Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 6, Issue 6, June (2018)

S.No Title & Authors Full Text
1 Driver Drowsiness Detection System using Image Processing Technique by the Human Visual System
R.Sasikala, S.Suresh, J.Chandramohan, M.Valanrajkumar
Abstract - The purpose of this paper was to device a way to alert drowsy drivers in the act of driving. One of the causes of vehicle accidents comes from drowsiness of the driver. In recent years, we have used many technologies to detect the drowsiness of a driver in the field of accident avoidance system. To develop such a system we need to install some hardware components like camera inside the vehicle, which can capture the image of the driver at a fixed interval, and an alarm system, which will alert the driver after detecting his/her level of drowsiness and in the next level it will stop the vehicle automatically. Now apart from these hardware components, we need a software part also, which can detect the level of drowsiness of the driver and is the main concern of our paper. In this paper, we develop a drowsiness detection system that will accurately monitor the open or closed state of the driver’s eyes in real-time.
Download
2 Simulation and Analysis of 27- Level Hybrid H-Bridge Multilevel Inverter for PV System
S.Priyanga, M.Valan Rajkumar, J.Chandramohan, G.Vidhya Krishnan
Abstract - In this paper, photovoltaic array and hybrid H-bridge multilevel inverter is studied and new model is simulated to prove the performance of the PV system and decrease the complexity and total cost of the inverter. A hybrid H-bridge multilevel inverter is preferred over all other topologies as it requires less number of switches by which high number of voltage levels is obtained and also reduced THD. Here simulated output is analyzed to improve the performance of inverter with 27 level. The modeling and simulation for the above systems is performed in MATLAB and the generated output voltage is analyzed.
Download
3 Personal Authentication Technique with Human Iris Recognition using Wavelet Transform and Coding
Wen-Shiung Chen, Kun-Huei Chih
Abstract - This paper presents a biometric recognition system based on the iris of a human eye using wavelet transform. The proposed system includes three modules: image preprocessing, feature extraction, and recognition modules. Image preprocessing module uses some image processing algorithms to localize the region of interest of iris from the input image. The feature extraction module adopts the gradient direction (i.e., angle) of wavelet transform vector as the discriminating texture features. The system encodes the features to generate its iris feature codes by using two efficient coding techniques: binary Gray encoding and delta modulation. Finally, the system applies these feature codes for iris matching in recognition module. The experimental results show that the system has an encouraging performance on the CASIA database (including 756 images from 108 classes). The recognition rates up to 95.27%, 95.62%, and 96.21%, respectively, by using different coding methods are achieved. Even under the circumstance of false acceptance rate (FAR) 0%, the system still approaches the recognition rates above 90% (acceptance of authentic, AA). This paper analyzes the results of the experiments to verify the related inferences of the proposed system and provides useful information for further work.
Download
4 Investigating the Relation between Organizational Citizen Behavior and Organizational Commitment and Dimensions of Organization Performance
Mohamad Mehdi Parhizgar, Moslem Soleymanpour
Abstract - Today, managers have found that regardless of the organization role and position, organization performance improvement without paying attention to unobservable assessments like organizational citizen behavior and organizational commitment will not be possible. Therefore, the current study was done with the aim of investigating and recognizing the relation between organizational citizen behavior and organizational commitment. This research from the point view of its practical goal and method is a description correlation type. The statistical society for this research is the municipality official staff in orumia and the sample size using the Morgan table is 234 people. We used the library and field studies and document analysis to collect the data. The data collecting tool in this research is questionnaire which is distributed using simple random sampling method. The content validity of the questionnaire was determined by professors. We also used the Cronbach alpha coefficient to evaluate the questionnaire stability which equals to 0/91 for all three variables of organizational citizen behavior, organizational commitment and organizational performance. We used the structured equations and lisrel software to analyze the research data. The research findings suggest that the organizational citizen behavior has a positive and meaningful impact on organizational commitment and the organizational commitment has the same impact on organizational performance. Furthermore, the positive and meaningful impact of organizational commitment on organizational performance dimensions (financial, costumer, internal process and growth and learning) was confirmed.
Download
5 Health Care Monitoring System in Internet of Things by Using RFID
R.Rubasri, D.Aravind, M.Sridhar, M.Valan Rajkumar
