IJAIR- Volume 6 Issue 3 (March 2017)

 


Sr/No/ Title Pdf
1 Modified Minkowski Shaped Patch Antenna with Rectangular Parasitic Patch Elements
Shaik Najma, M.R.N Tagore

Abstract — The Minkowski shaped antenna with the rectangular parasitic patch elements is for parametric study. Generally, patch antenna has four parts. Those are patch, feed line, ground plane and parasitic elements. A patch antenna is basically a metal patch suspended over a ground plane. In Minkowski shaped patch, the rectangular parasitic elements are placed at the bottom. Different patch sizes involved in parametric design study i.e., (Design 2A, Design 2B, Design 2C, Design 2D and Design 2E). The parameters of patch antenna are return loss, radiation pattern, directivity, efficiency, bandwidth and gain. For Worldwide Interoperability for Microwave Access (WiMAX) application the frequency of this antenna is 5.8 GHz (i.e. upper frequency). It gives the bandwidth of 254 MHz (5.676 GHz to 5.930 GHz), return loss of – 24.477 dB and a gain of 2.351 Db.

Download
2 Mobile Phone Based Traffic Information System
M.Manikanta Rao, N.Chandrasekhar

Abstract — Increasing mobile phone penetration combined with the wide coverage of cellular infrastructures, renders mobile phone based Traffic Information System (TIS) an attractive option. The main purpose of such systems is to alleviate traffic congestion that exists in every major city. Nevertheless, to reap the benefits of mobile phone based TIS, we need to ensure their security and privacy and their effectiveness (e.g., accuracy). This is the motivation of this paper: we present a comprehensive solution for mobile phone based traffic estimation that is proven to be secure and privacy preserving using sensors. Our results confirm that mobile phone based TIS can offer accurate traffic state estimation while being secure and privacy preserving. Traffic congestion deteriorates the quality of life of citizens and contributes significantly to environmental pollution and economic loss. Traffic Information Systems(TIS) aim at solving this problem by collecting traffic data, producing traffic estimates, and providing drivers with traffic specific information. The increasing mobile phone penetration, along with the wide coverage of cellular networks, defines an unprecedented large-scale network of sensors, with extensive spatial and temporal coverage, able to serve as traffic probes for TIS. This is a task that cannot be achieved only by relying on the security of the mobile to cellular infrastructure communication.

Download
3 Automated Garbage Collection System
D. B. Kadam, Prajakta Patil, Sayali Adake, Tejashri Patil

Abstract — After a dedicated survey and keen observation, it was found that the developing eastern countries are lagging behind in context of cleanliness and hygiene as compared to the developed countries. Deadly Swine Flu is an ongoing example. The death rate is much higher due to unhygienic conditions. To avoid this condition we have proposed this project i.e. Automated Garbage collection System in which one control unit is mounted on garbage bin which will detect level of garbage through IR sensor and send message to respective authorities. In addition to that to clean outside garbage we have developed robotics mechanism which helps to collect outside garbage and put it in to garbage bin through its arms.

Download
4 A Systematic Analysis of Multichannel Queuing System
J.Greeda, M.V.Suresh

Abstract — Queuing theory has wide range of applications in day-by day congestion problems as well as in industrial organization. It may be applied in diverse areas such as traffic flow where there occurs the flow of objects around a network, avoiding congestion and trying to maintain a steady scheduling, bank, airport runway layout, luggage collection at checkout counters, passport control hair dressers, manufacturing processes, printer queues, minimizing page faults in computing etc. The range of applications has grown to include not only telecommunication and computer science. But also in manufacturing, traffic control, military logistics, design of amusement parks of many other areas that involve service system whose demands are at random. The art of applying queuing theory is to construct a model that is simple enough so that it yields to mathematical analysis, yet contain sufficient detail so that its performance measures reflex the behaviour of the real time system.

Download
5 Development of Speed -Flow Models for Analysis of On- Street Parking in Hyderabad City – A Case Study
Jollireddy Omprakash

Abstract — All metropolitan cities in the country come across for serious parking problems, mostly in central business district (CBD). Parking which is considered as an integral component of the transport system as it plays a critical role in traffic management and congestion. Improper, hazardous parking system would seriously affect the transportation system. One of the major causes for parking problems in most of the metropolitan cities is because of the insufficient roadway width. The roadway width is not increasing with the same pace as that of increase in vehicular population. This has lead to reduction of roadway space in urban streets. It is also observed that due to lack of public transport facility, commuters prefer to use personalized vehicle which has increased the demand for more parking spaces especially in CBD. The management of Onstreet parking is one of main parameter in traffic management. The lack of concentrated parking results the increased onstreet parking and disturbance in traffic. The behavioural pattern of on-street parking has direct relationship with land use as quantity and quality of traffic variants such as: speed, delay time, flow rate and volume to capacity rate which are also effective in movement in traffic analysis. This paper examines the relationship between speed, flow rate and parking as parameters for improving the exiting traffic conditions in the city of Hyderabad. The results indicate that parking is affected for speed, v/c and would increase in delay characteristics for traffic flow in reaching their destination point under heterogeneous traffic conditions of our city.

