
securely from one node to another during
communication. The data is sent effectively and
successfully.
|
Download
|
24 |
A Comparative Study of Acids in Unifloral Honeys of East
Godavari District, A.P., India
K. Hemalatha, P. Satyanarayana
Abstract — Honey is a natural product known to man since ancient
time. It can be preserved for a long time with out adding any
preservatives. Its food and medicinal value made it unique among
all natural products. It is a colloidal suspension of nearly 300
different compounds. This wonderful tasty product synthesised
by honey bees by collecting nectar of various flowers. Honey is
acidic in nature. No major change reported in pH even after
storage for prolonged periods. Honey is acidic in nature. Acidity
of honey results from the presence of Organic Acids. Many acids
have been reported to be present in honey. Acidity of honey may
be expressed as free acids, loctone acids or tabal acids which
account for less than 0.5 g of solids. This small quantity of acids
contributes to the flavour and tart taste to the honey and also
responsible in part for the stability of honey against Micro
Organisms. Total acidity of 3 different unifloral honeys are
studied. These honeys were collected or procured in different
seasons from different areas of East Godavari District, A.P.,
India.
|
Download
|
25 |
The Structure of Transportation Problem
Involves an Octagonal Intuitionistic Fuzzy
Numbers
P.Rajarajeswari, G.Menaka
Abstract — In this paper a new method is proposed for finding
an optimal solution for intuitionistic fuzzy transportation
problem, in which the costs, supplies and demands are octagonal
intuitionistic fuzzy numbers. The procedure is illustrated with a
numerical example.
|
Download
|
26 |
Secured Clustering and Energy Management on
Internet Environment IOT
Rahul K, Kaaviyan S.N, Saranya M, B.G.Geetha
Abstract — The main concern of clustering approaches for mobile
wireless sensor networks (WSNs) is to prolong the battery life of
the individual sensors and the network lifetime. A homogeneous
and secure weighted clustering algorithm which is an extended
version of our previous algorithm (ES-WCA) for mobile WSNs
using a combination of five metrics. Among these metrics lie the
behavioural level metric which promotes a safe choice of a
cluster head in the sense where this last one will never be a
malicious node. The goals of the proposed algorithm are, offering
better performance in terms of the number of re-affiliations
which enables to generate a reduced number of balanced and
homogeneous clusters. This algorithm, coupled with suitable
routing protocols, aims to maintain stable clustering structure.
Simulation study to demonstrate the performance of the
proposed algorithm is also used.
|
Download
|
27 |
Advanced Security System Using Calling Facility
Deshmukh Rutuja R, Patil Pranali P, Mane Sarita R, Kadam . D.S
Abstract — Security and automation is a prime concern in our
day-to-day life. The approach to home and industrial automation
and security system design is almost standardized nowadays. In
this paper, we have tried to increase these standards by
combining new design techniques and developed a low cost home
and industrial automated security systems. Everyone wants to be
as much as secure as possible. The design of simple hardware
circuit enables every user to use this wireless shop security
system with PIR sensor, Smoke driver and Magnetic switches.
The system is fully controlled by the 8 bit AT89C52
microcontroller. All the sensors and detector are interconnected
to microcontroller by using various types of interface circuits.
The microcontroller will continuously monitor all the sensors
and if it senses any security problem then the microcontroller
will send the alertation calling to the user mobile through GSM
modem. The Microcontroller also turns ON and OFF the
electrical appliances in home and shop based on Calling received
from the user.