Abstract - Advances in information and communication technologies have led to the emergence of Internet of Things. In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management. The Radio-Frequency Identification technology is one of the core technologies of IOT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IOT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed system.
Download
6 Minimal Cost K-Anonymization Techniques for Securing Sensitive Information
Teshu Knat Parkar, Yamini Chouhan, Samta Gajbhiya
Abstract - There is increasing pressure to share social network data and even make it openly accessible. In any case, such revelations of individual medical data raise genuine security concerns. To mitigate such concerns, it is conceivable to anonymize the information before exposure. One well known anonymization approach is k-namelessness. There have been no assessments of the real re-distinguishing proof likelihood of k-anonymized informational datasets. In this paper, we shows two Anonymization systems for including vertices and edges for covering up valuable data. The calculation for including edges executes speeder when contrasted with calculation for including vertices yet concealing data capacity is more in vertices including calculation since it include vertices inferred that it additionally include edges so it turns out to be more strong.
Download
7 Video Watermarking Using Hybrid SVD-DWT
Haweez Showkat
Abstract - Developing a robust method for watermarking is one of the sought after research problems in today’s scenario of the sought after research problems in today’s scenario,due to extensive violations in copyright protection and exponential change in multimedia .So to solve this problem I present a semiblind video watermarking technique which uses two images, fused using stationary wavelet transform (SWT) for watermarking. Then I use two level Discrete Wavelet Transform (DWT) to transform the fused watermark and cover video frames Singular Value Decomposition (SVD) is used to decompose the cover frames of the video where watermark is embedded using lower and middle bands of cover video and the lower sub-bands of fused watermark. The whole watermark isn’t required during extraction on the receiving end. This methodology has been implemented on MATLAB prototype. The technique is evaluated with the help of PSNR (peak signal to noise ratio) and CC (correlation coefficient), results show that it outperforms some earlier used techniques.
Download
8 Dealing with Mobile Ad-Hoc Networks with Optimized Permission Based Mutual Exclusion Algorithm
Sanjida Singhani, Vikas Wasson
Abstract - The paper presents a proposal for the optimized total number of messages exchanged in permission based algorithm. In order to achieve it, a new message known as Hold message has been used. Additionally, a timestamp priority has been utilized in order to reduce the number of sites to which hold message is sent. With this, the parameter, t*n, will get optimized reducing the total number of messages exchanged in the proposed algorithm. The paper also aims at discussing the correctness proofs for static analysis of the algorithm. Umpteen DME protocols have been designed and implemented in order to achieve the optimization of various DME parameters, viz., liveness, fairness, message complexity and safety. Most of the previous approaches lacked message complexity to which our proposal suggests to achieve optimized total number of exchanged messages.
Download
9 Investigating the Role of Border Markets in Economical and Social Development of the Cities in Neighborhood (Case Study: the Border Market of Incheh Borun)
Mirza Hasan Hosseini, Seyed Ebrahim Miridozeini
Abstract - Many economic and social experts and planners believe that for realizing the sustainable development that warrantees identity reinforcement, authority and national security, it is essential to put the priority on faraway and deprived areas at national level. While the geographical separation of border areas and their lack of development in economical, social and cultural dimensions is one of the most major factors that prevent them to reach this goal. Meanwhile, many experts believe that border markets are one of the effective steps in order to keep population and make employment in border areas. The current study is done with the aim of investigating and explaining the border market role in the economical and social development of the neighborhood and the case study is the border market of Incheh Borun in Golestan province. The research method in this study is descriptive analyzes and the data collecting is done using library and field resources (interview and questionnaire). The findings show that although the establishment and activities of the market under the study has mostly provided improvement and increase in the intended indicators specially in economical dimension (income, employment and…), the performance of this market in all dimensions and indicators has not been perfect or expected and it shows the significance of local and regional authorities’ comprehensive planning and policy in order to reach sustainable development in border areas.
Download





Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors in the recent upcoming issue.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: editor@ijeter.everscience.org

Copyright

COPYRIGHT © EverScience Publications