Download
6 Eco-criticism in Old Manipuri Literature: A case study of “Hijan Hirao”
Yanglem Nungshitombi Devi

Abstract — Eco-criticism is a new theory of literary criticism. It is an interdisciplinary approach. It includes various fields like religious rites, culture, worshipping, traditional beliefs, historical, aesthetic, phenomenology, habitat and evolution, socio-politics and other allied fields. In the writings of the Old Manipuri Literatures we found ample scope for ecocriticism analysis. Hijan Hirao is one of the earliest literary works on nature, ecological and environmental aspects. The other literary works on ecological and environmental aspects are Tharon, Leiron, Kumdamshei, Khongjomnubi Nongarol, etc. Besides this, there are also literary works which relates to the topographical accounts on the hills, lakes and rivers, viz. Koubru Chingoirol, Nongmaiching Chingoirol, Langol Chingoirol, Thangjing Chingoirol, Langthabal Chingoirol, etc. to name few of them. An attempt was also made to make an assessment of ecocriticism of “Hijan Hirao” based on the Dr, Ksh. Premchand Singh’s Work in “Hijan Hirao: Text, Context and Translation” (2015), inter alia, attempts (i) to explore the rich cultural and literary tradition in the Old Manipuri Literatures which relates to ecological and environmental aspects; (ii) to make a critical assessment of the aspects of eco-criticism in “Hijan Hirao”; (iii) to examine the interrelationship between nature and human beings with reference to “Hijan Hirao”; and (iv) to analyze the significance of Hijan Hirao in Ummang Lai Haraoba.

Download
7 Analysis of Leakage Power Reduction Techniques for Nano CMOS circuits
Akhilesh Goyal, Abhishek Tomar, Aman Goyal

Abstract — Due to growing impact of static leakage, gate leakage and subthreshold leakage is contributing more towards the power dissipation in the deep submicron Nano-CMOS technology. In SRAM the significant proportion of power dissipation is mainly due to high leakage current in Nano-CMOS. The significant portion of the power budget is lost in standby power due to unwanted increment in leakage current, in deep submicron. In designing low-power Nano-CMOS SRAM Cell it is important to identify and calculate the different leakage currents. On the subthreshold leakage have been lot of works and even many techniques to reduce it, such as forcing stack, body bias control and controlling input vector to the circuit in standby mode. In this paper we review the leakage current power loss and reduction techniques of standby power and after that we analyze the different components of standby power dissipation. In this paper we describes different techniques to reduce the leakage power consumptions in the SRAM Cell.

Download
8 Innovative mechanism proposed to enhance the safety of air conditioner
Ravinder Tonk, Hitesh Sharda, Jaskiret Singh

Abstract — Conventional air conditioner covers are commonly used to keep moisture, debris and dust particles out of the air conditioner during the nonservice season. They protect the a/c from damage that could lead to costly repairs and early system failure. These covers are used throughout the winter season, but when the air conditioner is again put to use at just the commencement of summer season many users forget to remove the normal safety cover which restrict the flow of hot air coming out from the back and sides of the air conditioning unit. This causes the trapping of heat inside the cabin of air conditioner and mostly near the condenser coils. The user unaware of this continues to use the air conditioner and after a while the copper pipes of the condenser coil gets heated up to nonpermitted temperatures and ultimately gets ruptured causing formation of holes on the pipes which causes leakage of expensive refrigerant gas. This leads to cooling capability of air conditioner to drop to almost negligible.

Download
9 Experimental Investigation of Solar Distillation Systems Apply Paraffin Wax
M.A.Omprakas, S.A.Pavithran, J.praveen, K.Nithyaprakash

Abstract — The availability of drinking water is essential for the survival all of mankind. Adequate amount of water resources are available on our planet but very few of them can be used for the purpose of drinking. A number of water purification methods have been put forth by researchers to purify brackish water and sea water. As water purification processes require some sort of energy source, and with the advent of renewable sources of energy utilization in various fields, a thorough review of solar powered purification setups is essential. An effort has been made to review all the available research and technology for water distillation using solar energy in this research paper. It is found from the literature survey that, a number of research setups and devices are available but are currently not being used due to high initial setup costs and limited technological awareness in the society.A new passive solar water pasteurization system based on density difference flow principles has been designed, built and tested. The system contains no valves and regulates flow based on the density difference between two columns of water. The new system eliminates boiling problems encountered in previous designs. Boiling is undesirable because it may contaminate treated water. The system with a total absorber area of 0.45 m2 has achieved a peak flow rate of 19.3 kg/h of treated water. Experiments with the prototype systems presented in this paper show that density driven systems are an attractive option to existing solar water pasteurization approaches.

