Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 4, Issue 5, May (2016)

S.No Title & Authors Full Text
1 Crime Recognition in Skin Images Using Vein Patterns
P.Sukumar, Dr.S.Ravi
Abstract – Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) were recently introduced as a biometric trait for identification in the cases in which the evidence images show only the nonfacial body parts of the criminals or victims, such as in child sexual abuse and riots.As manual RPPVSM identification is tiring and time-consuming, an automated RPPVSM identification system is proposed in this projects.The system comprises skin segmentation, RPPVSM detection, and RPPVSM matching algorithms.To handle identification with limited numbers of RPPVSM, a fusion scheme with inferred vein patterns is also proposed. To the best of our knowledge, this is the first work on automated identification in color skin images based on nonfacial skin marks and fusion with inferred vein patterns in forensic settings.
Download
2 Cropping OF Weeds in the Farm Field by Image Acquisition and Processing Methods
P.Sukumar, Dr.S.Ravi
Abstract – Agriculture plays one of the most important role in economy and therefore lowering the costs and improving the quality of agricultural products is highly demanded. A weed is a plant which grows in wrong place at the wrong time and doing more harm than good. Weed competes with the crops for water, light, nutrients and space, and therefore it reduces crop yields. In olden method, the weeds can be destroyed by using the controlled spray of herbicides. A major problem is that the heavy herbicide usage causes some of more prolific weeds becoming more resistant to the regular herbicides and therefore more powerful and more expensive options are being pursued. To overcome such problems with aiming at the reduction of herbicide usage, this proposed system focuses on developing a robotic system which can detect and mapping the weeds and then clearing of the weeds. And by this view, our proposed system provides a key solution to improve its quality by means of controlling the weeds and to increase the yield of crops in the farm field by mechanical cropping. The work is performed using 10 images and in this work the image is classified into pre-processed image and test image. Thereby, the needed solution is recovered in our proposed system. The proposed system can detect the early level of weeds in the farm fields with the accuracy of 85%. And so on, our system provides the following operation to cut the weeds in the farm field.
Download
3 IOT Based Efficient Vehicle Location Help Line System Using NFC
P.Sukumar, Dr.S.Ravi
Abstract – Now-a-days increasing density of vehicles on road is becoming the problem for the traffic control. Ultimately arising obstacle in the managing and tracking of the vehicle. Because of the problem state, it is necessary for every organizations and individuals to track the vehicle. People will monitor and track their vehicles for the safety concerns with the help of our project. Public transport and private buses tracked to citizens with traffic and transportation details like location, crowd, etc. The proposed system will be used for the positioning of the bus from remote location. Once the NFC tag is scanned and identified, it generates the code corresponding to the location it reached and updates to the end user, when he uses to view the last location of the bus. As before GPS systems are used which locates the bus only in the metropolitan cities and once it deviates from the location, the information will be lost. Here, in this project a NFC reader is fixed in every bus stop and once the bus crosses the stopping the microcontroller updates the location to the IOT and once we access the page it shows the last location and the time it has crossed the location, so that we can update the time the bus will reach us.
Download
4 Weed Detection Using Image Processing By Clustering Analysis
P.Sukumar, Dr.S.Ravi
Abstract – Agriculture plays one of the most important role in economy and therefore lowering the costs and improving the quality of agricultural products is highly demanded. A weed is a plant which grows in wrong place at the wrong time and doing more harm than good. Weed competes with the crops for water, light, nutrients and space, and therefore it reduces crop yields. In olden method, the weeds can be destroyed by using the controlled spray of herbicides. A major problem is that the heavy herbicide usage causes some of more prolific weeds becoming more resistant to the regular herbicides and therefore more powerful and more expensive options are being pursued. To overcome such problems with aiming at the reduction of herbicide usage, this proposed system focuses on developing a robotic system which can detect and mapping the weeds and then clearing of the weeds. And by this view, our proposed system provides a key solution to improve its quality by means of controlling the weeds and to increase the yield of crops in the farm field by mechanical cropping. The work is performed using 5 images and in this work the image is classified into pre-processed image and test image. Thereby, the needed solution is recovered in our proposed system. The proposed system can detect the early level of weeds in the farm fields with the accuracy of 75%. And so on, our system provides the following operation to cut the weeds in the farm field.
Download
5 An Elaborated Study of High Performance Concrete Structures Built
K. Parthasarathi, K.R. Keerthiraman
Abstract – In the search for durability, researchers and in other countries sought for higher performance materials. Technology from other countries, notably France, Norway, Japan and Germany, was incorporated into developments. High Performance Concrete (HPC) was included in this research. With the establishment in 1990, a co-ordinated and concentrated programme of research commenced. In 1994, this programme expanded to include demonstration projects to implement HPC technology on construction sites. Technology Transfer was a primary goal of CC. Many seminars, workshops and technology transfer days were held across Canada, by CC alone, in co-operation with American Concrete Institute (ACI) Chapters, the Cement Association of Canada (CAC) and its member companies, and for specific entities such as Provincial Highway Departments and Cities. Between 1990 and 2000, CC researchers published over 400 Papers in scientific journals. It seemed appropriate, as the old millennium ended, to assess the practice in the use of HPC over the past 10 years. The extent of its use, the varying specifications, results, economics and problems encountered have been reviewed. Looking ahead, areas for ongoing research and development have been identified. The study demonstrates that, for those who have correctly implemented this technology, HPC is the high quality concrete of choice for high strength, durability and optimum lifecycle costs.
Download
6 Investigation on Strength and Durability of Slurry Infiltrated Fibrous Concrete
M. Ayesha Kani, B. Jose Ravindra Raj
Abstract – Slurry-infiltrated fibrous concrete (SIFCON) can be considered as a special type of fiber concrete with high fiber content. It is different from normal fibre reinforced concrete (FRC) in two aspects, viz., the fiber content and method of production. The matrix usually consists of cement slurry or flowing mortar. This slurry-based matrix must consist of fine particles to infiltrate the fibre network. Slurry infiltrated fibrous concrete is one of the new addition to the high performance concrete. Since, the usage of very high amount of cement in SIFCON not only affects the production costs, but also has negative effects on the heat of hydration and may cause shrinkage problems. Replacing the cement with supplementary cementitious materials seems to be a feasible solution to overcome these problems. These materials modify the microstructure of concrete and reduce its permeability thereby reducing the penetration of water and water-borne salts into concrete. The main objective of this project is to determine the effect of silica fume and ground granulated blast furnace slag on compressive strength, split tensile strength, flexural strength and durability behaviour on slurry infiltrated fibrous concrete. An experimental program was carried out with 10% fiber content and by replacing the cement with different percentages of silica fume (5%,10%,15%,20%,25%) and GGBFS (15%,30%,45%,60%,75%).The test result reveals that the incorporation of cementitious materials improve the strength as well as the durability nature of SIFCON. Also, the GGBFS replacement exhibit excellent performance in strength and durability when compared to silica fume replacement.
Download
7 Experimental Analysis of Durability Characteristics of Fly Ash and Welding slag based Geo-polymer concrete with Recycled Aggregate
P. Kanmani, R.Vijayasarathy
Abstract – Concrete is the most widely used construction material which required large quantities of Portland cement. The production of Ordinary Portland cement causes pollution to the environment, due to the emission of CO2 and also large amount of natural resources is consumed for the cement production. The large global production of flyash and rapid advances in Geopolymer technology leads to the alternate material for OPC that is Geopolymer concrete (GPC). Geopolymers are showing great potential and several researchers have critically examined the various aspects of their viability as binder material. Increase in population growth is leading to increase in various demands like cultivation, transportation, construction etc. Nowadays, there is a tremendous increase in the demand for construction works like residential buildings, bridges, dams, roads etc. and because of this increase in demand the availability of sources for concrete ingredients is getting difficult. Hence people are looking for alternative sources for the concrete ingredients in order to full fill their requirements. This project is focused on the feasibility study of Fly ash and Welding slag based Geopolymer Concrete with Recycled Aggregate to find durability characteristics to promote the applications of green materials in civil infrastructures. The main objective of this investigation is to find out optimum mix design of geopolymer concrete specimens. Concrete composing three different molar of sodium hydroxide (NaOH) which is 8M, 10M and 12M were adopted. A series of tests conducted to determine the durability characteristics like sorptivity, porosity, carbonation and water absorption of Geopolymer concrete. Natural coarse aggregates were replaced with 10% of Recycled aggregates and welding slag was used as fine aggregates. Based on the experimental results, the fly ash and welding slag based Geopolymer concrete with three different molarities showing good durability results compare to conventional concrete. From the results of water absorption, porosity and sorptivity study, the best mix combination is obtained in GPC12M. However, GPC8M and GPC10M also having good durability characteristics.
