Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)

Volume 6, Issue 6, June (2018)

S.No Title & Authors Full Text
1 Driver Drowsiness Detection System using Image Processing Technique by the Human Visual System
R.Sasikala, S.Suresh, J.Chandramohan, M.Valanrajkumar
Abstract - The purpose of this paper was to device a way to alert drowsy drivers in the act of driving. One of the causes of vehicle accidents comes from drowsiness of the driver. In recent years, we have used many technologies to detect the drowsiness of a driver in the field of accident avoidance system. To develop such a system we need to install some hardware components like camera inside the vehicle, which can capture the image of the driver at a fixed interval, and an alarm system, which will alert the driver after detecting his/her level of drowsiness and in the next level it will stop the vehicle automatically. Now apart from these hardware components, we need a software part also, which can detect the level of drowsiness of the driver and is the main concern of our paper. In this paper, we develop a drowsiness detection system that will accurately monitor the open or closed state of the driver’s eyes in real-time.
2 Simulation and Analysis of 27- Level Hybrid H-Bridge Multilevel Inverter for PV System
S.Priyanga, M.Valan Rajkumar, J.Chandramohan, G.Vidhya Krishnan
Abstract - In this paper, photovoltaic array and hybrid H-bridge multilevel inverter is studied and new model is simulated to prove the performance of the PV system and decrease the complexity and total cost of the inverter. A hybrid H-bridge multilevel inverter is preferred over all other topologies as it requires less number of switches by which high number of voltage levels is obtained and also reduced THD. Here simulated output is analyzed to improve the performance of inverter with 27 level. The modeling and simulation for the above systems is performed in MATLAB and the generated output voltage is analyzed.
3 Personal Authentication Technique with Human Iris Recognition using Wavelet Transform and Coding
Wen-Shiung Chen, Kun-Huei Chih
Abstract - This paper presents a biometric recognition system based on the iris of a human eye using wavelet transform. The proposed system includes three modules: image preprocessing, feature extraction, and recognition modules. Image preprocessing module uses some image processing algorithms to localize the region of interest of iris from the input image. The feature extraction module adopts the gradient direction (i.e., angle) of wavelet transform vector as the discriminating texture features. The system encodes the features to generate its iris feature codes by using two efficient coding techniques: binary Gray encoding and delta modulation. Finally, the system applies these feature codes for iris matching in recognition module. The experimental results show that the system has an encouraging performance on the CASIA database (including 756 images from 108 classes). The recognition rates up to 95.27%, 95.62%, and 96.21%, respectively, by using different coding methods are achieved. Even under the circumstance of false acceptance rate (FAR) 0%, the system still approaches the recognition rates above 90% (acceptance of authentic, AA). This paper analyzes the results of the experiments to verify the related inferences of the proposed system and provides useful information for further work.
4 Investigating the Relation between Organizational Citizen Behavior and Organizational Commitment and Dimensions of Organization Performance
Mohamad Mehdi Parhizgar, Moslem Soleymanpour
Abstract - Today, managers have found that regardless of the organization role and position, organization performance improvement without paying attention to unobservable assessments like organizational citizen behavior and organizational commitment will not be possible. Therefore, the current study was done with the aim of investigating and recognizing the relation between organizational citizen behavior and organizational commitment. This research from the point view of its practical goal and method is a description correlation type. The statistical society for this research is the municipality official staff in orumia and the sample size using the Morgan table is 234 people. We used the library and field studies and document analysis to collect the data. The data collecting tool in this research is questionnaire which is distributed using simple random sampling method. The content validity of the questionnaire was determined by professors. We also used the Cronbach alpha coefficient to evaluate the questionnaire stability which equals to 0/91 for all three variables of organizational citizen behavior, organizational commitment and organizational performance. We used the structured equations and lisrel software to analyze the research data. The research findings suggest that the organizational citizen behavior has a positive and meaningful impact on organizational commitment and the organizational commitment has the same impact on organizational performance. Furthermore, the positive and meaningful impact of organizational commitment on organizational performance dimensions (financial, costumer, internal process and growth and learning) was confirmed.
5 Health Care Monitoring System in Internet of Things by Using RFID
R.Rubasri, D.Aravind, M.Sridhar, M.Valan Rajkumar
Abstract - Advances in information and communication technologies have led to the emergence of Internet of Things. In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management. The Radio-Frequency Identification technology is one of the core technologies of IOT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IOT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed system.

* Remaining papers are under processing

Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com


COPYRIGHT © EverScience Publications