Download
10 Computation Fluid Dynamic Analysis of Performance Improvement - Steam Turbine Blade -Applied Paper Mill Industry
M.Sampathkumar, M.SoundaraRajan, R.Tamilselvan, A.P.Surya, L.Tharun

Abstract — Flow analysis in Steam turbine blades has long been an intensive subject of research. Computational Fluid Dynamics (CFD) is the present day state-of-art technique for fluid flow analysis. It was found that non-uniformities are created in different parts of the Turbines at off-design conditions which result in the decrease in efficiency different radial gaps. The operating characteristic curves predicted by the numerical simulation were compared with the results of model testing and are found in good agreement. The test case consists of an enshrouded Steam turbine blades with seven blades . A large number of measurements are available in the radial gap between the blades and the diffuse, making this case ideal for validating numerical methods. Results of steady and unsteady calculations of the flow in the Turbines are compared with the CFD experimental ones, Four different turbulent models are analyzed. The steady K-Ɛ and RNG with standardized is wall functions defined equation function simulation uses the frozen rotor concept, while the unsteady simulation uses a fully resolved sliding grid approach. The comparisons show that the unsteady numerical results accurately predict the unsteadiness of the flow, different radial gap are starting conditions demonstrating the validity and applicability of that methodology for unsteady incompressible Thermo heat trnsfer machinery flow computations. The steady approach is less accurate, with an unphysical advection of the blades wakes, but accurate enough for a crude Approximation. The different turbulence models predict the flow at the same level of accuracy, with slightly different results have best radial gab are find to installation of the single parameter in operating conditions to apply speed in different stages .physically its radial rotated in Blades Turbines from operating function .The Similar process to be handled each speed Functionally operated to finding single steady equations flow process in different equations to analyzed to be done it. And performance optimized analysis with simulated waste heat recovery analysis of Paper mill industry

Download
11 Computational Fluid Dynamic Analysis of Solar Desalination Systems Apply Different Paraffin Wax
M.A.Omprakas, K.Nithyaprakash, S.A.Pavithran, J.praveen

Abstract — The availability of drinking water is essential for the survival all of mankind. Adequate amount of water resources are available on our planet but very few of them can be used for the purpose of drinking. A number of water purification methods have been put forth by researchers to purify brackish water and sea water. This paper outlines a research project about fluid flow and computational investigations of flow patterns in a solar water store. Investigations have shown the flow patterns in solar water stores strongly influences the hot spot position of solar heating system. Mixing caused by water entering the solar water store will destroy stratification. For increasing the system tilted at 10o from the horizontal plane the thermal performance increasing. In order to describe the fluid flow behaviour of the water inside the solar water store, a finite element based on model was generated for the system and was simulated using the COMSOL4.5 programmed. The goal of the project is to gather knowledge about flow phenomena occurring in water system stores with different tilted and time. The result of the simulation could be used as guidance to locate the suitable position of appropriate components such as helical coils as well as the size of the solar hot water heater system to be built.

Download
12 Waste Heat Recovery System Steam Thermal Plant Engineering Paper Industry
M.Sampathkumar, M.SoundaraRajan, R.Tamilselvan, A.P.Surya, L.Tharun

Abstract — The shortage of power due to gap between the supply and demand would be persistent phenomena in a developing country like India. To eliminate this shortage, simply addition of power plants or increasing power generation would not be sufficient but the improvement in the availability, efficiency of the plant equipment and systems of generating units existing or newly being installed is very much necessary. An energy audit is a study of a plant or facility to determine how and where energy is used and to identify methods for energy savings. The energy audit of 24.62MW cogeneration unit of TNPL is carried in this project. The main aim of this project is to carry out a performance analysis of cogeneration unit, which helps in both conservation of energy and cost, thereby used to improve the efficiency of the unit. objective:- The performance calculation done at the cogeneration unit reveals that there is a minimum fuel saving potential of 180 kg/hr by optimizing any one of the following method 1. Utilizing the percent excess air in optimum level. 2. Bagasse pith moisture reduction. 3. Proper energy conserving activities on plant auxiliaries.