Download
8 Novel Framework of Hyper Image Encryption Algorithm
Dipak Aher, Archana Chattar, Nishigandha Walunj, Rupali Yede
Abstract – Security management is main goal of this paper. This may offer authentication of users, and integrity, exactitude and safety of pictures that is peregrinating over net. Moreover, Associate in nursing image-predicated knowledge needs additional effort throughout secret writing and secret writing. The planned design for secret writing and secret writing of a picture utilizing felicitous utilize-defined secret is developed with an equivalent objective. During this paper, we have a tendency to introduce Associate in nursing early permutation technique predicated on the accumulation of image permutation Associate in nursing an early developed secret writing rule referred to as “Hyper Image secret writing rule (HIEA)”. From the culled image we are going to binary price blocks, which can be set up into a permuted image utilizing a permutation method, and so the engendered image are encrypted utilizing the “Hyper Image secret writing Algorithm(HIEA)” rule.
Download
9 Detection and Preventions of Data Leakage in Cloud Computing Environment
Prashant Ingole, Dinesh Jejurkar, Vishal Pawar, K. D. Tamhane
Abstract – In the recent years internet technologies has become the backbone of any business organization. These organizations utilize this facility to amend their efficiency by transferring data from one location to another. But, there are number of threats in transferring critical organizational data as any culprit employee may public this data. This quandary is kenned as data leakage quandary. In the proposed work, we are suggesting a model for data leakage quandary. In this model, our aim is to identify the culprit who has leaked the critical organizational data.
Download
10 Fuzzy logic controller based Current-Fed Quasi-Z-Source Inverter with Bidirectional Power Flow
Meianandhi.S, Jamuna.P
Abstract – This paper proposes a new controller design and realization of a high power current fed quasi Z source inverter with bidirectional power flow. A bidirectional active switch in the quasi Z source network improves the performance of the inverter under small inductance and low power factor. To maintain constant output fuzzy logic control technique is used in the closed loop. And also overall efficiency of the inverter is increased. The circuit analysis shows that with a bidirectional switch in the current fed quasi Z source inverter network, the performance of the inverter under small inductance and low power factor can be improved. Based on the circuit analysis, a small signal model of the current fed BQ-ZSI is derived, which indicates that the circuit is prone to oscillate when there is disturbance on the dc input voltage.
Download
11 Study of PMEDM Efficiency on HCHCr Steel using Silicon Powder in Dielectric Fluid
Naveen Kumar, Preetam Ale, Nitesh Kumar, Sunny Sharma
Abstract – In this present work, study has been made to optimize the process parameters of powder mixed electrical discharge machining (PMEDM). Addition of optimal amount of powder in dielectric fluid of EDM influence the Material Removal Rate and lower the Tool Wear Rate of workpiece. Current, pulse on, pulse off and powder concentration were chosen variable to study the process performance.Taguchi Orthogonal Array L9 has been used as a DOE (Design of Experiment) method to plan and analyses the experiments. 5 gm/l and 10 gm/l of Silicon powder (200 mesh size) has been used in EDM oil. It has been investigated that current, pulse on time and powder concentration are the most significant factor that influence the output response MRR and TWR. Increase in powder concentration improves process parameter but higher amount of concentration results in arcing which gives undesirable machining results. High-Carbon High-Chromium (HCHCr) steel has been selected as workpiece material and Tungsten Copper is used as electrode.
Download
12 Utilization of Waste Plastics & Carbon Rubber in Bitumen
S.Sivarasan, V.Prabhu
Abstract – This project is a comparative of normal bitumen and (waste plastic & carbon rubber) added bitumen. This helps in increasing the strength of bitumen by addition of non- degradable plastic waste & carbon rubber which provides reduction in the percentage of bitumen. waste plastics like polythene bags, milk covers & carbon rubber like waste vehicles tire’s from various sources are collected, the cleaned and dried for further processing. waste plastic is then processed in shredding machine and the shredded plastic & carbon rubber waste tire’s is making powder form using machine and then mixed with the hot bitumen(60/70)grad by 5%,7%,9%. The normal bitumen and waste plastic added bitumen is tested as per specifications in IRC: SP: 53:2010, IS 3370. The various tests are conducted during this project on bitumen specific gravity, ductility, softening point, Marshall Stability.
Download
13 Big Data Health Care Monitoring
D.Meena, G.Uma Devi
Abstract – Context aware monitoring is a technology which providers personalized health care services. The large amount of data generated is stored in cloud repositories. Cloud means accessing data from a remote machine. We can access the data anywhere form the world of we store it in cloud. The data will be encrypted and then stored in cloud, as they data’s of patients are very sensitive. The patients will be provided with the key to decrypt the data and see the details. We use this to identify patient’s abnormal conditions in the sugar heart rate (HR) and blood pressure (BP) level.We also use big data in our project. There are three type of format: structured,un-structured and semi structured. In this paper we are using un-structured format.
Download
14 Diagnosis of Diabetes Using Tongue Color Analysis
R.Banu, G.Uma Devi
Abstract – The human tongue plays an important role in detecting various diseases. A feature of the tongue is extracted based on its color, texture and geometry help in knowing the disease. Color feature extraction is one of the most important parameter useful in diagnosing diseases. The proposed method extracts the color features of the tongue using the color gamut in which 12 colors represent features of the tongue.
Download
15 Implementation of LFSR Reseeding Technique in NLFSR Based Test Pattern on FPGA
N.Gayathri, V.Sanjivee
Abstract – This project describes a Pseudorandom test pattern generator (PRPG) with Non-Linear Feedback shift register (NLFSR) .It is mainly suited for Built in self Test (BIST) circuits in order to achieve low power. The LFSR Reseeding techniques is implemented along with NLFSR to generate new test patterns and it is used to drive the Phase shifters then it produces the binary sequences with pre-selected toggling activities(PRESTO).This technique is further preferred to achieve desired fault coverage and low power. The Proposed scheme is used to reduce the overall area of the architecture and it is used for industrial designs which are reported in experimental results.
Download
16 FPGA Implementation of Folding Architecture in Humming bird Algorithm for Reducing Area and High Throughput
R.Tharani, G.Kavitha
Abstract – Hummingbird is a new ultra light weight cryptography algorithm target for resources constrained devices like RFID tag, smart card and wireless sensor. In this project we design the hardware implementation of humming bird cryptography algorithm based on the folding Architecture in Spartan 3 FPGAs. Humming bird is to meet stringent response of area and power requirements which can provide the design security with a small block size. This algorithm resists to the most common attacks like algebraic attack, linear and differential cryptanalysis. We investigate for integrating humming bird into a privacy preserving and authentication protocol. In this technique to reduce the clock cycle to encryption and decryption the message. In this work, an enhanced hardware implementation of the humming bird cryptography algorithm for reduces area and high throughput for low cost Spartan 3E family.