|
Download
|
28 |
Secured Android Application for Job Search Engine and
Smart Travel Guide Using Eclipse
R.Sriramkumar
Abstract — The fluidity of application markets complicate
Smartphone security. The Job selection process in today’s
global economy can be a daunting task for prospective
employees no matter their experience level. It involves a
detailed search of newspapers, job websites, human agents,
etc, to identify an employment opportunity that is perceived
compatible to abilities, anticipated remuneration and social
needs. The proposed solution would involve the creation of an
applicant, job search and employer agents that would use
fuzzy preference rules to make a proper decision in getting a
list of jobs based on the user’s search criteria and also feed
the rating of the employer based on feedback submitted by
the past & current employees which is unique and first of its
kind. The system would use ANDROID 2.2, JADE-LEAP,
Eclipse and the Google API to provide a robust, user friendly
solution. applications, location dependent systems have been
detected as an important application. Such application which
presents the architecture and implementation of such a
location is commonly known as Smart Travel Guide. We
propose architecture of mobile guide system for Android
Mobile Phones that is able to provide tourism information to
the mobile users conveniently. Our system takes advantage of
light-weighted mash up technology that can combine more
than one data sources to create value-added services, while
overcomes the limitations of mobile devices.
|
Download
|
29 |
An Efficient Ayurveda Smart Medicare System
K.Thamaraiselvi, S.KavinKumar, S.Jegan, K.S.Sanoop, M.JayaSurya
Abstract — Online medical booking store project is a web based
application which is implemented in java platform. Main aim of
this project is to develop 24/7 medical service for users through
online application. This project is used for diabetic, heart and
other medical patients. This service is most useful for patients
and the service is to intimate patients for taking tablet in every
two hours, back after intimates.In this project patients database
are stored in the system and also computerized billing in the
pharmacy and labs. Our software has the facility to give a unique
id for every patient and store the details of every patient and
staff automatically. Where he can add extra medicines and
update the cost of the medicines and update the cost of the
medicines and doctors and employees.
|
Download
|
30 |
Smart Shoes System for Women Safety
Snehal Jadhav, Manisha Karmalkar, Jyoti Patil, S.S Sankpal
Abstract — Many unfortunate incidents have been
taking place in woman’s case. Problems may come
from any direction such as women walking on the
road after the work, going to super market or many
other reasons for which they go alone. People at home
are not sure of their return safely. For this purpose
portable system is designed which can be easily
carried with the women. Now days there are so many
devices and applications for women safety. We can
use mobile, smart jewellery, smart jackets, spray etc.
For safety in danger situation but sometimes it will be
detracted. In such cases shoes or sandals cannot be
detracted. So we are going to make that circuit which
can situate in sandals or shoes which helps in critical
conditions. Today in the current global scenario, the
prime question in every girl’s mind, taking into
account the ever rising increase of issues on women
harassment in recent past, is only about her safety
and security. The only thought haunting every girl is
when they will be able to move freely on the streets
even in odd hours without worrying about their
security. This system suggests a new perspective to
use technology to protect women.
|
Download
|
31 |
A Study on Defaulters of Borrowers in Micro Finance with
Special Reference to Udumalpet Taluk
A.Anitha
Abstract — Micro finance fund helps the Borrowers to
provide credit to support for the uplift their family.
But at the same time the borrowers have to repay the
amount in time is very essential. But this is lack no in
rural areas. So defaulters are arising more and more
it has to be reduced by educating the borrowers
properly.
|
Download
|
32 |
CWSA Policy in Key Generation and File Sort View
Method using Multi-Tenant Cloud Computing
Environments
K.R.Sangeethkumar, C.Ramya, S.Uma, K.Sreya, Rajaguru
Abstract — This paper proposes a novel cloud-based workflow
scheduling (CWSA) policy for compute-intensive workflow
applications in multi-tenant cloud computing environments. In
IaaS, tenants share infrastructure resources like hardware,
compute servers, and data storage devices. Multi-tenancy helps
to minimize the overall workflow completion time, tardiness, cost
of execution of the workflows, and utilize idle resources of cloud
effectively. The novel CWSA scheduling policy is compared with
the state-of-the-art algorithms, i.e., First Come First Served
(FCFS), EASY Backfilling, and Minimum Completion Time
(MCT) scheduling policies to evaluate the workflow
performances.