Download
13 Performance Enhancement Analysis Of Solar Distillation Systems With Phase Change Materials -Review
M.A.Omprakas, S.A.Pavithran, J.praveen, K.Nithyaprakash

Abstract — This chapter presents the analysis of a solar distillation system with phase change material storage system. There is always a scarcity of clean and pure drinking water in many developing countries. Water from various sources is often brackish (i.e. contain dissolved salts) and/or contains harmful bacteria and therefore, cannot be used for drinking purpose. In addition, there are many coastal areas where seawater is abundant but potable water is not available in sufficient quantity. Apart from drinking purpose, pure water is also useful for health and industrial purposes such as hospitals, schools and batteries etc. Many parts of India, particularly, rural areas, coastal areas and many urban areas too, have a major drinking water problem. Sufficient drinking water, at accepted purity level, is just not available.

Download
14 A GSM based weather monitoring system working on solar energy
Priyanka Yadav, Priyanka Pawar, Shital Kore, S.S Sankpal

Abstract — This paper presents an design of “A GSM based weather monitoring system working on solar energy”. Three weather parameters temperature, rainfall and humidity are measured in this system. The measurement of those parameters is used to assume the present weather condition and the detailed information is sent to the farmer for assessment via GSM module. Using this system a farmer can monitor the farm continuously without being there at the farm and farmer will be able to take care of farm against natural climatic conditions which will harm the crop. Only basic type of sensors is used so that the cost of the design is reduced. Weight of the system is also less so to this system is easy to handle. In the country like India where the non- renewable energy sources are going to be finish and the renewable energy sources is the biggest replacement for this era. And solar energy is the largest source of renewable energy. This system is working on solar energy which is very cost effective. Keywords- Remote weather monitoring, low cost local weather study, GSM based communications, solar power plant, and renewable energy generation.

Download
15 Healthcare System for Elderly People using IOT
Priyanka C, Manikandan P, Manokaran P, PremKumar M, Kanagaraju P

Abstract — The need to develop newer technologies to care elderly people has increased a lot. It has become a greatest necessity today. In the present condition, the elderly people become depressed due to loneliness. Their pressure, body condition illness become worse day by day and that is more difficult to care them. Elderly people need to travel every day or once a week to visit doctor or the Doctor need to visit patients home. It makes the patient tired and still makes the health condition worse. Also the Doctor cannot visit often irrespective of his busy work. The project focus on the care of the elderly people. Devices like sensors are used to measure metabolic activities like temperature, heart beat rate, etc. The project uses sensors to measure the activities and the measured rate will be stored. The file stores all the records of the patient in it and in case of emergency, message will be sent to the doctor and relatives of the patient. The patient’s data can be retrieved at any time. Because of this, it will be easy for the doctor’s in case of emergency. The project mainly focus on providing more security to the patient’s details by encrypting the information.

Download
16 Dozy and Frenzied Automobilist Alert System
R.Sugantha Lakshmi, K.Aravind Raja, S.Eswar

Abstract — Due to the complex nature of road traffic, collisions are an unavoidable part of human life. Studies have shown that a large proportion of traffic accidents around the world are related to inadequate or disordered sleep. Recent surveys have linked driver fatigue to 16% to 20% of serious highway accidents in the UK, Australia, and Brazil. Fatigue as a result of sleep disorders (especially obstructive sleep apnea), excessive workload and lack of physical and mental rest; have been shown to be major contributing factors in vehicle accidents. A number of behavioral, physiological, and psychometric tests are being used increasingly to evaluate the impact of fatigue on driver performance. Dozy Driving-a combination of sleepiness and driving has become a worldwide problem that leads to severe accidents. A real time non-intrusive method for detecting the drowsiness of driver has been described in this paper. The system uses the IR sensor which is attached to a glass is used to capture the eye closure rate of the driver in order to detect the drowsiness. Computer vision and machine learning algorithms are used to monitor and detect whether the driver is drowsy or not. Visual feature like eye which characterizes the drowsiness of the driver is detected with the help of image processing techniques. In such a case when dozy is detected, the warning signal and a vibration is issued to alert the driver. A neural network based algorithm is used to determine the level of drowsiness by measuring the eye opening and closing and warns the driver accordingly.

Download
17 Grass Cutter using Solar Energy for Street Divider
S.S Sankpal, Pednekar Aishwarya, Mhetre Sonali, Kamble Pratiksha

Abstract — This paper presents an design of grass cutter using solar energy for street divider. Current technology commonly used for cutting the grass is by the manually handled device. This paper used novel technology. So in this paper we are trying to make robot for street divider which is able to cut the grasses on street divider. The power source that is battery and a solar panel will be attached on the top of the robot which reduces the power problem. Proposed model in this paper made some changes in the existing machine to make its application easier at reduced cost. One of main aims of this method is to control pollution and use renewable energy source.