Download
17 Enhanced QOS aware Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks
Dr. M. Sengaliappan, R. Neelaveni
Abstract – The proposed system develops and implements an efficient QOS based distributed routing algorithm and Q-ORP (QOS based Opportunistic Routing protocol) for solving the routing issues in wireless networks. The work extends the regional Probe approach in the network with dynamic delay calculation. The delay calculation helps to know the overall cost of the link. This computes the queue delay, propagation and transmission delay. Implementation of the protocol assists to reduce the complexity of calculating load of every links over a period of time. Finally the proposed protocol Q-ORP works with the above QOS metrics such as follows. 1) Energy Equivalent Link (EEL) selection algorithm which guarantees QOS in opportunistic path. 2) A distributed packet scheduling algorithm to further reduce transmission delay, propagation and queuing delay 3) A mobility aware relay selection algorithm that adaptively adjusts segment size according to node mobility in order to reduce transmission time, 4) A data redundancy elimination-based transmission algorithm to eliminate the redundant data to further improve the transmission QoS. The proposed distributed enhanced routing approaches which will reduce link failures. Every link will be analyzed and updated in the routing table using the Q-ORP frequently. The proposed protocol adopts the resource reservation based QOS routing scheme. In this proposal a QOS-Oriented Distributed Opportunistic routing protocol (Q-ORP) to enhance the QoS support capability of wireless sensor networks. The proposed protocol can provide high QoS performance in terms of overhead, transmission delay, propagation delay, queuing delay, mobility-resilience, traffic reduction, and scalability.
Download
18 Ancient Document Images Enhancement Using Phase Based Binarization
J.Rajalakshmi, S.Venkateswaran
Abstract – In this paper, we present a phase-based binarization model for degraded document images, also a post processing method that can improve any binarization method and a ground truth generation tool. Usually, many binarization techniques are implemented in the literature for different types of binarization problems. It include an adaptive image contrast based document image binarization technique that is tolerant to different type of document degradation such as uneven illumination document smear involving smudging of text, seeping of ink to the back side of page, degradation of paper ink because of aging and so on similar reasons. An objective evaluation based methodology for handwritten document image binarization techniques that aims to reduce the human involvement in the ground truth construction and consecutive testing Image binarization is the method of separation of pixel values into dual collections, foreground for black and background for white. In images the grayscale and color images into black and white images. Ancient and degraded document improvement using image processing is attracting many researchers in the recent period. Binarization is very popular cleaning the document for further processing.
Download
19 A Novel Architecture of 8K-Point FFT Processor by Multiplier-Less Radix-8 FFT
T.G.Dhaarani, P.Kokila, P.Premkumar, S.Nandhini
Abstract – In this paper an implementation for 8K-point fast Fourier transform (FFT) processor architecture for OFDM (Orthogonal Frequency Division Multiplexing) of DVB-T(Digital Video Broadcasting Terrestrial) is proposed based on nonbutterfly multiplier-less radix-8 FFT architecture. Distributed Arithmetic (DA) is used to implement basic 8-point FFTs, where hardware cost of complex multipliers and adders can be reduced. The twiddle multiplications are performed by CORDIC multipliers. The proposed architecture gives high-speed processing speed, which may be attractive for real-time DVB-T systems.
Download
20 The Evolution of Wimax – Features and Applications
Sukhdeep Kaur, Jaipreet Kaur, Manjit Sandhu
Abstract – Wimax is used for providing broadband using wireless medium mainly at 2.5GHz, 3.5GHz and 5.8GHz radio frequencies. It is also known as 4G technology. It delivers about 4 times fast internet compared to its 3G counterpart. OFDM technique has increased the speed as it carries multiple carriers, each carrying more than one data bits based on modulation techniques (QPSK, 16QAM). The carriers are concisely packed together to save bandwidth. Intel is behind the development and proliferation of Wimax throughout the world. This paper reviews the basic architecture, features, advantages, limitations and some of the applications also. The comparison of Wimax with edge technologies is also discussed.
Download
21 Design And Implementation of 32 Bit ALU Using Look Ahead Clock Gating Logic
D.Nirosha, T.Thangam
Abstract – Any type of digital architecture is modified by using the VLSI technology. In digital systems, clock gating is the best method to reduce consumption of power. As power consumption plays an important role in any integrated circuit. This methodology is mainly used in all type of real world applications and this technology is to enhance the internal architecture level. There are 3 gating methods. The most popularly known gating method is synthesis based. Unfortunately, the Synthetic based gating method leaves the majority of the clock pulses driving the flip flops are terminated. A data driven method halts most of the clock pulses and produces higher power savings, but its application is complex and dependent. The Auto-Gated Flip Flops (AGFF) is the third method which yields moderately lower power saving. This paper introduces a novel Look-Ahead Clock Gating (LACG) method which is the combination of all the three gating methods. It calculates the clock enabling signals of every flip flops one cycle from this time, which it depends on the FFs cycle data at present. In a CPU, the most commonly edited modules are the ALU. During most instruction executions, it is employed. Therefore, a major concern in the ALU is the consumption of power. This paper motivates to reduce the ALU architecture for many digital applications and to improve the internal process in ALU architecture with look ahead clock gating approach. Reduction of delay and power for the data path PE unit in 32 bit ALU architecture.
Download
22 An Experimental Investigation of Properties of Cement Concrete on Addition of Different Percentage of Glass Fibre and SBR-latex
Mohammad Imran, Imran Alam, Mohd Kashif khan
Abstract – Glass Fibre Reinforced Concrete is recent introduction in the field of concrete technology Glass fibre–reinforced concrete (GFRC) is a type of concrete which basically consists of a cementious matrix composed of cement, sand, coarse aggregate, water, polymer and admixtures, in which short length glass fibres are dispersed. This journal documents the effects of using glass fibres in Styrene Butadiene Rubber (SBR) latex modified concrete. The study was carried out to record the different properties of glass fibre reinforced latex modified concrete such as compressive strength, flexural strength and split tensile strength. Latex modified concrete is defined as Portland cement and aggregate combined at the time of mixing with polymers that are dispersed in water. This dispersion is called as latex. Polymer when used as an admixture can improve properties like higher strength and lower water permeability than the conventional concrete. The polymer concrete specimens with and without fibres and latex were cast and tested to watch the improvement of certain mechanical and physical properties like compressive strengths, flexural strengths, tensile strengths and workability. Styrene Butadiene Rubber Latex polymer and Cem-Fill Anti-Crack, HD-12mm, AR Glass fibres have been used for our study. The percentage of Glass fibre used were 0%,0.03%,0.06%,0.10%. The fraction of glass fibre which gave the best result was taken and latex was varied in percentage 5%, 10%, 15% to obtain maximum strength. In all total 21 specimen cubes (150mm X 150 mm X 150 mm), 21 beam (500mm X 100mm X 100mm) and 21 cylinder specimens (150 mm X 300 mm) were made. The hardened properties of concrete were tested at 28th days.
Download
23 Providing Confidentiality, Integrity and Atomicity for data storage in the cloud storage: A Survey
Akanksha Bansal, Arun Agrawal
Abstract – Cloud computing is only of the most growing area of research, there are lots of work in cloud like security and data base. In this paper we study about cloud architecture or cloud security concerns and their solution at the completion of paper we compare DES or RSA and then compare the result.We propose a secure the Cloud means secure the treatments and storage “databases hosted by the Cloud provider”. Security goals of data include three points namely: Confidentiality, Integrity, and Availability (CIA). Confidentiality of data in the cloud is accomplished by encryption/ Decryption process.
Download
24 A Study of Mobility Speed on Different Traffic Patterns in MANET
Shweta Tripathi, Ajay Kumar, Shailesh Kumar Patel
Abstract – In this work we are studying the performance of three different routing protocols Ad-Hoc On-Demand Distance Vector Routing Protocol (AODV), Dynamic Source Routing Protocol (DSR) and Wireless routing protocol (WRP) of Mobile Ad-hoc Network based upon two different Mobility Models: Random Waypoint Model (RWP) and Reference Point Group Mobility Model (RPGM) with varying Speed of the mobile nodes in different Traffic Patterns. We have considered CBR and FTP Traffic Pattern. The studies have been carried out by evaluating the value of Throughput, Average end to end delay and Packet Delivery Ratio (PDR).