|
Download
|
33 |
Automated water usage monitoring system in building
Prathamesh Mete, Mahesh Parit, Liyakat Mulani, S.S Sankpal
Abstract — There is rapid growth in wide urban
residential areas,therefore it is a need to provide
better water supply as well as to prevent the
unnecessary wastage of water.In case of Apartment
buildings , customars will face problems due to
improper water supply management.This proposed
Centrallized water usage monitoring system using
Arduino is used to monitoring individual usage from
a central system so that every one will get proper
billing and limit misuse.The water from the storage
tank to individual houses is measured with help of
water flow sensors.The system consists of Arduino
and RF module.Ardiuno used to read flow sensors
and transmitting and receiving data using RF
module.Here it is also used to maintain record of
water usage for individual users.RF module is used
for setting up wireless network between sensor nodes
and main base station.
|
Download
|
34 |
Video Steganographic System for Secure and
Efficient Data Transmission
Balu S, PappathiBarjana L, Kavitha T, Nithya K
Abstract — Nowadays Digital data communication has become
very popular. The security and the confidentiality of the
sensitive data has become of prime concern. This leads to the
unpredictable growth in the field of information hiding.
Hiding the secret messages in a cover object without leaving
a remarkable track on the original message is known as
Steganography. It is used to securely transfer the messages
over the internet. It is different from cryptography, as it is
not used to scramble the data, it is used to conceal the data
in digital media. Digital Steganography typically involves on
hiding messages in digital files. Typically, Steganography
focuses on hiding content in image and audio files. In
comparison the research and usage of multimedia files as
cover objects remains limited. There are many methods in
the existing system like hiding data inside image, audio,
video using cryptography techniques for protecting sensitive
information. A steganographic tool is proposed that uses a
novel approach of Principle Component Analysis (PCA)-
based Reversible Data Hiding. Our approach offers two
levels of security. In the first level, the secret data is
encrypted using triple DES algorithm and in the second level
the encrypted data is embedded into the video. The locations
for data embedding are selected in the video such that they
offer most robust PCA-based decoding. Then the encrypted
data is embedded into the selected locations, hence a stegovideo
is formed. Reversible data hiding restores the carrier
after the removal of hidden secret data.
|
Download
|
35 |
Automatic Weather Monitoring and Vehicle Counting
System using HSV Colour Model Extraction and
Background Subtraction
Hari K.P, R.Muthu Kumar
Abstract — The rapid proliferation of multimedia over
internet demands sophisticated technique for secure and efficient
access to information. There is growing need to discourage
unauthorized duplication and use of digital data. To provide
copyright protection for colour images, an effective, robust and
imperceptible watermarking scheme is proposed. Steganography
is the art of covered or hidden writing. The main purpose of
steganography is covert communication -to hide the existence of
a message from a third party. Steganography is generally
used to hide important information in a visible media
mostly an image. A good approach to steganography must
provide two attributes: high security against the different
attacks called steganalysis, which is nothing but a technique
used for detecting hidden information using steganography
method and second is compression. Image compression not
only reduces storage but also benefits transmission. In
proposedmethod the image steganography is achieved with
enhanced security due to ColourQR code using DWT transform,
without affecting the actual cover image due to addition of secret
information which is in form of QR codes. The process for
embedding the QR codes has been carried out using
Embedding and Extraction algorithm which insures secure
and fast transmission of stego image. These results validate
the practical feasibility of the proposed method for security
applications.
|
Download
|
36 |
Robust and Secure QR Code Watermarking using Discrete
Wavelet Transform and Its Quality Measure Assessment
C.Thamilarasi, Shajeena.K.V
Abstract — The main objective of this project is to develop a
standalone modular weather station with a remote
communication facility to capture and transmit meteorological
parameters. An automated weather station is an instrument that
measures and records meteorological parameters using sensors
without intervention of humans. Weather information along
roads is needed to reduce the traffic accidents caused by adverse
weather and road conditions. Although automatic weather
systems (AWS) provide wide-range coverage of weather
conditions, collection devices cannot be installed on every road
because of the high cost. Thus, we propose a method that extracts
weather information using CCTV video data. This method is
composed of three processing steps: generating conditional
weather patterns using CCTV video data, calculating the
similarity, and generating the weatherinformation. The
measured parameters can be stored in a built-in data logger or
can be transmitted to a remote location via a communication link.