Download
18 Design And Modification Of Model UHT 70 Motorized Hand Truck For Material Handling In Heat Treatment Plant
CharubalaHarde, S.S. Kumbhalkar

Abstract — commercial organization, where the goods are prepared they need to transport their goods from one place or one station to another. For this purpose, they use hand trolley or also known as hand truck on which the load is handled manually from one place to another. Sometimes, it is difficult with this equipment to transport or carry the load manually. In this paper, some design and modification is practically done on the modelled hand truck. Further, it is been motorized which make it simplier for the use instead of manual operation. Design of the model is done in modelling software called Creo Parametric 2.0 and considering several factors, the analysis will be done in analysis software called Ansys 14.0.

Download
19 Design and Analytical Method for Finding Outcome Parameters of Motorized Hand Truck
Kalyani Wichare , R.R.Gandhe , Ajay Mahawadiwar

Abstract — commercial organization, where the goods are prepared they need to transport their goods from one place or one station to another. For this purpose, they use hand trolley or also known as hand truck on which the load is handled manually from one place to another. Sometimes, it is difficult with this equipment to transport or carry the load manually. In this paper, some design and modification is practically done on the modelled hand truck. Further, it is been motorized which make it simplier for the use instead of manual operation. Design of the model is done in modelling software called Creo Parametric 2.0 and considering several factors, the analysis will be done in analysis software called Ansys 14.0.

Download
20 Design and Analysis of Slitting Machine
Chetna N. More , Ajay Mahawadiwar

Abstract — Simple slitting machine is a manually operated machine which cuts slits of required width from very long rubber sheets, plastic sheet, paper, cloths that measures hundreds of meter. It consists of rollers, drum, cutter assembly, locking arrangements, shafts, etc. It is operated by single labour that cuts hundred meter rubber sheets into sheets into slits in very less time with accuracy in cutting. Here analysis of cutter blade will be performed. Before performing analysis design calculation will be made. Here we try to improve the existing design by implementing automation as per requirement. Also reliability testing will be made for robust design.

Download
21 Design and analysis of leaf spring used in TATA 407 Truck
Nikhil Jambhulkar, R.R.Gandhe

Abstract — In now a day the fuel efficiency and emission gas regulation of automobiles are two important issues. To fulfill this problem the automobile industries are trying to make new vehicle which can provide high efficiency with low cost. The best way to increase the fuel efficiency is to reduce the weight of the automobile. The weight reduction can be achieved primarily by the introduction of better material, design optimization and better manufacturing processes. The achievement of weight reduction with adequate improvement of mechanical properties has made composite a very good replacement material for conventional steel. The automobile vehicles have number of parts which can be able to replace by composite material, but due to the improvement of mechanical properties of composite material. It has more elastic strength and high strength to weight ratio has compared with those of steel material. So, out of many components one of the components of automobile, the leaf spring which use for carried out the whole weight of the vehicle is best option for replacement of steel material by composite material. The aim is to review the paper about fabrication and analysis of composite leaf spring.

Download
22 Design Modification and Virtual Testing of Lifting Jack
DiptiThakare, R.R.Gandhe

Abstract — Most of the present day resources of energy are limited and irreplaceable. Next generation will face acute energy crisis if alternate resources of energy are not developer concurrently. In today’s developing world, the extent of automation is obviously the foremost focus of engineers. Screw jack is a device which is used to lift and support a heavy load in automotive vehicles, such as a car. Generally, human effort is required to rotate the screw, but in present work, it is eliminated by using operated push button type equipment’s which is total automatic. A set of iteration will be performed and a mathematical model will analyticallyframed to predict the power requirement at a given load. The design and analysis for the screw jack showed that the model will be verified for wide range of load.

Download
23 Clustering of nodes to increase throughput to avoid collision by using IoV
J.Bhuvaneswari, S.G.Sandhya

Abstract — Internet of Vehicles (IoV) communicates with vehicle to vehicle (V2V) and vehicle to base station (BS) by using mobile communication and it is wireless connection between vehicle. Communications are performed by nodes. Here the vehicle is considered as node. the communication nodes are grouped to easily communicate with each other. K-Means clustering is used to find the distance. During the communication of nodes, there will be traffic or collision occuring and it could not provide the complete evaluation so there is not fact in the environment of vehicles. To avoid this problem the routing protocol are used to find the shortest distance among the node. Then Intrusion detection system is used to prevent from the unauthorized access. Intruder is called as a hacker or attacker. Intrusion detection systems are developed to provide early warning and action are taken to prevent and minimize damage. Then the data will be sent securely from one node to another during communication. The data is sent effectively and successfully.