Download
25 Evaluation of Solid Waste Collection and Segregation: A Case Study of Integral University Campus, Lucknow
Uma Prasad Pandey, Rajiv Banerjee, Neha Mumtaj, Tabish Izhar
Abstract – A Solid Waste Management (SWM) may be defined as the discipline associated with the control of generation, storage, collection, transfer, transportation and disposal of Solid Waste (SW) in such a manner that is in accordance with the best principles of public health, economic, engineering, conservation and other environmental consideration that is also responsible for public attitude. Various studies reveal that about 90% of MSW is disposed of unscientifically in open dumps and landfills creating a lot of problems to public health and environment. In the present study of Integral University (IU) Campus, Lucknow, an attempt has been made to provide a comprehensive review of the finding problems and prospects of solid waste. A detailed investigation was made regarding the methods of practice associated with sources, quantity generated, collection, transportation, storage, treatment and disposal of SW in IU Campus. To achieve this goal the data regarding SWM in IU Campus was obtained through questionnaire, individual field visits and interaction with concern authorities. Photographic evidences were also made about the current practice adopting towards different phases of SWM in the campus.
Download
26 Development and Fabrication of Pedal Operated Multi-Operational Machine
Akshay N. Shirbhate, Alok S. Sharma, Palash R. Shrirao, Kunal H. Sharma, Vijay B. Talan, Chetan S. Tayde
Abstract – This project represents the concept of Human Powered Multi-Operational Machine mainly carried out for production based industries. Industries are basically meant for Production of useful goods and services at low production cost, machinery cost and low inventory cost. Today in this world every task have been made quicker and fast due to technology advancement but this advancement also demands huge investments and expenditure, every industry desires to make high productivity rate maintaining the quality and standard of the product at low average cost. We have developed a conceptual model of a machine which would be capable of performing different operation simultaneously and individually also and it should be economically efficient .This pedal operated multi-operational machine can be used in remote places where electricity is irregular or insufficient. It is designed as a portable one which can be used for cutting operation using hacksaw assembly, grinding and buffing operation using grinding and buffing assembly, also generation of electrical energy using (dc generator) assembly and water lifting using centrifugal pump assembly. It can be used for cutting materials like wood, PVC, metal pipes and bars plywoods. The material can be cut without any external energy like fuel or current. Since machine uses no electric power and fuel, this is very cheap. Energy is the most vital aspect in the development of modern technological civilization. The system is also useful for the work- out or exercise purpose because pedaling which will act as a health exercise and also doing a useful work and this machine promotes the use of conventional energy sources.
Download
27 A Low Power S-Box Implementation for AES Using Power-Gated PLA on Altera
Kalaiselvie.C.M, kavitha.D
Abstract – This paper present a low power custom hardware implementation of Rijndael S-BOX for Advanced Encryption Standard using power-gating and PLA design techniques to reduce power and area. AES is the private-key cryptography. The proposed S-BOX system is implemented using the multiplexer technique to reduce the area and logical elements. The proposed scheme is used for military applications and governmental ID.
Download
28 Strategies for Achieving Unification in Developing Information Systems
Satinder Kaur, Simmi Bagga
Abstract – Nowadays the information system is the heart of every successful project in disciplines of business, technology, engineering and management. Whole members of team can properly coordinate only if they can share right information at right time. But designing an information system which can satisfy the needs of each member of project is very ridicule task. This is due to the diversity of disciplines of project team members which have great variations in terminology. Another problem is due to growing of new technologies as young members accept the new techniques and methods very easily where as old ones rely more on previous methods. Also, there is lack of universality rules for design of information systems but preliminary studies conclude that it is better to use process oriented approach for information system design [1]. This paper discusses the different approaches for design of information systems with their merits and demerits. Finally, it concludes that the recent method i.e. networked information systems with complete or partial virtualization is better for unification of development of information systems. It is based on SOA and WEB-oriented tools.
Download
29 Wearable Bio-Sensor System Using ZigBee Network for Patients and Health Monitoring
P.Sukumar, Dr.S.Ravi, K.Tamilselvan
Abstract – This paper describes a wearable sensors and ZigBee technology to take care patients. For health monitoring no need to admit in bed and their health status is viewed when they are in roaming too. The health parameters like heart rate, respiration rate, temperature level are taken into account. By means of sensors which are fixed in patients dress, the parameter values are obtained. These sensors signals are given to the signal-conditioning unit, because signals from sensors are AC and voltage level is not suitable for microcontroller. And it makes this signal to suitable for microcontroller. Signal from temperature sensor is analog signal so it is given to the microcontroller through Analog to digital converter. Microcontroller receives all signals from sensors and analyses the values. Using the display the medical instructions and other necessary information are displayed to the patients. Then this signal is given to the ZigBee transceiver. Therefore without disturbing the patient from the cabin itself doctor can monitor the patient. Simulations are carried out describing the patient health parameters in LabView and the result is viewed. This paper not only concentrates on the patients but also for normal persons (especially sports person) who can monitor the day to day health condition. It acts as dual purpose by means of patient monitoring as well as health monitoring for normal persons.
Download
30 Secured Wearable Bio-Sensor System Using ZigBee for Monitoring Sick Patients
P.Sukumar, Dr.S.Ravi, K.Tamilselvan
Abstract – The Proposed paper is the design of wearable bio sensor system using zigbee. This system tries to build that analysis of health parameters like heart rate, respiration rate and temperature. As these parameters are basic for any measurements and common for all type of treatments. By analyzing these parameters, the doctor may come to a decision. This wireless system is rapidly developing one. So, this system never affect the patients to stay in hospital to look over the health condition. This system is not only a patient monitoring system also normal human being also may use this. By regularly look over the health parameters, and according to the condition they may change their food habits and exercises. This avoid future problems like any kind of diseases. This system also immense to old people to monitor them. Now a day’s sports person also using these systems to monitor them, according to the result, they change their diet and exercise. In future, this kind of system is going to exist in all home and there is no need to spend a long time in the clinic.
Download
31 A Study on Effects and Awareness of Complete Ban of Plastic Carry Bags with Special Reference to Perundurai Block
S.Divakar, P.Jeevanantham, B. Girimurugan
Abstract – There has been on-going debate on the use of plastic/polythene bags across the world and many cities have banned or considered banning the use of this product. Polythene bags have today become the most visible indicator of environmental degradation as citizens’ associate polythene to environmental pollution on account of its prominence in the municipal waste stream. Polythene as a material is highly versatile, economical and convenient hence more acceptable to consumers resulting in increased consumption patterns over many years. While the consumption patterns have continued to grow the bags are also seen as one of the major sources of littering in cities and even rural areas. Most civic agencies in India have struggled hard to set up systems for collection and disposal of these bags but have found it extremely difficult to come up with any substantive solution towards managing this waste hence the conversation and debate on the use of polythene bags.
Download
32 A Study on Farmer’s Satisfaction towards Hybrid Seeds with Special Reference to Erode District
D. Saranya, S. Abhirami, B. Girimurugan
Abstract – The project has entitled as “A Study on Farmer’s Satisfaction towards Hybrid Seeds with special reference to Erode District”. This study carried out with the main objective to find out the farmers satisfaction towards hybrid seeds, in Modakurichi Region. Descriptive method is adopted for this study with convenient sampling methods. The sample size is taken 100 primary data is collected through structured questionnaires and secondary data was collected form documents, journals and magazines. The primary data was analyzed with the help of statistical tools as simple percentage analysis, chi-square and weighted average ranking. The finding tables about the fact, which was finding the analysis and interpretation. The suggestion and recommendation have the numbers of ideas to improve productivity of hybrid vegetables. The conclusion consists of the results of the study. Then the final art consists of bibliography and appendix.
Download
33 An Emprical Study on Stress Management in Police Officials with Special Reference to Erode District
M. Vijay, P. Mohan, B. Girimurugan
Abstract – Stress among police is often viewed as an unlucky, but expected part of police work. Police are like a real heroes, but most of people are unaware the amount of stress that police face every day. Police work involves protection of life, safeguarding property through vital patrol techniques, enforcement of laws and ordinances in the place for which the Police station is responsible. Police who are out in the street, every day during their duty are struggle police. They are the first’s line of protection between the criminals and the society. During their duty, unexpectedly they may encounter situations involving major crisis without any warning. There are several factors like 24 hours availability, administration problem were involved and make police as a most stressful job. This study basically deals with Tamil Nadu police department and the Tamil Nadu has a Police population ratio of 1: 632.