If the data is stored in a data logger, recorded data must be
physically downloaded to a computer at a later time for further
processing. Therefore, the communication system is an essential
element in an automated weather station.Video monitoring has
been widely used in intelligent transportation system (ITS). As
one of the important research topic in video monitoring based
intelligent transportation system (ITS) is vehicle classification
and counting. Vehicle classification and counting is challenging
task due to problems like motion blurs, varying image resolution
etc. So far numerous algorithms have been developed for vehicle
classification and counting. This paper proposes an effective
Background subtraction algorithm used for moving vehicle
classification and after classification counting will be done
according to the class. This will help to improve efficiency and
reliability of vehicle classification and counting technique.
|
Download
|
37 |
A Robust Digital Image Watermarking Using 3 Levels
Discrete Wavelet Transforms
V. Magheswaramuniraj, S.Raghuwaran, N.Kurinjiko
Abstract — The rapid proliferation of multimedia over internet
demands sophisticated technique for secure and efficient access
to information. There is growing need to discourage
unauthorized duplication and use of digital data. To provide
copyright protection for colour images, an effective, robust and
imperceptible watermarking scheme is proposed. Steganography
is the art of covered or hidden writing. The main purpose of
steganography is covert communication -to hide the existence of
a message from a third party. Steganography is generally used
to hide important information in a visible media mostly an
image. A good approach to steganography must provide two
attributes: high security against the different attacks called
steganalysis, which is nothing but a technique used for
detecting hidden information using steganography method
and second is compression. Image compression not only
reduces storage but also benefits transmission. In proposed
method the image steganography is achieved with enhanced
security due to ColourQR code using DWT transform, without
affecting the actual cover image due to addition of secret
information which is in form of QR codes. The process for
embedding the QR codes has been carried out using
Embedding and Extraction algorithm which insures secure
and fast transmission of stego image. These results validate
the practical feasibility of the proposed method for security
applications.
|
Download
|
38 |
The Emerging Approach of Multiplication Circuits by
Partial Product Technique
P.Prakash, M.Sharon Rebecca
Abstract — This project based on the approach of
partial product perforation technique for designing
approximate multiplication circuits in the
hardware-level. We introduce the partial product
perforation method for creating approximate
multipliers. We omit the generation of some partial
products, thus reducing the number of partial
products that have to be accumulated; we decrease
the area, power. The major contributions of this
work, the software-based perforation technique on
the design of hardware circuits, obtaining the
optimized design solutions regarding the power–
area–error tradeoffs. The need for real time high
end digital signal/image processing demands a very
huge computation with a reasonable accuracy. This
work has reduced the tradeoff that exists between
the amount of computation and the accuracy. We
analyze in a mathematically rigorous manner the
arithmetic accuracy of partial product perforation
and prove that it delivers a bounded and predictable
output error. Our error analysis is not bound to
specific multiplier architecture and can be applied
with error guarantees to every multiplication circuit
regardless of its architecture. We show that,
compared with the respective exact design, the
partial product perforation delivers reductions in
power consumption, area.
|
Download
|
39 |
Text Detection in Natural Images and Video using Maximally
Stable Extremal Regions and Text Candidate Classification
C.Alakesan, Ajeesh V K
Abstract — This Digital images captured by camera
contains many useful information. Many research
has been done for content retrieval from natural
images, for example, object detection, face
recognition and automatic text extraction. In recent
years, many methods are suggested for extracting
text data from images as it has wide range of
applicationsThis paper analyzes, compares, and
contrasts technical challenges, methods, and the
performance of text detection and recognition
research in color imagery.A fast and effective
pruning algorithm is designed to extract Maximally
Stable Extremal Regions (MSERs) as character
candidates using the strategy of minimizing
regularized variations. Character candidates are
grouped into text candidates by the single-link
clustering algorithm, where distance weights and
clustering threshold are learned automatically by a
novel self-training distance metric learning algorithm.
The posterior probabilities of text candidates
corresponding to non-text are estimated with a
character classifier; text candidates with high nontext
probabilities are eliminated and texts are
identified with a text classifier. Experimental results
shows proposed work better than existing method.
|
Download
|