Download
24 A Comparative Study of Acids in Unifloral Honeys of East Godavari District, A.P., India
K. Hemalatha, P. Satyanarayana

Abstract — Honey is a natural product known to man since ancient time. It can be preserved for a long time with out adding any preservatives. Its food and medicinal value made it unique among all natural products. It is a colloidal suspension of nearly 300 different compounds. This wonderful tasty product synthesised by honey bees by collecting nectar of various flowers. Honey is acidic in nature. No major change reported in pH even after storage for prolonged periods. Honey is acidic in nature. Acidity of honey results from the presence of Organic Acids. Many acids have been reported to be present in honey. Acidity of honey may be expressed as free acids, loctone acids or tabal acids which account for less than 0.5 g of solids. This small quantity of acids contributes to the flavour and tart taste to the honey and also responsible in part for the stability of honey against Micro Organisms. Total acidity of 3 different unifloral honeys are studied. These honeys were collected or procured in different seasons from different areas of East Godavari District, A.P., India.

Download
25 The Structure of Transportation Problem Involves an Octagonal Intuitionistic Fuzzy Numbers
P.Rajarajeswari, G.Menaka

Abstract — In this paper a new method is proposed for finding an optimal solution for intuitionistic fuzzy transportation problem, in which the costs, supplies and demands are octagonal intuitionistic fuzzy numbers. The procedure is illustrated with a numerical example.

Download
26 Secured Clustering and Energy Management on Internet Environment IOT
Rahul K, Kaaviyan S.N, Saranya M, B.G.Geetha

Abstract — The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. A homogeneous and secure weighted clustering algorithm which is an extended version of our previous algorithm (ES-WCA) for mobile WSNs using a combination of five metrics. Among these metrics lie the behavioural level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. The goals of the proposed algorithm are, offering better performance in terms of the number of re-affiliations which enables to generate a reduced number of balanced and homogeneous clusters. This algorithm, coupled with suitable routing protocols, aims to maintain stable clustering structure. Simulation study to demonstrate the performance of the proposed algorithm is also used.

Download
27 Advanced Security System Using Calling Facility
Deshmukh Rutuja R, Patil Pranali P, Mane Sarita R, Kadam . D.S

Abstract — Security and automation is a prime concern in our day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, we have tried to increase these standards by combining new design techniques and developed a low cost home and industrial automated security systems. Everyone wants to be as much as secure as possible. The design of simple hardware circuit enables every user to use this wireless shop security system with PIR sensor, Smoke driver and Magnetic switches. The system is fully controlled by the 8 bit AT89C52 microcontroller. All the sensors and detector are interconnected to microcontroller by using various types of interface circuits. The microcontroller will continuously monitor all the sensors and if it senses any security problem then the microcontroller will send the alertation calling to the user mobile through GSM modem. The Microcontroller also turns ON and OFF the electrical appliances in home and shop based on Calling received from the user.

Download
28 Secured Android Application for Job Search Engine and Smart Travel Guide Using Eclipse
R.Sriramkumar

Abstract — The fluidity of application markets complicate Smartphone security. The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. The system would use ANDROID 2.2, JADE-LEAP, Eclipse and the Google API to provide a robust, user friendly solution. applications, location dependent systems have been detected as an important application. Such application which presents the architecture and implementation of such a location is commonly known as Smart Travel Guide. We propose architecture of mobile guide system for Android Mobile Phones that is able to provide tourism information to the mobile users conveniently. Our system takes advantage of light-weighted mash up technology that can combine more than one data sources to create value-added services, while overcomes the limitations of mobile devices.

Download
29 An Efficient Ayurveda Smart Medicare System
K.Thamaraiselvi, S.KavinKumar, S.Jegan, K.S.Sanoop, M.JayaSurya

Abstract — Online medical booking store project is a web based application which is implemented in java platform. Main aim of this project is to develop 24/7 medical service for users through online application. This project is used for diabetic, heart and other medical patients. This service is most useful for patients and the service is to intimate patients for taking tablet in every two hours, back after intimates.In this project patients database are stored in the system and also computerized billing in the pharmacy and labs. Our software has the facility to give a unique id for every patient and store the details of every patient and staff automatically. Where he can add extra medicines and update the cost of the medicines and update the cost of the medicines and doctors and employees.

Download
30 Smart Shoes System for Women Safety
Snehal Jadhav, Manisha Karmalkar, Jyoti Patil, S.S Sankpal

Abstract — Many unfortunate incidents have been taking place in woman’s case. Problems may come from any direction such as women walking on the road after the work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. For this purpose portable system is designed which can be easily carried with the women. Now days there are so many devices and applications for women safety. We can use mobile, smart jewellery, smart jackets, spray etc. For safety in danger situation but sometimes it will be detracted. In such cases shoes or sandals cannot be detracted. So we are going to make that circuit which can situate in sandals or shoes which helps in critical conditions. Today in the current global scenario, the prime question in every girl’s mind, taking into account the ever rising increase of issues on women harassment in recent past, is only about her safety and security. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This system suggests a new perspective to use technology to protect women.