Download
34 Various MIMO Antenna Systems with Applications
Jaipreet Kaur, Manjit Sandhu, Sukhdeep Kaur
Abstract – Multiple Input Multiple Output (MIMO) transmission systems promise high data rates and a good reliability for a given signal to noise ratio and a fixed bandwidth. It offers significant capacity gains over traditional single-input single-output channels. The purpose of this paper is to do analyse the various existing types of MIMO systems and their applications with specifications. The comparative analysis of various types of MIMO system are studied in Single User MIMO (SU-MIMO) with Multi User MIMO (MUMIMO) and Open loop MIMO with Close loop MIMO system. MIMO applications are considered by exploring the main specifications of the IEEE industry standards like HSPA+ (3GPP Release 7/8), LTE (3GPP Release 8), WiMAX (802.16e- 2005), WLAN (802.11n).
Download
35 A Relative Study on Image Blending
Sujith Subbaiah P P, Vaishnav, Vidhyashree, Gurusiddayya Hiremath
Abstract – Image blending is a process of creating a set of discrete samples of a continuous, one-parameter family of images that links a pair of input images. Image blending has uses in a variety of computer graphics, cartoons and image processing applications. Image blending is to paste a source patch onto a objective image, which has received considerable attention. While gradient-domain blending is dominant. Experiments show that our blending fallouts are visually comparable to gradient-domain methods while possessing real-time performance. This method is applied for image stitching and object elimination. The key contribution of this survey work is studying how applying color and luminance compensation before Poisson blending improves the blending quality and processing speed of Poisson blending in long image sequences where colors and luminance contrast amongst source images, and also improves the quality of image labeling.
Download
36 Enhancing Security through Data Swapping and Shuffling Across the Servers in Cloud
Bindia
Abstract – The shuffle technique is used recently for organizing and accessing data in cloud. We use distributed data allocation among more than two independent servers. Dynamic re-allocation is done by swapping across the servers in such a way that accessing a given node implies re-allocating it to a different server. There is more protection that derives from the use of independent servers as compared to the use of one server. In this paper, we introduce shuffling technique for the use of multiple servers for storing data; introduce a new protection technique (shadow copy) and enhancing the original ones by operating in a distributed system.
Download
37 Stein’s Contribution to Contemporary Indian Architecture
Ar. Ghufran Ahmad Khan
Abstract – Stein was trained in pre-Bauhaus modernism which didn’t dismiss the past or qualities of culture or region. He worked in that magic moment literally building the new India right at its heart, New Delhi. What Stein achieved, in a way, was to bring his 'California Modern' into an Indian context, altering his design vocabulary by the observation of Indian life and construction systems. In Delhi, surrounding the IIC he continued to build a series of buildings which have become landmarks - the Ford Foundation, the United Nations, the World Wide Fund for Nature and most recently the huge India Habitat Centre. If anyone could match the Lodhis and their architecture, it is this series of buildings built by Joe through the 1960s and 1970s. Stein was trained in pre-Bauhaus modernism which didn’t dismiss the past or qualities of culture or region. He worked in that magic moment literally building the new India right at its heart, New Delhi. What Stein achieved, in a way, was to bring his 'California Modern' into an Indian context, altering his design vocabulary by the observation of Indian life and construction systems. In Delhi, surrounding the IIC he continued to build a series of buildings which have become landmarks - the Ford Foundation, the United Nations, the World Wide Fund for Nature and most recently the huge India Habitat Centre. If anyone could match the Lodhis and their architecture, it is this series of buildings built by Joe through the 1960s and 1970s. The sensitivity to detail, construction, material and texture of the buildings were matched by Margaret's equally careful attention to the furniture, the textiles, the plants and the seasonal flowerings of the bushes and trees. Joe's legacy is that of living architecture - human in scale with spaces which soothe and inspire. It is no surprise that four decades of India's cultural life have been nurtured at the IIC and at the Triveni Kala Sangam. He believed in incorporating regionalism in his designs which he believed was tied up closely with art and craft. He had the greatest respect for the skilled Indian mason and craftsman. However he never believed in going overboard with high cost external beautification.
Download
38 Study the Method of Controlling Bleeding in Concrete using Aluminium Powder
Anwar Ahmad, Dr. Syed Aqeel Ahmad, Mohd. Kashif Khan, Devendra Yadav
Abstract – Concrete is the most widely used construction material in the world. It is used in many different structures such as dam, pavement, building frame or bridge. Sometimes when access amount of water or appropriate mixture are used then possibility of bleeding in concrete is occurs. It is a common problem in the concrete. Bleeding of concrete may be defined as physical migration of water towards the surface of concrete. Due to the migration of water concrete loses its homogeneity and also responsible for permeability of concrete. For preventing of bleeding of concrete it is necessary that to use fine material in access amount. Bleeding is sometimes referred as water gain in the concrete. It is a particular form of segregation in which water is separated to the concrete and breaks the uniformity of concrete. This type of concrete is very weak in strength. In this investigation Aluminium powder is used for controlling the bleeding of concrete. It is a finer material and it is helpful in controlling the bleeding water of concrete. Aluminium powder is used in concrete as an Percentage addition with cement by weight. With the help of IS 9103 bleeding quantity of water is calculated.
Download
39 Implementation of FM0/Manchester Encoding and Systematic Codes on FPGA
Nithiyalakshmi.S, Gopi.B
Abstract – Software Defined Radio (SDR) is an emerging technology to realize the many applications without using different hardware components. The FM0/Manchester and systematic codes can be combined to achieve high throughput.FM0/Manchester codes can be used to reach the dc balance and enhancing signal reliability. Systematic codes are used to detect and correct the errors. In this code, the code input is embedded into the encoded output. BWA architecture is used in systematic codes, which is implemented using parallel processing unit to achieve high speed. These encoding techniques are combined using mode selection signal. SOLS technique can be used to reduce the number of transistor used in the architecture. This combined architecture can be implemented in VHDL coding using MODELSIM SE 6.2C software. This proposed architecture can be verified using the FPGA (SPARTAN 3E) kit. An experimental result shows less area and high throughput.
Download
40 Efficient Image Recovery Using Data Mining and Image Processing Techniques
Dr V.Muralikrishna, Kommu Naveen, Raghu Kumar Lingamallu
Abstract – With the advancement and popularity of multimedia technologies and internet mediums, user cannot satisfy with the conventional methods of information retrieval. Because of this, the content based image retrieval is becoming a new and fast method of information retrieval. Content based image retrieval is the method of retrieving the data particularly images from a wide collection of databases. The retrieval is done by using features. Content Based Image Retrieval (CBIR) is a method to organize the wide variety of images by their visual features. In modern days with the development of social networking mediums, so many digital images are uploaded day by day. In order to access this huge data collection new techniques are very essential. These techniques will ease the data handling and the user can easily access the data. Content Based Image Retrieval is such a technique which uses features for searching a particular image from a database. It represents visual features like edges, spatial information, texture, shape. Here, in this paper the content based image retrieval techniques are discussed.
Download
41 Extensive Distance Wireless mm-Wave Signal Deliverance at Wide Band
Dr Boda Bhaskar, Dr.B.Chinna Subbanna
Abstract – W-band (75–110 GHz) is a potential radio frequency band to provide long-distance wireless links for mobile data transmission. We proposed a high-speed long-distance wireless transmission link at W-band based on some enabling technologies and advanced devices, such as antenna polarization multiplexing combined with multiple-input multiple-output, large-gain/highpower W-band electrical amplifiers, high-gain small-beamwidth Cassegrain antennas, and wideband optical/electrical components. We experimentally demonstrated that our proposed wireless transmission link can realize up to 1.7-km wireless delivery of 20-Gb/s@85.5-GHz millimeter-wave signal with a bit-error rate less than 3.8 × 10−3 .
Download
42 Secure And Verifiable Cryptographic Scheme Using Rubik’s Cube Principle
B.Nagarajan, B.Manju
Abstract – With the rapid development of the networked multimedia, communication and propagation techniques, the trend of sending or receiving the digital data, especially images has greatly increased. To protect the privacy of the authorized users and to guarantee the legal data access, security is an important issue in communication and storage of images. Encryption is one way to ensure the security. The original image is scrambled using the bit level permutation based on DNA encoding to confuse the relationship between original and encrypted images. Then genetic operators like crossover, mutation are applied to rows and columns of the scrambled image. Both this operations are done by using random numbers generated by pseudorandom number generators like LCG and BBS. This proposed image encryption scheme can resist exhaustive attack, statistical attack, and differential attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, and analysis of NPCR and UACI values.
Download
43 Defluoridation of Drinking Water Using Low Cost Natural Adsorbent (Sugar Cane Bagasse)
Nusrat Ali, Mahtab Ahmad, Shilpi Singh
Abstract – In India large population is mainly belong to rural areas which depend on ground water for their drinking purpose. The fluoride concentration in ground water varies from place to place. The data show that the fluoride distribution in ground water varies from 0.01mg/l to 48 mg/l [2] therefore it is require to observe defluoridation by cheap and easy method. This paper review about the defluoridation by a natural absorbent i.e. sugarcane bagasse which is cheap and effective and gives perfect removal of fluoride in drinking water upto 84%. Also paper present the information on occurrence of fluoride and its effects on human health and various control method for the removal of fluoride (specially sugar cane bagasse).
Download
44 Improving the Security Using 2Flip in VANET
J.Lavanya, Dr.S.Sivananaitha Perumal
Abstract – Here a Two-Factor Lightweight Privacy-preserving authentication scheme (2FLIP) has been used to enhance the security of VANET communication. 2FLIP employs the decentralized certificate authority (CA) and the password-based two-factor authentication (2FA) to achieve the goals. Based on the decentralized CA, 2FLIP only requires several extremely lightweight hashing processes and a fast message-authentication-code operation for message signing and verification between vehicles. The proposed scheme provides strong privacy preservation that the adversaries can never succeed in tracing any vehicles, even with all RSUs compromised.Moreover, it achieves strong nonrepudiation , even if he is not the only driver of the vehicle. Extensive simulations reveal that 2FLIP is feasible and has an outstanding performance of nearly 0-ms network delay and 0% packet-loss ratio.
Download
45 Prevent Byzantine Attack on Manet Using Enhanced Co-Operative Bait Detection and Prevention Scheme
P. Anusuya, R. Chithradevi, S.Dhivya
Abstract – A Mobile Ad hoc Network (MANET) is a dynamic wireless network that can be formed infrastructure less connections in which each node can act as a router. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using ECBDS (Enhancement Cooperative Bait Detection and Prevention scheme) technique to prevent Byzantine attacks in MANET.
Download
46 Data Security and Privacy for Cloud Storage Using Key Aggregate and Searchable Encryption
Akshatha M, Dhananjaya M K
Abstract – The competence of encrypting and sharing selected data among different users via public cloud storage may ease security concerns over unintentional data disclosures in the cloud. Designing an encryption scheme depends on the competent administration of encryption keys. The task to design such encryption methods depends on the experienced management of encryption keys. Dissimilar encryption keys should be used for dissimilar documents which are needed to be shared among a group of users. This can be done by distributing a large number of keys effectively. These keys can be used both for encryption and searching. The users who receive these keys have to store it safely. In order to search on the distributed data, keyword trapdoors has to be submitted to the cloud. Having a protected storage and communication on the cloud seems impractical. This problem is made practical in this paper by recommending the perception of searchable cumulative key encryption using the Key Aggregate Searchable encryption (KASE) scheme. The data owner in KASE distributes a single key to a user to share a group of documents. The user submits this key to the cloud along with the trapdoor to extract the documents stored on the cloud. The estimation of performance and security authenticates that the proposed scheme is proficient.
Download
47 A Vision Based Traffic Analysis for Highway Vehicle
K.Divyalakshmi, N.Subbulakshmi, S.Masophin Salomi
Abstract – In this paper, we describe a novel algorithm that counts and classifies highway vehicles based on regression analysis. This algorithm requires no explicit segmentation or tracking of individual vehicles, which is usually an important part of many existing algorithms. Therefore, this algorithm is particularly useful when there are severe occlusions or vehicle resolution is low, in which extracted features are highly unreliable. we would like to process low quality videos by skipping this module. In our collected videos, multiple vehicles could be occluded and thus form a large foreground segment. Three different regressors are designed and evaluated. Experiments show that our Regression based algorithm is accurate and robust for poor quality videos, from which many existing algorithms could fail to extract reliable features.
Download
48 Studying the Properties of Concrete with Copper Slag and Glass Wool Fibre
Er. Anwar Ahmed, Er. Mohammad Kashif Khan, Dr. Syed Aqeel Ahmad, Athar Hussain
Abstract – The present scenario of modern concrete technology is towards increasing the strength and durability of concrete to meet the demands of the modern construction world at lower cost and towards increasing the use of waste materials as replacement in concrete ie.to follow resource efficiency. These factors can be achieved in concrete by adding natural or synthetic fibre and other materials such as slag being produced by Sterlite Industries. The basic purpose of using Glass Wool Fibre is to reduce the cost of concrete because Glass Fibre is very costly and use of Copper Slag will balance the ecosystem as it’s a waste material. Hence, research has to be done to provide an alternative use of Glass Fibre. In the present study, Glass wool fibre and Copper Slag is added and replaced by fine aggregate respectively to the concrete to increase the strength as compared to the control concrete. The strength parameters of concrete such as Workability, Compressive Strength and Split Tensile Strength were studied by varying the percentage of Glass Wool fibre from 0.2% to 0.8% to the total weight of concrete at 40% replacement of fine aggregate by copper slag and before doing this test were conducted on variation of Copper Slag percentage from 10% to 60% and Glass Wool Fibre in variation (0.2%,0.4%,0.6%0.8%) individually on M-25 Grade of Concrete. Cubes of Sizes (150mm*150mm*150mm) and Cylinder of size (150 mm Dia. And Length 300mm) were casted and cured for 7&28 days and then the specimen were tested.
Download
49 Location Based Authentication of KNN Queries with Location and Query Privacy
P.Sathish, C.Muthukumaran
Abstract – In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, study approximate k nearest neighbor (kNN) queries where the mobile user queries the location-based service (LBS) provider about approximate k nearest points of interest (POIs) on the basis of his current location. Proposed a basic solution and a generic solution for the mobile user to preserve his location and query privacy in approximate kNN queries. The proposed solutions are mainly built on the Paillier public-key cryptosystem and can provide both location and query privacy. To preserve query privacy, this basic solution allows the mobile user to retrieve one type of POIs, for example, approximate k nearest car parks, without revealing to the LBS provider what type of points is retrieved. Proposed generic solution can be applied to multiple discrete type attributes of private location-based queries. Compared with existing solutions for kNN queries with location privacy, the proposed solution is more efficient. Experiments have shown that the solution is practical for kNN queries.
Download
50 Adsorption of Chromium from Tannery Effluent by Using Neem (Azadirachta Indica) Leaves as a Low Cost Adsorbent
Shailendra Kr. Sharmaa, Neha Mumtaz, Tabish Izhar
Abstract – The effluent of tannery industries are the major source of chromium contamination in the ground and surface water, to remove the chromium from surface water Neem leaves are used as the absorbent. The removal of chromium (VI) by activated Neem leaves adsorption by batch adsorption studies expose that Neem leaves have an essential capacity for observation cr-(VI) form effluent. in this study absorption is the important industrial process removal of odor color, turbidity, metal ion and the reduction of COD. Neem adsorbent used in this study to prepared at laboratory scale observed to be very effective for removal of chromium form aqua’s solution. In this study different method of investigation and detailed experimental procedure to of obtain the adsorption kinetic, adsorption equilibrium and effect of pH, dosage concentration ion and contact time on batch absorption and column adsorption system. The maximum removal efficiency is tends up to 86% for bio sorbent prepared form Neems leaves.