Download
31 A Study on Defaulters of Borrowers in Micro Finance with Special Reference to Udumalpet Taluk
A.Anitha

Abstract — Micro finance fund helps the Borrowers to provide credit to support for the uplift their family. But at the same time the borrowers have to repay the amount in time is very essential. But this is lack no in rural areas. So defaulters are arising more and more it has to be reduced by educating the borrowers properly.

Download
32 CWSA Policy in Key Generation and File Sort View Method using Multi-Tenant Cloud Computing Environments
K.R.Sangeethkumar, C.Ramya, S.Uma, K.Sreya, Rajaguru

Abstract — This paper proposes a novel cloud-based workflow scheduling (CWSA) policy for compute-intensive workflow applications in multi-tenant cloud computing environments. In IaaS, tenants share infrastructure resources like hardware, compute servers, and data storage devices. Multi-tenancy helps to minimize the overall workflow completion time, tardiness, cost of execution of the workflows, and utilize idle resources of cloud effectively. The novel CWSA scheduling policy is compared with the state-of-the-art algorithms, i.e., First Come First Served (FCFS), EASY Backfilling, and Minimum Completion Time (MCT) scheduling policies to evaluate the workflow performances.

Download
33 Automated water usage monitoring system in building
Prathamesh Mete, Mahesh Parit, Liyakat Mulani, S.S Sankpal

Abstract — There is rapid growth in wide urban residential areas,therefore it is a need to provide better water supply as well as to prevent the unnecessary wastage of water.In case of Apartment buildings , customars will face problems due to improper water supply management.This proposed Centrallized water usage monitoring system using Arduino is used to monitoring individual usage from a central system so that every one will get proper billing and limit misuse.The water from the storage tank to individual houses is measured with help of water flow sensors.The system consists of Arduino and RF module.Ardiuno used to read flow sensors and transmitting and receiving data using RF module.Here it is also used to maintain record of water usage for individual users.RF module is used for setting up wireless network between sensor nodes and main base station.

Download
34 Video Steganographic System for Secure and Efficient Data Transmission
Balu S, PappathiBarjana L, Kavitha T, Nithya K

Abstract — Nowadays Digital data communication has become very popular. The security and the confidentiality of the sensitive data has become of prime concern. This leads to the unpredictable growth in the field of information hiding. Hiding the secret messages in a cover object without leaving a remarkable track on the original message is known as Steganography. It is used to securely transfer the messages over the internet. It is different from cryptography, as it is not used to scramble the data, it is used to conceal the data in digital media. Digital Steganography typically involves on hiding messages in digital files. Typically, Steganography focuses on hiding content in image and audio files. In comparison the research and usage of multimedia files as cover objects remains limited. There are many methods in the existing system like hiding data inside image, audio, video using cryptography techniques for protecting sensitive information. A steganographic tool is proposed that uses a novel approach of Principle Component Analysis (PCA)- based Reversible Data Hiding. Our approach offers two levels of security. In the first level, the secret data is encrypted using triple DES algorithm and in the second level the encrypted data is embedded into the video. The locations for data embedding are selected in the video such that they offer most robust PCA-based decoding. Then the encrypted data is embedded into the selected locations, hence a stegovideo is formed. Reversible data hiding restores the carrier after the removal of hidden secret data.

Download
35 Automatic Weather Monitoring and Vehicle Counting System using HSV Colour Model Extraction and Background Subtraction
Hari K.P, R.Muthu Kumar

Abstract — The rapid proliferation of multimedia over internet demands sophisticated technique for secure and efficient access to information. There is growing need to discourage unauthorized duplication and use of digital data. To provide copyright protection for colour images, an effective, robust and imperceptible watermarking scheme is proposed. Steganography is the art of covered or hidden writing. The main purpose of steganography is covert communication -to hide the existence of a message from a third party. Steganography is generally used to hide important information in a visible media mostly an image. A good approach to steganography must provide two attributes: high security against the different attacks called steganalysis, which is nothing but a technique used for detecting hidden information using steganography method and second is compression. Image compression not only reduces storage but also benefits transmission. In proposedmethod the image steganography is achieved with enhanced security due to ColourQR code using DWT transform, without affecting the actual cover image due to addition of secret information which is in form of QR codes. The process for embedding the QR codes has been carried out using Embedding and Extraction algorithm which insures secure and fast transmission of stego image. These results validate the practical feasibility of the proposed method for security applications.