Download
51 Performance Evaluation of Maximum Ratio combining Scheme in WCDMA System for Different Modulations
Rajkumar Gupta
Abstract – In this paper analyze the performance of single input single output antenna system (SISO) and single input multiple outputs antenna system (SIMO) using maximum ratio combining(MRC) diversity technique with binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) modulation schemes in wide band code division multiple access (WCDMA) system. The performance analysis results showed that SIMO system give better performance compare to SISO system in various network conditions.
Download
52 Diagnosis of Coarse Grain Model for Power Switches
K.M. Asha, A.Prathibha
Abstract – Power gating technology is used in power switches for reducing leakage power. Power switches are divided in to segments, which uses DML gates. Dual mode logic gate use both dynamic and static operation. Faulty power switch is detected from segments hence achieve better diagnosis accuracy. The proposed diagnosis has been validated through number of ISCAS benchmarks. In the presence of temperature voltage and process variation, this DFT solution provides efficient testing of power switches ,to achieve faster operation DML gates are used. Finally it will be implemented using FPGA kit.
Download
53 A Survey on Intersatellite Laser Communication
Manjit Sandhu, Sukhdeep Kaur, Jaipreet Kaur
Abstract – Laser communications systems are wireless connections through the atmosphere. They work similarly to fibre optic links, except the beam is transmitted through free space under line of sight condition. Laser is a generic term used for light amplification by stimulated emission of radiation. A laser is a device that emits light i.e. electromagnetic radiation through a process called stimulated emission. Laser communication is the key area in wireless communication. This paper gives an overview of techniques used, features, applications, advantages and disadvantages of laser light.
Download
54 An Efficient Detection and Authentication Based On Fragmentation Technique in the Cloud
S.Dhivya, M.Kamala Malar, P.Anusuya
Abstract – Security is one of the most crucial aspects among those the wide-spread adoption of cloud computing.The third-party administrative control is done in cloud computing which gives rise to security concerns the attacks may happens by data of other users and nodes within the cloud hence, high security measures are required to protect data within the cloud. In this paper we propose (DROPS) Division and Replication of Data in the Cloud for optimal performance and security.Here the file is fragmented and then replicate the fragmented data over the cloud nodes.The nodes store only a single fragment of a particular data file that ensures even in case of attack no meaningful information is revealed to the attacker.The DROPS methodology is used for providing higher level of security.
Download
55 A Development of Novel Encryption for Secured Data Sharing Using KAC
T.Dhivya Bharathi, Dr.S.Sivananaitha Perumal
Abstract – Data sharing is the very important functionality in cloud storage. Cipher text Policy Attribute-Based Encryption (CP-ABE) has a very large cipher text size, which increases linearly with respect to the number of attributes in the access policy. The other hand, existing privacy preserving schemes protect the anonymity but require bulky, linearly increasing ciphertext size. It proposed a new construction of CP-ABE, named Privacy Preserving Constant CP-ABE (denoted as PP-CP-ABE) that significantly reduces the ciphertext to a constant size with any given number of attributes.Key Aggregate Cryptosystem(KAC) concept is used for sharing this data from one to another. Key-aggregate cryptosystem produce constant size cipher text . That is very efficient delegation rights of decryption for any set of cipher text are possible. Any set of secret keys can be aggregated and make them as single key, which groups all the key by making it a aggregate key.
Download
56 Design of Digital Differentiators Using Interpolation and Model Order Reduction Technique
Naval Kishor Chaudhary, Darshan Sati, Mahesh Chandra Bhatt, Vijaya Bhandari
Abstract – In this paper, first order digital differentiators are obtained by the combination of interpolation and model order reduction techniques. MATLAB simulation results have been presented to validate the effectiveness of the proposed differentiators. The designed differentiators have shown superior performance compares to Al-Alaoui and Ngo differentiators at low frequency region.
Download
57 An Approach For Mining Association Rules For 3d Data Using Representative Slice Mining (Rsm) Framework
R Komala, P. R. S. Naidu, N. K. Sumanth
Abstract – In the present trends of data mining, the Mining frequent patterns are significantly important. Over the past few decades many of the efficient FCP mining algorithms have been in the literature which includes feature enumeration algorithms, row enumeration algorithms and dense data mining algorithms. In addition, there is a limitation on all these algorithms to 2D dataset analysis. Some of the 3D application areas are gene-sample-time microarray data, transaction-item-location market-basket data. The existing data mining algorithms like CLOSET, CHARM and D-Miner are used to extract the Frequent Closed Cubes (FCC) from a 3D dataset. These algorithms endeavor to mine Frequent Closed Cubes that give “close” relationships among three dimensions. There is no possibility in furtherance of expansion in any dimension can be made on the pattern. Representative Slice Mining (RSM) is a three phase framework, which makes use of existing 2D FCP mining algorithms to mine 3D FCCs. In phase 1, representative slice is developed based on one dimensional classification and slices combination. In phase 2, to mine 2D Frequent Closed Patterns a 2D frequent closed pattern mining algorithm can be applied on each representative slice. In phase 3, a post-pruning method is implicated to remove Frequent Closed Cubes unclosed in the classified dimension. Extension to the existing system is generation of Association Rule Mining which can be further used in classification. Association Rule Mining is used in many application domains for finding interesting patterns. One of the best known application areas is the market-basket analysis where purchase patterns are discovered and further association analysis is useful for decision making and effective marketing.
Download
58 Information Security Risk Assessment by using Data Mining – A Review
K.Madhavan, Dr.R.ManickaChezian
Abstract – This paper reviews the recent works carried out by researchers in the field of information security risk assessment in organizations. Information security risk assessment empowers organizations to determine what threats exist to a specific asset and the associated risk level of that threat. The threat prioritization process provides the necessary information to the organizations to select appropriate control measures and initiate safeguarding and counter measures to minimize the risk to an acceptable level. The main purpose of the paper is to compare the previous work on information security risk assessment process advocated by different authors to identify the procedure adopted, method of the study, variables used and the major focus of the studies.
Download
59 A Real-Time Railway Fasteners Inspection using HAAR Segmentation
B.Rajesh, A.Thomas Mary Sheeba
Abstract – Railway inspection is a very critical task for ensuring the safety of railway traffic. Traditionally, this task is operated by trained human inspectors who periodically walk along railway lines to search for any damages of railway components. However, the manual inspection is slow, costly, and even dangerous. A Visual Inspection System can be used for fastener defects detection and also to find the location of the missing fastener. We focus on automatically finding and assessing the partially worn and missing fasteners based on computer vision technologies. The fasteners are used to hold the track on sleepers, if there is any fasteners may worn or missing may results in hazardous defects, which would cause the displacement of track and even threaten the safety of train operation. Generally, there are two kinds of fasteners: 1.hexagonal-headed bolts and 2.hook-shaped fasteners. The hook-shaped fasteners are widely used in current railway lines. Here we use the vehicle that runs on the track, which may hold the cameras on the both side of the vehicle. The vehicle can be run at the average speed on the track. The image captured by the vehicle can be send to the Real-Time Visual Inspection System to detect the defects on the fasteners.
Download
60 Dynamic Travel Recommendations for Tourist Using Google Map API
R.Krishnaveni Jeenath, J.Ganesh, S.Jackline
Abstract – Tourists can experiment when they are visiting a place instead of knowing how they manage or plan their vacation. The growth of world tourism has had a constant development over the past 50 years. The proposed system is, the user can indicate whether traveling by car or walks. Second, user can choose city area to visit, as well as the maximum distance at which he want to move. Third, our application will generate the shortest route to follow. From this set of selected places our application determines the shortest path using the traveling salesman algorithm. Generation of custom path is integrated, allowing user to have Google maps with all places to visit with a true an accurate location. It allows the user to display maps of tourist places in real time using Google map API. Next, The Transit Score algorithm calculates a score for a specific point by summing the relative "usefulness" of nearby routes. Experimental results demonstrate that the proposed approach is able to generate better recommendations.
Download
61 Discrete Mathematics: Basic Proof Technique for Computer Science Engineering
Mona Dekate, Sunetra Adsad
Abstract – In this paper we introduce several basic types of proof with special emphasis on a technique called induction that is invaluable to the study of discrete math for computer science.
Download
62 Content Based Filtering Via Social Data: Metadata
S.jackline, J.Ganesh, R.Krishnaveni Jeenath
Abstract – Content-based filtering, also referred to as cognitive filtering, recommends items based on a comparison between the content of the items and a user profile. The content of each item is represented as a set of descriptors or terms, typically the words that occur in a document. The user profile is represented with the same terms and built up by analyzing the content of items which have been seen by the user. When both quantitative and qualitative meta-data is presented, it is the qualitative meta-data that drives selection. The results are consistent with application of the Recognition heuristic, which postulates that when faced with constrained decision-making, humans will tend to exercise judgement based on cues representing familiarity. The information source that content-based filtering systems are mostly used with are text documents. A standard approach for term parsing selects single words from documents.
Download
63 An Efficient Multi-Label Image Classification Method for Image Annotation
Apurva Dhurandher, Shreya Jain
Abstract – With growth in the volume of visual data, there is a growing interest in efficient categorization of visual data for better retrieval and browsing of such data using semantic keywords. Recently, multi-label classification is also an active research area due to its applicability to real-life data. In this paper we formulated multi-label classification of images as an image annotation tasks by using the output from the multi-labeled classifiers as the semantic keywords for annotation. We used convolutional neural network for feature extraction and principal component analysis for dimensionality reduction. We also proposed a mutual information based two stage multi-label classification method for efficient classification by taking advantage of label correlation among different class labels. Experimental results on Pascal VOC datasets shows our method outperforms the binary relevance method.
Download
64 Implementation of Digital Signatures
Jaipreet Kaur, Sukhdeep Kaur, Manjit Sandhu
Abstract – With the increase in the data and data flow via internet or intranet there is a dire need of the data to be secure. The security of the data give rise to the concept of end to end encryption. There are a lot of methods that can be adopted to secure the communication between a sender and a receiver. Digital signature being one of the most important aspects of end to end encryption. The websites also need to be secured, as they are exposed to open web. Anyone with the cruel intentions can modify or even destroy the work done on the website. This paper discusses about the autonomy of digital signatures. How a sender can encrypt the message over the insecure communication channel and a receiver can decrypt the same message with the help of the provided key. Digital signatures have been accepted in several national and international standards developed and accepted by many corporations, banks, and government agencies.
Download
65 Cloud Based Service Migration with QoS
Prachi B.Gaikwad, Uttam R.Patole
Abstract – In the Mobile Computing technology, mobile devices like smart phones and tablets were replaced by personal computers. In the upcoming years, these devices are supposed to be switched between different network providers using vertical handover mechanisms to maintain network connectivity at all time. Due to that mobile devices can access cloud services without interruption while user changes location. Using current model, mobile devices moving from one geographical location to another keep using those services from the local Cloud of their previous network, which tends to move a large volume of data through the Internet over a long distance, which results in more congestion over a network. This degrades the Quality of Service and, the Quality of Experience offered by the services in the Cloud. So, there is a need of another method to manage resources more efficiently, while improving the QoS and QoE of mobile media services. This introduces a new concept of Cloud Based Mobile Service Delivery where services run on localized public Clouds and are able to migrate other public Clouds in different geographical locations depending on service demands and network status. It prevents the Internet network from experiencing more traffic loads and provides resource allocation and management mechanism to service providers for their services. This system also removes ambiguity which occurs at the time of migrating the services and also prevents migration of recently migrated services which reduces congestion.
Download
66 Digital Right Management Model based on Cryptography for Text Contents
Pushpendra Kumar Verma, Dr. Jayant Shekhar, Preety
Abstract – Generally, DRM (Digital Rights Management) system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the fundamental idea of a novel DRM method which is composed of an incomplete cryptography and user identification mechanism to control the quality of digital contents. This research paper proposes an improved scheme to encrypt the plain text message for its security. All the conventional encryption techniques are very weak and brute force attack and traditional cryptanalysis can be used to easily determine the plain text from encrypted text. In this work of encryption technique, a new concept of conventional ceaser cipher algorithm with hill cipher algorithm is used to make encryption technique more secure and stronger than the earlier concept. The plain text is encrypted in such a way that it becomes difficult to decrypt it. The proposed system is divided into two phases. In first phase, the plain text message is converted to first encrypted text using a new substitution approach which uses poly-alphabetic cipher technique. The encryption is done using variable length key which depends on the string length. In the second phase, the hill cipher technique is applied on the first encrypted text to produce new encrypted text or cipher text. At the receiver end, if the receiver has appropriate decryption key, he can generate the text message similar to the original message. DRM is a form of cryptography, the process of protecting information from unauthorized use by transforming it so that only the authorized receiver can read it. The sender – in this context, the information vendor or provider – encrypts the digital object via a “key” of some kind. The recipient – the information user – may decrypt it for use with a copy of the same key, usually automatically. The information is protected from “attackers” – unauthorized users, or uses – who lack the key. Encryption Standard (AES). Features of data are depends on its types. Therefore same encryption technique cannot be used used for all types of data. Images have large data size and also has real time constrain problem hence similar method cannot be used to protect images as well as text from unauthorized access. However with few variations in method AES can be used to protect image as well as text. In this project I have implemented encryption and decryption for text and image using AES.
Download
67 Dynamic Key Management in Wireless Sensor Networks
S.Silviya, N.Subbulakshmi
Abstract – Wireless sensor networks have been deployed for a wide variety of applications. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks.
Download
68 CT Image Denoising Using Dual Tree Discrete Wavelet Transform and Wiener Filter
Ruchika Tiwari, Anand Vardhan Bhalla, Rajendra Patel
Abstract – Work discussed in this paper is related to the denoising of a CT image before further using it. In order to attain the objective Dual Tree Discrete Wavelet Transform (DT-DWT) and wiener filter are being used to remove the noise that are either introduced in the image during capturing or injected into the image during transmission. The DT-DWT has an excellent performance in the denoising field and Wiener filter can further enhance the image by filtering out the Gaussian noise. In this work PSNR and MSE parameters are being improved using combination of DT-DWT and Wiener filter.
Download
69 Reversible Data Hiding in Encrypted JPEG Bitstream
Priyanka Dighe, Khade Nalini, G.R.Suryawanshi
Abstract – This consistency proposes a framework ofvarying data obnubilating (RDH) in an encrypted JPEG bitstream.Unlike subsisting RDH methods for encrypted spatial-domainimages, the proposed method aims at encrypting a JPEGbitstream into an opportunely organized structure, and embedding asecret message into the encrypted bitstream by scarcely modifyingthe JPEG stream. We identify utilizable bits congruous for data obnubilatingso that the encrypted bitstream carrying private datacan becorrectly decoded. The private message bits are encoded witherror rectification codes to achieve an impeccable data extraction andimage recuperation. The encryption and embedding are controlled byencryption and insert keys properly. If a receiver hasboth keys, the secret bits can be extracted by analyzing theblocking artifacts of the neighboring blocks, and the pristinebitstream impeccably recuperated. In case the receiver only has theencryption key, he/she can still decode the bitstream to obtain theimage with good quality without extracting the obnubilated data.
Download
70 RPB (Reverse Path Based) Approach to Detect and Prevent Black Hole Attacks in WSN
Avneet Kaur, Mandeep Kaur, Harneet Kaur
Abstract – This paper is based on black-hole detection and prevention in the Wireless Sensor Nodes (WSN’s). This is an attack occurs cause of malicious nodes, which fetch the data packets by falsely advertising a false route to the destination. Wireless networks are very popular these days, as the users want wireless connectivity at every geographic position. There is an increasing problem of attacks on Wireless Sensor Nodes (WSN’s) Black hole attack is one of the security loophole in which the traffic is redirected to unauthorized node that actually does not exist in the network. The nodes represent itself in the way to the other nodes that it can attack other nodes and networks knowing that it has the shortest path. WSN must have a secure way for communication, which is pretty challenging. By aiming to provide secure communication and transmission, researchers working specifically on the security threats in WSN, and provide us secure routing protocols.
Download






Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com

Copyright

COPYRIGHT © EverScience Publications