Download
36 Robust and Secure QR Code Watermarking using Discrete Wavelet Transform and Its Quality Measure Assessment
C.Thamilarasi, Shajeena.K.V

Abstract — The main objective of this project is to develop a standalone modular weather station with a remote communication facility to capture and transmit meteorological parameters. An automated weather station is an instrument that measures and records meteorological parameters using sensors without intervention of humans. Weather information along roads is needed to reduce the traffic accidents caused by adverse weather and road conditions. Although automatic weather systems (AWS) provide wide-range coverage of weather conditions, collection devices cannot be installed on every road because of the high cost. Thus, we propose a method that extracts weather information using CCTV video data. This method is composed of three processing steps: generating conditional weather patterns using CCTV video data, calculating the similarity, and generating the weatherinformation. The measured parameters can be stored in a built-in data logger or can be transmitted to a remote location via a communication link. If the data is stored in a data logger, recorded data must be physically downloaded to a computer at a later time for further processing. Therefore, the communication system is an essential element in an automated weather station.Video monitoring has been widely used in intelligent transportation system (ITS). As one of the important research topic in video monitoring based intelligent transportation system (ITS) is vehicle classification and counting. Vehicle classification and counting is challenging task due to problems like motion blurs, varying image resolution etc. So far numerous algorithms have been developed for vehicle classification and counting. This paper proposes an effective Background subtraction algorithm used for moving vehicle classification and after classification counting will be done according to the class. This will help to improve efficiency and reliability of vehicle classification and counting technique.

Download
37 A Robust Digital Image Watermarking Using 3 Levels Discrete Wavelet Transforms
V. Magheswaramuniraj, S.Raghuwaran, N.Kurinjiko

Abstract — The rapid proliferation of multimedia over internet demands sophisticated technique for secure and efficient access to information. There is growing need to discourage unauthorized duplication and use of digital data. To provide copyright protection for colour images, an effective, robust and imperceptible watermarking scheme is proposed. Steganography is the art of covered or hidden writing. The main purpose of steganography is covert communication -to hide the existence of a message from a third party. Steganography is generally used to hide important information in a visible media mostly an image. A good approach to steganography must provide two attributes: high security against the different attacks called steganalysis, which is nothing but a technique used for detecting hidden information using steganography method and second is compression. Image compression not only reduces storage but also benefits transmission. In proposed method the image steganography is achieved with enhanced security due to ColourQR code using DWT transform, without affecting the actual cover image due to addition of secret information which is in form of QR codes. The process for embedding the QR codes has been carried out using Embedding and Extraction algorithm which insures secure and fast transmission of stego image. These results validate the practical feasibility of the proposed method for security applications.

Download
38 The Emerging Approach of Multiplication Circuits by Partial Product Technique
P.Prakash, M.Sharon Rebecca

Abstract — This project based on the approach of partial product perforation technique for designing approximate multiplication circuits in the hardware-level. We introduce the partial product perforation method for creating approximate multipliers. We omit the generation of some partial products, thus reducing the number of partial products that have to be accumulated; we decrease the area, power. The major contributions of this work, the software-based perforation technique on the design of hardware circuits, obtaining the optimized design solutions regarding the power– area–error tradeoffs. The need for real time high end digital signal/image processing demands a very huge computation with a reasonable accuracy. This work has reduced the tradeoff that exists between the amount of computation and the accuracy. We analyze in a mathematically rigorous manner the arithmetic accuracy of partial product perforation and prove that it delivers a bounded and predictable output error. Our error analysis is not bound to specific multiplier architecture and can be applied with error guarantees to every multiplication circuit regardless of its architecture. We show that, compared with the respective exact design, the partial product perforation delivers reductions in power consumption, area.

Download
39 Text Detection in Natural Images and Video using Maximally Stable Extremal Regions and Text Candidate Classification
C.Alakesan, Ajeesh V K

Abstract — This Digital images captured by camera contains many useful information. Many research has been done for content retrieval from natural images, for example, object detection, face recognition and automatic text extraction. In recent years, many methods are suggested for extracting text data from images as it has wide range of applicationsThis paper analyzes, compares, and contrasts technical challenges, methods, and the performance of text detection and recognition research in color imagery.A fast and effective pruning algorithm is designed to extract Maximally Stable Extremal Regions (MSERs) as character candidates using the strategy of minimizing regularized variations. Character candidates are grouped into text candidates by the single-link clustering algorithm, where distance weights and clustering threshold are learned automatically by a novel self-training distance metric learning algorithm. The posterior probabilities of text candidates corresponding to non-text are estimated with a character classifier; text candidates with high nontext probabilities are eliminated and texts are identified with a text classifier. Experimental results shows proposed work better than existing method.

Download